DocumentCode :
2015428
Title :
Adaptive Hierarchical Intrusion Tolerant Model Based on Autonomic Computing
Author :
Li, Bingyang ; Wang, Huiqiang ; Feng, Guangsheng
Author_Institution :
Coll. of Comput. Sci. & Technol., Harbin Eng. Univ., Harbin, China
fYear :
2008
fDate :
13-15 Dec. 2008
Firstpage :
137
Lastpage :
141
Abstract :
Intrusion tolerance has been a key technology of system survivability. Aiming at the absence of self-adaptation ability and quantitative analysis on existent intrusion tolerant system, an adaptive hierarchy intrusion tolerant system based on autonomic computing (AHITAC, for short) is proposed. Adopting hierarchy modes, the critical modules of AHITAC include confidence evaluation of accessing, active trapping on suspicious information, hierarchical learning of applications and classed recovery of system function. By autonomic implementing the learning and adaptive function of confidence threshold, service classification and trap repository, AHITAC implements the tolerance on intrusion and suspicious information, improving the ability of self-recovery and self-optimization on object network. The simulation results show that the object network with AHITAC is stable and tolerant.
Keywords :
fault tolerant computing; security of data; system recovery; telecommunication security; unsupervised learning; adaptive hierarchical intrusion tolerant system; autonomic computing; confidence threshold; information security technology; network security; self-adaptation ability; self-adaptive hierarchical learning; service classification; suspicious information trap repository; system recovery; system survivability; Adaptive systems; Automatic testing; Computer science; Computer security; Control systems; Cryptography; Data security; Educational institutions; Information security; National security; Autonomic Computing; Confidence Evaluation; Intrusion Tolerance; trapping Mechanism;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology, 2008. SECTECH '08. International Conference on
Conference_Location :
Hainan Island
Print_ISBN :
978-0-7695-3486-2
Type :
conf
DOI :
10.1109/SecTech.2008.24
Filename :
4725362
Link To Document :
بازگشت