分布式并行系统若干安全技术的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着Internet的迅猛发展,电子商务与电子政务的兴起,对高性能计算的普遍需求,使得分布式并行系统得到了越来越广泛的应用。然而,任何一个分布式并行系统在构建过程中,在操作系统、网络协议、应用程序上都会因为设计缺陷带来安全漏洞,使得分布式并行计算环境下存在着大量的安全风险,包括恶意代码、网络窃听、缓冲溢出、拒绝服务等攻击形式。为了有效抵御这些安全威胁,本文研究了分布式并行系统计算环境下三种重要的安全机制:身份认证与密钥协商、分布式并行访问控制、分布式并行入侵检测。首先给出了分布式并行系统的定义、安全风险分析和安全技术需求,然后详尽而深入地分析了目前国内外研究团体在安全模型、身份认证和密钥协商算法、分布式访问控制模型、基于主机的异常入侵检测模型、分布式入侵检测模型上已有的研究结果和有待解决的问题。
     安全模型是构造分布式并行安全系统的基础,是指导安全策略和安全机制之间相互关联、相互协作的框架。本文遵循了动态安全模型P2DR的基本安全框架:安全策略(Policy)、防护(Protection)、检测(Detection)、响应(Response)。将身份认证与密钥协商、分布式并行访问控制、分布式并行入侵检测三者围绕分布式安全策略有机地结合在一起。
     身份认证(IdentityAuthentication)与密钥协商(KeyAgreement)是分布式并行计算环境下结点之间通信安全的基础,本文提出一个基于有限域上离散对数的身份认证和密钥协商体制,这个密码安全体制不仅克服了传统的基于PKI/CA密码体制的公钥管理复杂性,也消除了CA认证中心带来的通信瓶颈问题,该密码安全体制能很好地适用于AdHoc和DPLinux等完全分布式并行计算环境。对该密码安全体制进行安全分析后表明:该体制能有效地抵御网络中的消息重放攻击和中间人攻击,并有较高的运行效率。
     分布式并行访问控制是分布式并行系统的被动防御机制,它体现了分布式并行系统中的信息实体都处于安全策略下的可控状态。随着分布式并行系统对可伸缩性和资源动态性的要求越来越高,基于角色访问控制(Role Based Access Control,RBAC)灵活的授权特点得到了广泛的应用。为了能更加充分地表达现实世界中复杂的、动态的访问控制授权关系,提出了一个基于任务的动态角色访问控制模型——TD-RBAC(Task-based Dynamic RBAC)。本文采用扩展谓词任务模型描述并发事务逻辑,在基于任务的并发执行活动网络模型上分析出各个任务之间的动态约束关系,从而在传统RBAC模型基础上扩展了动态的角色约束关系。性能评估分析结果显示TD-RBAC模型在分布式并行计算环境下具有较好的访问控制效率。在此基础上,本文提出一个基于任务的访问控制模型(TBAC)和基于角色的访问控制模型(RBAC)相结合的,基于分布式并行计算环境的访问控制模型——DPTRBAC(Distributed Parallel Task&Role Based Access Control)模型,DPTRBAC模型通过语义网有效地解决了分布式并行系统下安全策略的语义岐义性,将分布式并行系统中结点之间的访问控制安全策略冲突风险降至最低。
     分布式并行入侵检测是分布式并行系统的主动防御机制。本文首先提出一个基于空间扩维特征的入侵检测模型——SEDIDS(Spatial Expended Dimensioncharacter based Intrusion Detection System),SEDIDS模型将访问控制模型抽象为多维安全拓扑空间,而安全漏洞是低维空间通向高维空间的通道,因此入侵攻击表现为访问细粒度的数据实体。SEDIDS模型直接检测信息系统中的数据实体的完整性,因此入侵检测效果更直观、更准确。进一步本文提出了基于访问控制的主机异常入侵检测模型ACBIDS(Access Control Based Intrusion Detection System),首先分析了访问控制模型为了避免访问粒度过细而导致系统可用性的下降,因此访问控制在安全防御中具有宏观优势;同时异常入侵检测需要对复杂的信息系统建立正常访问轮廓,而导致与真实的访问模式偏差过大,从而使入侵检测模型的误报率(FNR)和漏报率(FPR)居高不下,因此入侵检测在安全防御中具有微观优势。基于访问控制的入侵检测有效地解决了这些问题,使得该模型具有很低的误报率和漏报率。
     分布式并行计算时代的到来,使得系统资源分散化,导致安全漏洞与安全风险的分散化,因此入侵攻击也演变为协同化攻击。本文提出一个完全分布式的误用入侵检测模型DPACBIDS(Distributed Parallel ACBIDS),DPACBIDS模型基于分布式入侵攻击特征库,通过建立结点的资源关联图来决定结点ACBIDS模型捕获的异常数据发送需要发送的结点群,降低了分布式并行系统中的通信开销。同时采用改进的Wu-Manbe匹配算法应用于异常数据和入侵攻击特征库的匹配,提高了匹配效率,最后给出了算法的复杂度分析。通过实验表明,本文提出的DPACBIDS模型有效降低了结点间的通信开销,具有非常高的入侵响应效率。
Along with the development of Intemet,electronic commerce and electronicgovernment affair have rapid growth,there are pervasive requirement for highperformance computing.Distributed parallel system become more and more popularthan before.Whereas in the construction process of any distributed parallel system,there are so many vulnerabilities because of the incorrect development in the operatingsystem,network protocol and application program.So the distributed parallelcomputing system is confronted with lots of security risk,including vice code,networkwiretapping,buffer overflow,deny of service attacks.In order to prevent from thesesecurity risk,the paper has proposed three main countermeasures:identityauthentication and key agreement,distributed parallel access control system,distributedparallel intrusion detection system.First present the definition of distributed parallelsystem,and analyze the security risk and security technicques requirement.And analyzethe existent research conclusion and problem in domestic and overseas research groups,which is about security model,identity authentication and key agreement,distributedaccess control model,host based anomaly intrusion detection model,distributedintrusion detection model.
