期刊文献+

基于生存能力的节点权值多样化布置算法

Survivability based node weight diversity deploy algorithm
在线阅读 下载PDF
导出
摘要 将多样化应用到网络系统、软件中以减少恶意代码传播以及单一重复攻击的多米诺效应是一个广泛的共识。提出一种基于生存能力的节点权值多样化布置算法,从节点重要性出发,将有限的差异系统布置到所有节点中。该算法能在保证单个节点对网络影响最小前提下,实现核心节点的高生存性。仿真实验表明了算法的有效性。 Abstract:It is widely believed that diversity in network systems and software will decrease the viru- lence of malicious codes and the domino effect of singlerepeat attacks. Proposes a survivability based nodeweight diversity deploy algorithm. Starting from node importance, the algorithm assigns distinct software to all nodes. The algorithm can guarantee the minimal impact of a single node on the network systems as well as achieve high survivability of the core nodes. The algorithm is proved to be effective through simulation experiments.
出处 《计算机工程与科学》 CSCD 北大核心 2013年第9期99-103,共5页 Computer Engineering & Science
基金 国家863计划资助项目(2009AA01Z432)
关键词 多样化 权值 生存性 diversity ~ weight ~ survivability
  • 相关文献

参考文献1

二级参考文献11

  • 1Elena Gabriela Barrantes,David H Ackley,Trek S Palmer,et al.Randomized instruction set emulation to disrupt binary code injection attacks[C] //CCS'03:Proceedings of the 10th ACM conference on Computer and communications security,New York,NY,USA,2003:281-289.
  • 2Sandeep Bhatkar,Daniel C DuVarney,Sekar r.Address obfuscation:an efficient approach to combat a board range of memory error exploits[C] //Proceedings of the 12th conference on USENIX Security Symposium,Berkeley,CA,USA,2003:8.
  • 3Cox B,Evans D,Filipi A,et al.N-variant systems-A secretless framework for security through diversity[C] //Proceedings of the 15th USENIX Security Symposium,August 2006.
  • 4Debin Gao,Michael K Reiter,Dawn Song.Behavioral distance for intrusion detection[C] //Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID 2005),2005:63-81.
  • 5Debin Gao,Michael K Reiter,Dawn Song.Behavioral distance measurement using hidden markov models[C] //Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID 2006),2006:19-40.
  • 6Geer D,Bace R,Gutmann P,et al.The cost of monopoly.Technical report,CCIA,2003.
  • 7Gaurav S Kc,Angelos D Keromytis,Vassilis Prevelakis.Countering code-injection attacks with instruction-set randomization[C] //Proceedings of the 10th ACM conference on Computer and communications security,New York,NY,USA,ACM,2003:272-280.
  • 8Richard C Linger.Systematic generation of stochastic diversity as an intrusion barrier in survivable systems software[C] //HICSS'99:Proceedings of the Thirty-Second Annual Hawaii International Conference on System Sciences-Volume 3,Washington,DC,USA,IEEE Computer Society,1999:3062.
  • 9Adam J.O'Donnell,Harish Sethu.On achieving software diversity for improved network security using distributed coloring algorithms[C] //CCS'04:Proceedings of the 11th ACM conference on Computer and communications security,New York,NY,USA,ACM,2004:121-131.
  • 10Salton G,Wong A,Yang C S.A vector space model for automatic indexing[J].Communications of the ACM,1975,18(11):613-620.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部