Transfer Model Based on State of Finite Semi-Markov Automata Intrusion Tolerance

被引:0
作者
Wang Guangze [1 ]
Wang Peng [1 ]
Luo Zhiyong [1 ]
Zhu Suxia [1 ]
机构
[1] Harbin Univ Sci & Technol, Harbin 150080, Heilongjiang, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2016年 / 10卷 / 03期
基金
中国国家自然科学基金;
关键词
Intrusion Tolerance; State Transition; Finite Automata; Semi-Markov Process;
D O I
10.14257/ijsia.2016.10.3.14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing network security technology may not against most of intrusion so that we need to study intrusion tolerance technology. On the basis of existing model of intrusion tolerance, we putted forward an optimization of finite automata state transition model in intrusion tolerance system by adding strategy and updating status. Since the conversion process between the states of the model meets Semi-Markov theory, therefore, the model can be used to quantify this theory; it gives calculation process of the steady probability by each state. By stabilizing the probabilistic analysis of each state, provide theoretical guidance and basis for network management personnel to better maintain network security. Proven, the Semi-Markov applied to finite automata intrusion tolerant system is feasible, effective, and has simple features.
引用
收藏
页码:151 / 159
页数:9
相关论文
共 12 条
  • [1] Defending against flooding-based distributed denial-of-service attacks: A tutorial
    Chang, RKC
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (10) : 42 - 51
  • [2] Chen L. B., 2011, JTSING HUA U, V51, P1519
  • [3] Gong F., 2001, P DARPA INF SURV C E
  • [4] Attack Graph Algorithm in the Application of Intrusion Detection System
    Luo Zhiyong
    You Bo
    Xu Jiazhong
    Yu Guixin
    Liu Yahui
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 249 - 256
  • [5] A method for modeling and quantifying the security attributes of intrusion tolerant systems
    Madan, BB
    Goseva-Popstojanova, K
    Vaidyanathan, K
    Trivedi, KS
    [J]. PERFORMANCE EVALUATION, 2004, 56 (1-4) : 167 - 186
  • [6] Peng Wen-ling, 2005, Mini-Micro Systems, V26, P1296
  • [7] Trivedi K. S., 2002, PROBABILITY STAT REL, V2nd
  • [8] Wang T., 2015, REV COMPUTER ENG STU, V2, P9, DOI DOI 10.18280/RCES.020102
  • [9] Yin Li-Hua, 2006, Chinese Journal of Computers, V29, P1505
  • [10] Yin Li-hua, 2006, Journal of China Institute of Communications, V27, P131