     Security model is the infrastructure of distributed parallel security system,and isthe collaboration and association framework which comprise security policy andsecurity mechanism also.This paper according to the P2DR security model,which ispolicy,protection,detection,response,associate the identity authentication and keyagreement,distributed parallel access control,distributed parallel intrusion detectionorganically.
     Identity authentication and key agreement is the base of communication securitybetween nodes in distributed parallel computing system.The paper has proposedidentity authentication and key agreement scheme base on discrete logarithm to finitefield.The scheme not only overcome the complexity of public key management basedon PKI/CA cryptography,but also eliminate the bottleneck of communication from CAauthentication center.The cryptography is applicable for fully distributed parallel system environment(AdHoc,DPLinux etc.).The analysis of security for thecryptography demonstrate:the cryptography can resist the message replay attacks andman in the middle attacks,and have nice feasibility in practice.
     Distributed parallel access control is the passive defense mechanism.It embody allentity of distributed parallel system is controlled state under the security policy.Alongwith the more stricter in scalability and changeability,the role based access controlmodel is applied popularly for flexible authorization.In order to express thecomplicated and dynamic access control authorization relations in the real world,weproposed a novel model——TD-RBAC(Task-based Dynamic RBAC).We describe theconcurrent transaction logic by the extended predicate task model and find out thedynamic constraint relations among the tasks by analyzing the concurrent executive netof tasks.And accordingly we extend the dynamic role constraint relations based on thetraditional RBAC.The analysis result of the performance evaluating shows that theTD-RBAC has favorable access control efficiency under the distributed parallelcomputing.In addition,the paper proposed a novel access control model:DPTRBAC(Distributed Parallel Task & Role Based Access Control).DPTRBACinosculate the virtue of RBAC and TBAC,and account for different semantic meanings.The semantic net debased the risk of access control in DPTRBAC model.
     Distributed parallel intrusion detection is the active defense mechanism.The paperfirstly proposed a spatial expended dimension character based intrusion detectionsystem:SEDIDS,the model abstract the access control model into multiply dimensionsecurity topology space,and the vulnerability is the channels between normal andmultiply dimension space.So the intrusion attacks will access fine granularity data thannormal.SEDIDS is more intuitionistic and exact because of detection integrity of dataentity in information system.In addition,the paper proposed a RBAC based hostanomaly intrusion detection system (ACBIDS),the analysis is the following:accesscontrol performance will descend due to better fine granularity,so access control modelhave macroscopical virtue.Meanwhile,intrusion detection will construct a normalaccess profile for complex information system,which is difficult,there are high falsepositive rate(FPR) and high false negative rate(FNR),so intrusion detection model havemicrocosmic virtue.ACBIDS solve the problem,implement low FPR and FNR.
