基于云模型的网络信息系统可生存性评估方法
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着现代化社会日益趋于网络信息化,网络信息系统在日常生活中扮演着举足轻重的作用。虽然传统的安全措施提高了网络信息系统的安全性,但各种入侵事件还是会不断的发生,为此我们就必须考虑系统在入侵发生后还能否向用户提供满意的服务,这就是可生存性。而可生存性是网络信息系统在安全性之上必需考虑的问题。
     本文围绕云模型的基础理论与研究方法,对网络信息系统的可生存性进行分析研究,基于云模型,给出一种可行的网络信息系统可生存性的评估方法。
     本文首先对网络信息系统的可生存性进行分析研究,确定影响网络信息系统可生存性的单因素。其次,根据单因素的评价集因子建立评估标准云模型。接着,根据信息数据建立实际云模型。最后,对两者进行相似性的比较,确定最相似的评语云,完成对网络信息系统可生存性的评估。
As we turn into network information society, network information systems are more important for people's normal life. Though traditional security can improve network information system's security, kinds of intrusions remain as before. Then, we must consider whether system can provide satisfied service when they have been intruded, and this is called survivability. Survivability should be considered beyond security for network information system.
     This paper discusses survivability of internet information system based on the basic theory and research methods of cloud model. We propose a new method that uses cloud model to evaluate the survivability of network information system.
     Firstly, we do study with the survivability of network information system, and get to know single factors which affect the survivability of network information system. Secondly, we establish appraisal standard cloud models for the single factor, and then establish actual cloud model according to data. Finally, compare the comparability between them and choose the right one, then complete the evaluation of survivability of network information system.
引文
[1]维基百科.http://zh.wikipedia.org/wiki/%E4%BF%A1%E6%81%AF%E7%B3%BB%E7%BB%9F.
    [2]林雪纲.网络信息系统生存性分析研究.2006
    [3]Ellison R.J.,Fisher D.A.,Linger R.C.etal.Survivable Network System:An Emerging Discipline[J].Technical Report,CMU/SEI-97-TR-013,Carnegie Mellon University.1997
    [4]Richard C L,Nancy R M,Howard F L.Requirements Definition for Survivable Network Systems[M].Technical Report.System Design Laboratory.SKI International Press,2002
    [5]Nancy R M,Robert J E,Richard C L,etal.Survivable Network Analysis Method.Intrusion Tolerant Sisterly Joint PI Meeting Prcmentafion[C].Washington:IEEE Computer Society Press,2004
    [6]Ellison Robert J.,Willis R.R.Software Quality Engineering:A Total Technical and Management Approach.Englewood Clift,NJ:Prentice-Hall,1988
    [7]Moitra Soumyo D.,Konda Suresh L.A Simulation Model for Managing Survivability of Networked Information Systems[J].Technical Report CMU/SEI-2000-TR-020,2000
    [8]Jha Sanjay K.Wing Jeannette M.,Linger Richard C.etal.Survivability Analysis of Network Specification.International Conference on Dependable Systems and Networks(DSN 2000).New York,NY,USA:IEEE Computer Society,2000.
    [9]Wilson Mark R.The Quantitative Impact of Sur,,ivable Network Architectures on Service Availability[J].IEEE Communications Magazine,1998,36(5):71-77
    [10]Louca Soullam,Pitsillides Andreas,Samaras George.On Network Survivability Algorithms Based on Trellis Graph Transformations.The Fourth IEEE Symposium on Computers and Communication(ISCC'99).Red Sea,Egypt:1999,235-243
    [11]Kinght John C.,Strunk Elisabeth A.,Sullivan Kevin J.Towards A Rigorous Definition of Information System Survivability.The DARPA Information Survivability Conference and Exposition(DISCEX'03).Washington.DC:2003
    [12]杨超,马建峰.可生存网络系统的形式化定义[J].电子科技,2004,4:1-4
    [13]Krings A W,Azadmanesh M H.A graph based model for survivability analysis,UI-CS-TR-02-024\[R].2004.
