摘要: 现有安全技术已经不足以对抗日趋严重的计算机系统及网络的安全问题,根据对可生存系统技术的需求,给出了目前生存技术的两类研究方法:可生存设计和入侵响应。以文件系统为例,阐述可生存设计的思想和方法;重点以可生存数据库为对象,描述入侵响应的3 种具体实现方案:入侵恢复,隔离和围堵。另外,针对每一个方案,提出并描述了实现的模型。
关键词:
可生存系统;可生存技术;入侵响应;隔离;围堵
Abstract: Current security techniques can not provide enough safety to computer system and networks. So the system needs a new way to live:survivability. This paper proposes two research methodologies in survivability: survivable designs and intrusion response; and exampled by an ITDB(intrusion tolerance database), gives several schemes and models to each research methodology.
Key words:
Survivable system; Survivability techniques; Intrusion response; Isolate; Containment
杜 皎,冯登国,李国辉. 可生存系统的两类研究方法[J]. 计算机工程, 2006, 32(2): 13-15.
DU Jiao, FENG Dengguo, LI Guohui. Research Directions in Survivable Systems[J]. Computer Engineering, 2006, 32(2): 13-15.