首页 | 本学科首页   官方微博 | 高级检索  
     

网络信息系统的生存性技术研究
引用本文:柴争义,张浩军.网络信息系统的生存性技术研究[J].微型电脑应用,2006,22(11):9-10,64.
作者姓名:柴争义  张浩军
作者单位:河南工业大学信息科学与工程学院,郑州,450007
基金项目:河南省科技攻关基金资助项目(编号0524220046)
摘    要:网络生存性技术是指在遭受攻击、故障或意外事故时,系统能够及时地完成其关键任务的能力,是目前网络安全研究的新方向。它比传统的信息保护技术、信息保障技术更能满足目前网络应用的现状,突破了传统的网络安全的概念,从新的角度对网络安全问题进行研究。本文首先分析了可生存性与传统网络安全技术的差别,并给出了生存性的基本定义、特征属性、测定标准、实现方法等,然后介绍了可生存系统设计的两种设计方法,并对两种设计方法进行了对比分析。

关 键 词:网络安全  生存性技术  入侵使用情景  入侵容忍  可生存性设计
文章编号:1007-757X(2006)11-0009-02
收稿时间:2006-05-03
修稿时间:2006-05-03

Research on the Survivability of Network information System
CHAI Zheng-yi,ZHANG Hao-jun.Research on the Survivability of Network information System[J].Microcomputer Applications,2006,22(11):9-10,64.
Authors:CHAI Zheng-yi  ZHANG Hao-jun
Abstract:Network survivability refers to that the system can still fulfill its key tasks when it is suffering attacks, failures or accidents. Survivability has become a new aspect in network security. It can better satisfy the current situation of network application in contrast to the traditional security concepts and technologies such as information protection and assurance. It also gives a new way to research the network security. Firstly, an analysis of the difference between survivability and traditional security concepts is made. Then,the paper gives out the definition, measurement and characteristic implementationtechnology of survivability. Finally, it introduces two methods to realize the survivability and analyzes the difference between the two methods.
Keywords:Network security Survivability Intrusion usage scenario Intrusion-tolerant Survivable system design
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号