Design and implementation of an intrusion-tolerant application server middleware-based

被引:0
作者
Guo Y. [1 ]
Liu W. [1 ]
Yuan S. [1 ]
Zhou R. [1 ]
机构
[1] Institute of Electronic Technology, The PLA Information Engineering University
来源
Gaojishu Tongxin/Chinese High Technology Letters | 2010年 / 20卷 / 07期
关键词
Application server; Interceptor; Intrusion tolerance; J2EE; Middleware;
D O I
10.3772/j.issn.1002-0470.2010.07.001
中图分类号
学科分类号
摘要
In consideration of the fact that the existing implementation of intrusion tolerance mechanisms is in the application layer, with the problem that it does not divide the business logic from the intrusion tolerance function, the paper proposes an intrusion-tolerance middleware model based on the interceptor on the basis of analyzing intrusion the tolerance requirements and the architecture of the J2EE application server, which logically divides the intrusion-tolerance functions into service providers and service management. A system was designed by using the intrusion tolerance security model and the element technology, the theory of intrusion tolerance mechanism and the strategy of implementation were described, and the intrusion tolerance technology and the implementation method were extracted. Finally, an intrusion-tolerance J2EE middleware was realized and built on the JBoss, an open source J2EE Application Server Platform, with the dynamic load of the intrusion-tolerance class being implemented through Java class load mechanism.
引用
收藏
页码:661 / 667
页数:6
相关论文
共 10 条
[1]  
7, pp. 337-341, (2005)
[2]  
(2004)
[3]  
Scott S., JBoss Administration and Development Third Edition, (2003)
[4]  
Amir Y., Nita-Rotaru C., Stanton J., Et al., Secure spread an integrated architecture for secure group communication, IEEE Transactions on Dependable and Secure Computing, 2, 3, pp. 248-261, (2005)
[5]  
Sames D., Matt B., Niebuhr B., Et al., Developing a heterogeneous intrusion tolerant CORBA system, Proceedings of the 2002 International Conference on Dependable Systems and Networks, pp. 387-396, (2002)
[6]  
Tally G., Sames D., Matt B., Et al., Intrusion tolerant distributed object systems: project summary, Proceedings of the DARPA Information Survivability Conference and Exposition, pp. 149-151, (2003)
[7]  
Umar A., Anjum F., Ghosh A., Et al., Intrusion tolerant middleware, Proceedings of the DARPA Information Survivability Conference & Exposition II, IEEE Computer Society, pp. 242-256, (2001)
[8]  
Merideth M.G., Iyengar A., Mikalsen T., Et al., Thema: Byzantine-fault-tolerant middleware for web-service applications, Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems, pp. 26-28, (2005)
[9]  
26, 7, pp. 68-75, (2005)
[10]  
(2007)