     The era of distributed parallel computing,the resource is distributed,which result in vulnerability and risk is scatted.Thereby the attacks evolve distributed andcoordinated attack.The paper proposed fully distributed parallel misuse intrusiondetection model:DPACBIDS(Distributed Parallel Access Control Based IntrusionDetection System).The model constructed resource associate graph for dispatchinganomalous data among nodes in distributed parallel system.Which is constructed bymisuse distributed parallel intrusion character database and anomalous data itself.Thescheme debased the overhead of nodes communication.While the paper adapt improvedWu-Manbe match algorithm for anomalous data and intrusion character database,enhance the efficiency of matching.Consequently,the paper described computationalcomplexity analysis.The experiment show the DPACBIDS model debased thecommunication overhead between nodes,and have high response efficiency.
引文
[1]Andrew S.Tanenbaum,Maarten Van Steen.Distributed Systems:Principles and Paradigms.Published by Prentice-Hall,Inc.2002,1-2
    [2]George Coulouris,Jean Dollimoe,Tim Kindberg.Distributed Systems:Concepts and Design.(Third Edition).Published by Pearson Education Limited 2001,1-2
    [3]Glen Bruce,Rob Dempsey.Security in Distributed Computing.Published by Prentice-Hall Inc.1996,4-5
    [4]Yu W D,Aravind D,Supthaweesuk P.Software Vulnerability Analysis for Web Services Software Systems.11th IEEE Symposium on Computers and Communications,2006.(ISCC'06).740-748
    [5]Cheminod M,Bertolotti I,Cibrario,et al.Evaluating the Combined Effect of Vulnerabilities and Faults on Large Distributed Systems.2nd International Conference on Dependability of Computer Systems,2007,11-18
    [6]戴宗坤,罗万伯,等.信息系统安全.北京:金城出版社,2000,7-8
    [7]Singhal M.Security mechanisms in high-speed networks.Proceedings of Ninth International Conference on Computer Communications and Networks,2000,482-485.
    [8]http://bj.is-one.net/safe/standard/P2DR/index.html[OL]
    [9]Jie Wu.Distributed System Design.Published by Prentice-Hall Inc.1999,243-244
    [10]Enslow P H.What is a ‘distributed’ data processing system?.IEEE computers,1978,Vol.22,Bo.1:13-21
    [11]Schroeder M.Distributed systems,ACM Press,Addison-Wesley Publishing Company,1989
    [12]Seitz C L.Resource in Parallel and Concurrent Systems,ACM Press,1990
    [13]Jos(?)D,Sudhakar Y,Lionel N,并行计算机互联网络技术(谢伦国等译).北京:电子工业出版社,2004:1-4
    [14]LIU Xinsong; QIU Yuanjie; YANG Feng.Architecture Research of Non-Stop Computer System.Chinese Journal of Electronics,v 13,n 4,October,2004,p559-563.
    [15]王典荫,刘心松.下一代计算机系统——数字有机体.西部广播电视 .2005,1,p4-6.
    [16]Nessett,D.A Systematic Methodology for Analyzing Security Threats to Interprocess Communication in a Distributed System.IEEE Transactions on Communications.J.1983,Vol.31(9):1055-1063
    [17]Ryutov T,Neuman C.The specification and enforcement of advanced security policies.Proceedings of Third International Workshop on Policies for Distributed Systems and Networks.2002,128-138
    [18]Pau-Chen Cheng,Gligor V D.A model for secure distributed computations in a heterogeneous environment.Fourth Aerospace Computer Security Applications Conference,1988.233-241
    [19]Perlman,R. An overview of PKI trust models.IEEE Network.1999,13(6):38-43.
    [20]M.Blaze,J.Feigenbaum,J.Lacy.Decentralized Trust Management.Proceedings of the 17th Symposium on Security and Privacy.IEEE,1996,164-173
    [21]Shamir A.How to share a secret.J.Communication of the ACM,1979,22(11):612-613
    [22]Sepandar D.Kamvar; Mario T.Schlosser; Hector Garcia-Molina.EigenRep:Reputation Management in P2P Networks.Proceedings of the 12th international conference on World Wide Web.2003,640-651
    [23]Yixin Jiang,Chuang Lin,Zhangxi Tan.An authentication model for multilevel security domains IEEE International Conference on Systems,Man and Cybernetics,2003.2(1):1534-1539
    [24]Camp L.J.Identity,authentication,and identifiers in digital government.2003 International Symposium on Technology and Society,2003,10-13
    [25]Needham R.M.The changing environment for security protocols.Network,IEEE.11(3):12-15
    [26]W.Diffie,M.E.Hellman.Privacy and Authenticaion in Cryptography.IEEE Transactions on Information Theory.1976,22(6):644-654
    [27]R.L.Rivest,A.Shamir,L.M.Adleman.A Method for Obtaining Digital Signauures and Public Key Cryptosystems.Communication of the ACM.1978,21(1):120-126.