    [14]Gao Zhi-xing,Ong C H,Tan W K.Survivability assessment:modeling dependencies in information systems[C].Proceeding of 4~(th)IEEE/CMU/SEI Information Survivability Workshop(ISW- 2001/2002),Vancouver,BC Canada,2001,15-17
    [15]Linger R,Hevner A,Walton G,etal.Semantic foundations for survivable system analysis and design[C].Proceedings of the International Conference on Dependable Systems and Networks(DSN-2001).Goteberg,Sweden,2001
    [16]McDermott J.Attack-potential-based survivability modeling for high-consequence systems[C].Proceeding of Third IEEE International Workshop on Information Assurance.College Park,2005,23-24
    [17]郭渊博,马建峰.分布式系统中服务可生存性的定量分析[J].同济大学学报2002,30(10):1190-1193
    [18]ZOLFAGHARIO A,KAUDEL1 F J.Framework for network survivability performance[J].IEEE Journal on Selected Areas in Communications,1994,12(1):46-51
    [19]HEVNER A,LINGER R.The flow-service-quality framework:unified engineering for large-scale,adaptive systems[A].Proceedings of the 35th Hawaii International Conference on System Sciences[C].Hawaii,USA,2002,278
    [20]包秀国,胡铭曾,张宏莉等.两种网络安全管理系统的生存性定量分析方法[J].通信学报,2004,25(9):34-41
    [21]李德毅,史雪梅,孟海军.隶属云和隶属云发生器.计算机研究与发展.1995,42(8):32-41
    [22]Li Deyi,Han J,Chan E,Shi Xuemei.Know ledge rep resentation and discovery based on linguistic atom s.P roc the 1st Pacific2 Asia Conf KDD &DM.Singapore,1997
    [23]范定国,贺硕,段富,牛保宁.一种基于云模型的综合评判模型.科技情报开发与经济.2003,13(12):157-159
    [24]柳炳祥,李海林.一种基于云模型的综合评判方法.微计算机信息.2007.23(11-2):234-262
    [25]刘常昱,冯芒,戴晓军,李德毅.基于云X信息的逆向云新算法.系统仿真学报.2004,26(11):2417-2420
    [26]邸凯昌,李德毅,李德仁.云理论及其在空间数据发掘和知识发现中的应用.中国图象图形学报.1999,4(11):930-935
    [27]倪现君.云模型在空间数据挖掘和知识发现中的应用.工程技术.62
    [28]杨朝晖,李德毅.二维云模型及其在预测中的应用.计算机学报.1998,21(11):961-969
    [29]梁俊斌,苏德富.基于二维云模型的网格服务可靠性评价.微电子学与计算机.2005,22(2):77-84
    [30]杜鹤,李德毅.基于云的概念划分及其在关联采掘上的应用.软件学报.1999, 12(2).196-230
    [31]李东琦,康慧佳,张庆丰.基于云模型的连续属性整理离散化方法.微计算机信息.2007,23(9-3):214-216
    [32]Hollway B A,Neumman P G.Survivable computation systems.The problem and working group recommendations[R].Washington..US Army Research Laboratory,1993
    [33]Daskapan S,Vree WG.Self-organizing trust principle for survivable system[C].IASTED International Conference on Artificial and Computational Intelligence.Tokyo,Japan:2002,7-12
    [34]陈左宁.大规模计算机系统可信性技术的研究[J].高性能计算技术.2004,6:1001-1004
    [35]林闯,彭雪海.可信网络研究[J].计算机学报.2005,28(5):751-758
    [36]黄遵国,卢锡城,胡华平.生存能力技术及其实现案例研究[J].通信学报.2004,25(7):137-145
    [37]Wang H Q,Liu D X,etal.A holistic approach to survivable distributed information system for critical applications[C].Naming,China:Published in Springer's Lecture Notes in Computer Science.2005,713-724
    [38]关于国家重点基础研究发展计划973计划[EB/OL].Http://www.973.gov.cn/mana/contfile/web/234/20051271353429a.doc.2005
    [39]Kant L,Chen w.Service survivability in wireless networks via multilayer self-healing[C].Wireless Communications and Networking Conference.2005,4:2446-2452
