Author Login Chief Editor Login Reviewer Login Editor Login Remote Office

Computer Engineering ›› 2006, Vol. 32 ›› Issue (2): 13-15.

• Trend and Hot Technology • Previous Articles     Next Articles

Research Directions in Survivable Systems

DU Jiao1, 2, FENG Dengguo1, LI Guohui2   

  1. 1. State Key Laboratory of Information Security, Graduate School of Chinese Academy of Sciences, Beijing 100039;2. Department of Management, National University of Defense Technology, Changsha 410073
  • Online:2006-01-20 Published:2006-01-20

可生存系统的两类研究方法

杜 皎 1,2,冯登国1,李国辉2   

  1. 1. 中国科学院研究生院信息安全国家重点实验室,北京 100039;2. 国防科技大学信息系统与管理学院,长沙 410073

Abstract: Current security techniques can not provide enough safety to computer system and networks. So the system needs a new way to live:survivability. This paper proposes two research methodologies in survivability: survivable designs and intrusion response; and exampled by an ITDB(intrusion tolerance database), gives several schemes and models to each research methodology.

Key words: Survivable system; Survivability techniques; Intrusion response; Isolate; Containment

摘要: 现有安全技术已经不足以对抗日趋严重的计算机系统及网络的安全问题,根据对可生存系统技术的需求,给出了目前生存技术的两类研究方法:可生存设计和入侵响应。以文件系统为例,阐述可生存设计的思想和方法;重点以可生存数据库为对象,描述入侵响应的3 种具体实现方案:入侵恢复,隔离和围堵。另外,针对每一个方案,提出并描述了实现的模型。

关键词: 可生存系统;可生存技术;入侵响应;隔离;围堵