    [28]Douglas R.Stinson.Cryptography:Theory and Practice.(Second Edition).Published by CRC Press.1995,131-132
    [29]R.M.Needham,M.D.Schroeder.Using Encryption for Authenticaion in Large Networks of Computers.Communications of the ACM.1978,21(12):993-999
    [30]B.C.Neuman,T Ts'o.Kerberos:An Authentication Service for Computer Networks.IEEE Communications Magazine.1994,32(9):33-38
    [31]Forne J,Hinarejos M.F.Web-based authorization based on X.509 privilege management infrastructure.IEEE Pacific Rim Conference on Communications,Computers and signal Processing.2003,Vol.2:565-568
    [32]David W.Chadwick,Alexander Otenko.The PERMIS X.509 role based privilege management infrastructure.Proceedings of the seventh ACM symposium on Access control models and technologies.2002,135-140
    [33]Forne J,Hinarejos M.F.Web-based authorization based on X.509 privilege management infrastructure.IEEE Pacific Rim Conference on Communications,Computers and signal Processing,2003.Vol.2 :565-568
    [34]Cheng Bo-Chao,Chen Huan,Tseng RyhYuh.A Theoretical Security Model for Access Control and Security Assurance.Third International Symposium on Information Assurance and Security,2007,137-142
    [35]Butler W.Lampson.Dynamic Protection Structures.Proceedings of the AFIPS Fall Joint Computer Conference,1969,Vol.35:27-38
    [36]David E Bell,Leonard J LaPadula.Secure Computer Systems:Mathematical Foundations.ESD-TR-73-278.Electronic Systems Division,Air ForceSystems Command,Hanscom Air Force Base,1973.Vol.1:258-261
    [37]Department of Defense Standard.Department of Defense Trusted Computer System Evaluation Criteria.DoD Computer Security Center,Aug 1983.
    [38]Steven Kcramer.Linus Ⅳ-An Experiment in Computer Security.Symposium on Security and Privacy,IEEE Computer Society Press,1984,24-3 2.
    [39]Lin Tsau Young.Managing Information Flows on Discretionary Access Control Models.IEEE International Conference on Systems,Man and Cybernetics,2006.Vol.6:4759-4762
    [40]Foley,S N.A model for secure information flow.IEEE Symposium on Security and Privacy,1989.248-258
    [41]Ravi Sandhu,Edward Coyne,Hal Feinstein,Charles Youman.Role-Based Access Control Models.IEEE Computer,1996,Vol.29(2):38-47
    [42]http://csrc.nist.gov/rbac/ferraiolo-kuhn-92.pdf[OL]
    [43]Roshan K Thomas,Ravi S Sandhu.Task-Based Authorization Controls(TBAC):A Family of Models for Active and Enterprise-Oriented Autorization Management.Proceedings of the IFIP TC 11 WG 11.3 Eleventh International Conference on Database Securty,1997,166-181
    [44]Yao H,Hu H,Huang B,et al.Dynamic role and context-based access control for grid applications.Proceedings of the 6th International Conference on Parallel and Distributed Computing:Applications and Technologies.IEEE Computer Society,2005.404-406
    [45]Luo JZ,Wang XP,Song AB.Asemantic access control model for grid sevices.Proceedings.of the 9th International Conference on Computer Supported Cooperative Work in Design.Coventry:IEEE Press,2005,350-355
    [46]Ryutov T,Zhou L,Neuman C,et al.Seamons KAdaptive trust negotiation and access control.Proc.of the 10th Symp.on Access Control Models and Technologies(SACMAT 2005).New York:ACM Press,2005,139-146
    [47]Fenkam P,Dustdar S,Kirda E,et al.Towards an access control system for mobile peer-to-peer collaborative environments.Proceedings of the IEEE 11th International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises(WETICE 2002).IEEE Computer Society,2002,95-102
    [48]Kim W,Graupner S,Sahai A.A secure platform for P2P computing in the Internet.Proceedings of the 35th Hawaii International Conference on System Sciences(HICSS).IEEE Computer Society,2002,3948-3957
    [49]Wang Y,Vassileva J.Trust and reputation model in peer-to-peer networks.Proceedings of the 3rd International Conference on Peer-to-Peer Computing.IEEE Press,2003,150-157
    [50]Xing L,Liu L.A reputation-based trust model for peer-to-peer ecommerce communities.Proceedings of the ACM Conference on Electronic Commerce.ACM Press,2003,228-229