    [40]Keromytis A,etal.A Holistic Approach to Service Survivability[C].Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems:in association with 10th ACM Conference on Computer and Communications Security,2003,11-20
    [41]Mankins D,Krishnan R,etal.Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing[C].Proceeding s of the 17th Annual Computer Security Applications Conference.2001,411-421
    [42]王东霞,窦文华,周兴铭.保证关键服务生存性的ATM网络资源管理[J].计算机研究与发展.2000,37(1):50-54
    [43]包秀囤,蒋宗礼等.NTP自主配置的自组织途径[J].计算机学报.2005,28(5):759-766
    [44]Wells D,et al.Software Survivability[C].Proc.DARPA Information Survivability Conf.IEEE Computer Soc.Press,Los Alamitos,Calif.,2000,2:241-255
    [45]Ghosh A K,Voas J M.Inoculating Software for Survivability[C].Comlnunications of the ACM.1999,42(7):38-44
    [46]Choi B K,Rho S,Bettati R.Fast software component migration for applications survivability in distributed realtime systems[C].Object-Oriented RealTime Distributed Computing.Seventh IEEE International Symposium on,2004,269-276
    [47]协同信息与系统实验室.海量信息系统可生存性分析方法及软件可生存性增强技术[EB/OL].http://cscw.fudan.edu.cn/main-project.htm.2006
    [48]Fisher J,Linger R Survivability.protecting your critical systems[J].IEEE Journal of Internet Computing,1999,3(6):55-63
    [49]Knight J C,Sullivan K J,etal.Survivability architectures issues and approaches[C].DARPA Information Survivability Conference and Exposition.2000,(2):157-171
    [50]Linger R C,Lipson H F,etal.Life-Cycle Models for Survivable Systems.Sledge TECHNICAL REPORTCMU/SEI.2002
    [51]Zhang YG,Vin H,etal.A New Survivability Paradigm[C].Heterogeneous Networking.Cloudcroft,New Mexico,USA:2001,33-39
    [52]Luenam P,Liu Peng.The design of an adaptive intrusion tolerant database system[C].Foundations of Intrusion Tolerant Systems.2003 Organically Assured and Survivable Information Systems,2003,14-21
    [53]李之棠,舒承椿.基于信息冗余分散的两种系统可存活性模型[J].计算机研究与发展.2002,39(7):769-774
    [54]Srikitja A,etal.On Providing Survivable QoS Services in the Next Generation Internet[R].Supported in Part by NSF Grant NCR95O6652 and DARPA under Agreement No.1730602-97-1-0257
    [55]Ellison R,Fisher D,etal.Survivable Network System Analysis.A Case Study[J].Software,IEEE,1999,16(4):70-77
    [56]徐琳,刘志勇等.国家自然科学基金委员会信息科学部计算机科学处2005年度基金申请与资助概况[J].软件学报.2005,16(11):2021-2028
    [57]邵立勤.“十一五”期间国家科技发展重点方向[EB/OL].http://sche.dlut.edu.cn/news/download/fazhanfangxiang.doc.2006
    [58]国家自然科学基金委员会与微软亚洲研究院联合资助项目[EB/OL].http://www.nsfc.gov.cn/nsfc/cen/xmzn/2OO6xmzn/061h/102.htm.2006
    [59]赖积保,王慧强,王健.系统可生存性研究综述.计算机科学.2007,34(3):238-239,275
    [60]倪现君,李国,吴懿慧.基于云模型的数据挖掘技术.山东师范大学学报(自然科学版).2007,22(1):33-35
    [61]闫文周,贾小妮.基于云模型的网络计划评审技术.山西建筑.2007,33(7):192-193
    [62]李德毅,孟海军,史雪梅.隶属云和隶属云发生器.计算机研究与发展.1995,32(6)
    [63]刘桂花,宋承祥,刘弘云.发生器的软件实现.计算机应用研究.2007,1:46-48
    [64]刘常昱,李德毅,潘莉莉.基于云模型的不确定性知识表示.计算机工程与应用.2004.32-35
    [65]杜益鸟.数据挖掘中关联规则的研究与应用.解放军理工大学博士学位论文.2000
    [66]郑成兴.基于FSM模型的信息系统生存性计算.计算机工程与应用.2007,43(2):140-144

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700