    [51]Wang Y,Vassileva J.Bayesian network-based trust model in peer-to-peer networks.Proceedings of the Workshop on “Deception,Fraud and Trust in Agent Societies” at the Autonomous Agents and Multi Agent Systems.2003,23-34
    [52]Wang Y,Vassileva J.Bayesian network-based trust model.Proceedings of the IEEE International Conference on Web Intelligence.IEEE Computer Society,2003,372-378
    [53]Li Z,Dong Y,Zhuang L,et al.Implementation of secure peer group in peer-to-peer network.Proc.of the Information Conf on Communication Technology.IEEE Press,2003,192-195
    [54]Gummadi A,Yoon JP.Modeling group trust for peer-to-peer access control.Proceedings of the 15th International Workshop on Database and Expert Systems Applications.IEEE Computer Society,2004,971-978
    [55]Tran H,Hitchens M,Varadharajan V,et al.A trust based access control framework for P2P file-sharing systems.Proceedings of the 38th Hawaii International Conference on System Sciences.IEEE Computer Society,2005,145-150
    [56]Song S,Hwang K,Zhou R,et al.Trusted P2P transactions with fuzzy reputation aggregation.Internet Computing,IEEE.2005,Vol.9(6):24-34
    [57]Richard A Kemmerer,Giovanni Vigna.Intrusion Detection:A Brief History and Overview.J.IEEE Computer,2002,vol.35(4):27-30
    [58]Dorothy E.Denning,an intrusion-detection model.J.IEEE Transactions on Software Engineering,1987,13(2):222-232.
    [59]Chen S,Tung B,Schnackenberg D.The Common Intrusion Detection Framework-data Formats[R].Internet draft draft-ietf-cidf-data-formats-00.txt,1998.
    [60]Sengupta S,Andriamanalimanana B,Card S W.Towards data mining temporal patterns for anomaly intrusion detection systems.Proceedings of the Second IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems:Technology and Applications,2003,205-209
    [61]Jian Yin,Gang Zhang,Yi-Qun Chen,et al.Multi-events analysis for anomaly intrusion detection.Proceedings of 2004 International Conference on Machine Learning and Cybernetics,2004.Vol.2 :1298-1303
    [62]卿斯汉,蒋建春,马恒太.入侵检测技术研究综述.通信学报,2004,25(7):19-29
    [63]Teng H S,Chen K,LU S C.Adaptive real-time anomaly detection using inductively generated sequential patterns[A].Proceedings of the IEEE Symposium on Research in Security and Privacy.Oakland CA,1990,12(4):278-284.
    [64]Valdes A,Skinner K.Adaptive model-based monitoring for cyber attack detection[EB/OL].http://www sdl.sri.com/projects/emerald/adaptbn-paper/adaptbn.html.
    [65]Lee W; Stolfo S.Data mining approaches for intrusion detection[EB/OL].http://www.usenix.org/publications/library/proceedings/sec98/full_papers/lee/lee_html/lee.html.
    [66]胡侃,夏绍玮.基于大型数据仓库的数据采掘:研究综述[J].软件学报,1998,9(1):53-63.
    [67]Lee W;Stolfo S;Mok K.Mining in a data-flow environment:experience in network intrusion detection http://www.cs.columbia.edu/-sal/hpapers/kdd99-id.ps.gz[OL]
    [68]Lee W,Stolfo S,Mok K.A data mining framework for adaptive intrusion detection.http://www.cs.columbia.edu/-sal/hpapers/framework.ps.gz[OL]
    [69]Lee W,Stolfo S,Mok K Algorithms for mining system audit data.http://citeseer.ist.psu.edu/ lee99algorithms.html[OL]
    [70]Fox K L,Henning R R.A neural network approach towards intrusion detection.Proceeding of 13th National Computer Security Conference,1990,178-182
    [71]Bonifaco J M,Mo reira E S.An adaptive intrusion detection system using neural network.Brazil:UNESP,1997,57-61
    [72]Cannady J.Artifical neural network for misuse detection.Proceeding of the 1988 National Information System Security Conference,1998,Vol.10 :443-456
    [73]Ludovic Me,Gassata.A genetic algorithm as an alternative tool for security audit trail analysis.Cesson Sevigne Cedex,France:Superlec,1996,134-138
    [74]Crosbie M,Spafford G Applying genetic programming to intrusion detection.Purdus University:Department Computer Sciences,Coast Laboratory,1995,1-8
    [75]Steven A H.An immunological model of distributed detection and its application to computer security.University of New Mexico,1999
    [76]Balasubramaniyan J S,Garcia-Fernandez J O.An architecture for intrusion detection using autonomous agents.14th Annual Computer Security Applications Conference,1998,13-24
    [77]http://www.cs.unm.edu/-forrest/index.html[OL]
    [78]Snapp S R,Brentano J,Dias G A system for distributed intrusion detection.Compcon Spring '91.Digest of Papers,1991,Vol.25:170-176
    [79]S R Snapp,S E Smaha,D M Teal.The DIDS(distributed intrusion detection system)prototype Proceeding of the Summer 1992 USENIX Confl Berkeley,CA,USA.USENIX Association,1992,227-233
    [80]S Staniford Chen,S Cheung,R Crawford.GrIDS—A graph based intrusion detection system for large networks.The 19th National Information Systems Security Conference(NISSC),Baltimore,MD,USA,1996,Vol.1:361-370
    [81]http://wwww.cerias.pourdue.edu/coast/intrusion-detection/ids.html[OL]
    [82]Gregory B White,Eric A Fisch,Udo W Pooch.Cooperating security managers:A peer-based intrusion detection system.IEEE Network,1996,Vol.1(2):20-23
    [83]http://wwwcerias.purdue.edu/homes/aafid/docs/tr9805.pdf[OL]
    [84]Biswanath Mukherjee,L Todd Heberlein,Karl N Levitt.Network intrusion detection.IEEE Network.1994.Vol.5(6):26-41
    [85]J Pickel,R Danyliw.Enabling automated detection of security events that affect multiple administrative domains Information Networking Institute,Carnegie Mellon University,Pittsburgh,PA,USA,2000.http://www.incident.org/thesis/bookl.html[OL]
    [86]C Krugel,T Toth.Distributed pattern detection for intrusion detection.The Network and Distributed System Security Symposium.2002,83-86
    [87]Intrusion Detection Working Group.The Intrusion Detection Exchange Protocol(IDXP).2002.http://www ietf.org/intemet-drafts/draft-ietf-idwg-beep-idxp-04.txt[OL]
    [88]Intrusion Detection Working Group.Intrusion detection message exchange format data model and extensible markup language(XML)document type definition 2001.http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-06.txt[OL]
    [89]Liming Hao,Xiehua Li,Shutang Yang,et al.Fast Authentication Public Key Infrastructure for Mobile Ad Hoc Networks Based on Trusted Computing.International Conference on Wireless Communications,Networking and Mobile Computing.WiCOM 2006,1-4
    [90]Leng Jian,Xie Dong-Qin,A novel approach to kernel construction of China bridge CA.11th Pacific Rim International Symposium on Dependable Computing,2005,8-12
    [91]Lidong Zhou,Zygmunt J Hass.Securing Ad Hoc networks.J.IEEE Network,1999,Vol.13(6):24-30
    [92]熊焰,苗付友,张伟超,王行甫.移动自组网中基于多跳步加密签名函数签名的分布式认证.电子学报,2003,31(2):161-165
    [93]Gutmann P.PKI:it's not dead,just resting Computer.2002,Vol.35(8):41-49
    [94]Ham L,Xu Y.Design of generalised ElGamal type digital signature schemes based on discrete logarithm.Electronics Letters,1994,Vol.30(24):2025-2026
    [95]Yun Zhou,Yuguang Fang.A Scalable Key Agreement Scheme for Large Scale Networks.Proceedings of the 2006 IEEE International Conference on Networking,Sensing and Control,2006,631-636
    [96]Eun-Jun Yoon,Eun-Kyung Ryu,Kee-Young Yoo.Efficient remote user authentication scheme based on generalized ElGamal signature scheme.IEEE Transactions on Consumer Electronics,2004,Vol.50(2):568-570
    [97]Aura T.Strategies against replay attacks.10th Proceedings of Computer Security Foundations Workshop,1997,Vol.10(12):59-68
    [98]Serpanos D.N,Lipton R.J.Defense against man-in-the-middle attack in client-server systems.Proceedings of Sixth IEEE Symposium on Computers and Communications,2001,9-14
    [99]Craig Shue; Youngsang Shin; Gupta,M.; el al.Analysis of IPSec overheads for VPN servers.1st IEEE ICNP Workshop on Secure Network Protocols,2005,Vol.6 :25-30
    [100]http://www.verisign.com/index.html[OL]
    [101]刘心松.具有分布式并行I/1接口的分布式并行服务器系统的性能研究[J].电子学报 2002,(12):1808-1810
    [102]IETF.Mobile ad hoc networks charter.http://www.ietf.org/html.charters/manet-charter.html,1999-07-31
    [103]K Fall,E Varadhanm.The NS Manual(Formely ns Notes and Documentation),2000.
    [104]Chen B,Chi X,Wu H.A model for user management in grid computing environments.Grid and Cooperative Computing.2004,732-737
    [105]Andreas Schaad.Detecting conflicts in a role-based delegation model.The 17 Annual Computer Security Application Conference.(ACSAC0 1).New Orleans.Louisiana,2001
    [106]Sushil Jajodia,Pierangela Samarati,V.S.Subrahmanian.A logical language for expressing authorizations.In Proc.the 1997 IEEE Symp.Security and Privacy Oakland CA,USA:IEEE Press,1997,31-42
    [107]Moffett,J.D.,M.S.Sloman.Policy Conflict Analysis in Distributed System Management.Ablex Publishing Journal of Organisational Computing,1994.4(1):p.1-22.
    [108]Lupu E.,M.Sloman.Conflict Analysis for Management Policies.Fifth IFIP/IEEE International Symposium on Integrated Network Management IM'97,San-Diego,1997.
    [109]Benferhat,S.,R.E.Baida,F.Cuppens.A Stratification-based Approach for Handling Conflicts in Access Control.SACMAT03:Proceedings of the eighth ACM symposium on Access control models and technologies,Como,Italy,ACM Press,2003:p.189-195.
    [110]姚键,茅兵,谢立.一种基于有向图模型的安全策略冲突检测方法[J].计算机研究与发展 2005,42(7):1108-1114
    [111]Dawson S,Qian S,Samarati P.Secure interoperation of heterogeneous system:a mediator-based approach.proceedings of the IFIP 14th internaional conference on information security.1998,68-72
    [112]Kapadia A.I-RBAC 2000:a dynamic role translation model for secure interoperability(2001).
    [113]Kapadia A,AI-Muhtadi J.IRBAC 2000:Secure interoperability using dynamic role translation,in technical report:UIUCDCS-R-2000-2126.2000,University of Illinois
    [114]Barka E,Sandhu R.A role-based delegation model and some extension.Proceedings of the 23rd national information systems security conference,2000,154-159
    [115]Freudenthal E,Pesin T,Port L.dRBAC:Distributed role-based access control for dynamic coalition environments.Proceedings of 22nd international conference on distributed computing system,2002,411-420
    [116]Bacon J,Moody K,Yao W.A model of OASIS role-based access control and its support for active security.ACM transactions on information and system security 2002.Vol.5(4):492-540
    [117]David F.Ferraiolo,Ravi Sandhu.Proposed NIST standard for role-based access control,ACM Transactions on Information and System Security(TISSEC),2001,Vol.4(3):224-274
    [118]Steinmuller B,Safarik J.Extending Role-Based Access Control Model With States.International Conference on Trends in Communications.2001,Vol.2:398-399
    [119]David F.Ferraiolo,Ravi Sandhu,Proposed NIST standard for role-based access control.ACM Transactions on Information and System Security,2001,Vol.4(3):224-274
    [120]Xudong Liu,Qiuqi Ruan.Research of access control and coordination strategy in CSCW.7th International Conference on Signal Processing,ICSP2004.vol.2 Pages:1360-1363
    [121]Berners-Lee T,Hendler J.The semantic web.scientific american,May 2001,45-49
    [122]Klyne G,Carroll J.Resource description Framework(RDF):concepts and abstract syntax.http://www.w3.org/TR/rdf-concepts,2004[OL]
    [123]Harmelen F.OWL Web ontology language reference,2002.available from http://www.w3.org /TR/owl-ref/index.html[OL]
    [124]Gomez Perez A,Corcho O.Ontology languages for the Semantic Web.Intelligent Systems,IEEE.2002,Vol.17(1):54-60
    [125]Gong L,Qian X.Computational issues in secure interoperation IEEE transactions on software engineering,1 996.Vol.22(1):43-52
    [126]http://linux.maruhn.com/sec/bonnie.html[OL]
    [127]Andreas Schaad.Detecting conflicts in a role-based delegation model.17th Annual Computer Security Applications Conference.ACSAC2001,Pages:117-126
    [128]Richard A.Kemmerer,Giovanni Vigna.Intrusion Detection:A Brief History and Overview.J.IEEE Computer,2002,Vol.35(4):27-30
    [129]David F.Ferraiolo,Ravi Sandhu,Proposed NIST standard for role-based access control,ACM Transactions on Information and System Security(TISSEC),2001,Vol.4(3):224-274
    [130]Stretton C J H.Technical access control systems.The development of a corporate security strategy.The Institute of Electrical and Electronics Engineers 31st Annual 1997 International Carnahan Conference on Security Technology,1997,23-26
    [131]Halkidis S,Tsantalis N.Architectural Risk Analysis of Software Systems based on Security Patterns.Transactions on Dependable and Secure Computing,2003,1-3.
    [132]Sengupta S,Andriamanalimanana B.Towards data mining temporal patterns for anomaly intrusion detection systems.Proceedings of the Second IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems,2003,205-209
    [133]Kuri J Navarro.Fast multipattern search algorithms for intrusion detection.Proceedings of the Seventh International Symposium on String Processing Information Retrieval,2000,169-180
    [134]ByungRae Cha,Vaidya,B,Seungjo Han.Anomaly intrusion detection for system call using the soundex algorithm and neural networks.Proceedings of the 10th IEEE Symposium on Computers and Communications,2005,427-433
    [135]Srinivas Mukkamala,Andrew H.Sung.A Comparative Study of Techniques for Intrusion Detection.Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence,2003,570-577
    [136]Sandhu,R.S.Samarati.Access control:principle and practice.J.IEEE Communications Magazine,1994,Vol.32(9):40-48
    [137]Chain-Wu Lee,Chun-Hsi Huang,Sanguthevar et al.TROJAN:A Scalable Distributed Semantic Network System.Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence,2003,219-223
    [138]Giorgio Zanin,Luigi Vincenzo Mancini.Towards a formal model for security policies specification and validation in the selinux system.Proceedings of the ninth ACM symposium on Access control models and technologies,2004,136-145
    [139]http://www.cs.unm.edu/-immsec/data-sets.htm[OL]
    [140]Ye N,Emran S.M,Chen Q,et al.Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection.J.IEEE Transactions on Computers.2002,Vol.5 1(7):810-820
    [141]Ning Jiang,Hua K.A,JungHwan Oh.Exploiting Pattern Relationship for Intrusion Detection.Proceedings of the 2003 Symposium on Applications and the Internet,2003,200-208
    [142]Barse E.L,Jonsson E.Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection.Proceedings of the 20th Annual Computer Security Applications Conference,2004,158-167
    [143]Feng H H,Giffin J T,Yong Huang Jha,et al.Formalizing sensitivity in static analysis for intrusion detection.Proceedings of the 2004 IEEE Symposium on Security and Privacy,2004,194-208
    [144]Sandhu R S.Authentication,access control and intrusion detection.J.IEEE Communications Magazine,1994,32(9):40-48
    [145]Elisa Bertino,Ashish Kamra.Intrusion detection in RBAC-administered databases,In Proceedings of the 21st Annual Computer Security Applications Conference,2005,383-386
    [146]T Ryutov,C Neuman.Integrated Access Control and Intrusion Detection for Web Servers,IEEE Transactions on Parallel and Distributed Systems,2003,Vol.14(9):74-78
    [147]Forrest S,Perrelason AS,Allen L,et al.Self-Nonself discrimination in a computer.Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy.IEEE Computer Society Press,1994,202-212
    [148]D Mutz,F Valeur,G Vigna,et al.Anomalous system call detection.ACM Transactions on Information and System Security,2006.Vol.9(1):61-93
    [149]Zhuowei Li,Amitabha Das.Visualizing and Identifying Intrusion Context from System Calls Trace.Proceedings of the Annual Computer Security Applications Conference,2004,61-70
    [150]Xin.Xu,Tao Xie.A Reinforcement Learning Approach for Host Based Intrusion Detection Using Sequences of System Calls.Lecture Notes in Computer Science.2005,Vol.3644:995-1003
    [151]ByungRae Cha,Vaidya B,Seungj o Han.Anomaly intrusion detection for system call using the soundex algorithm and neural networks.Proceedings of 10th IEEE Symposium on Computers and Communications,2005,427-433
    [152]M.M.Yasin,Awais A.Awan.A Study of Host-Based IDS using System Calls.2004 International Conference of Networking and Communication,2004,36-41
    [153]http://www.cs.unm.edu/-immsec/data-sets.htm[OL]
    [154]Warrender C,Forresr S,Pearlmutter B.Detecting intrusions using system calls:Alternative data models.Proceedings of the 1999 IEEE Symposium on Security and Privacy.IEEE Computer Society Press,1999,133-145
    [155]Sun Wu,Manber U.A fast algorithm for multi-pattern searching:Tech.Rep.TR94-17[R].Arizona :Department of Computer Science,University of Arizona,1994

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700