完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Sun, Wen-Chun | |
dc.contributor.author | Chen, Yi-Ming | |
dc.date.accessioned | 2009-08-23T04:43:19Z | |
dc.date.accessioned | 2020-05-25T06:52:10Z | - |
dc.date.available | 2009-08-23T04:43:19Z | |
dc.date.available | 2020-05-25T06:52:10Z | - |
dc.date.issued | 2007-01-29T08:19:17Z | |
dc.date.submitted | 2006-12-04 | |
dc.identifier.uri | http://dspace.lib.fcu.edu.tw/handle/2377/3596 | - |
dc.description.abstract | Today’s understaffed IT departments face a daunting security challenge – protect the enterprise from new, unknown threats. The most damaging threats, unfortunately, are coming from fatal malicious programs, such as zero day worms and viruses, which are hard to be stopped by traditional security mechanisms. Therefore, instead of trying to prevent every single intrusion, in this paper, we adopt a novel system architecture which will tolerate new worm attack temperately until administrator removes the vulnerability. With a set of intrusion pattern recognition mechanisms and the virtual machine technology, the proposed VMITN (Virtual Machine based Intrusion Tolerance Network) is able to achieve the goal of intrusion tolerance. We have implemented a prototype of VMITN. We present the design, implementation and evaluation of this prototype system. Our experiments in an emulation network proved the reliability and survivability of VMITN under Code Red worm attack. | |
dc.description.sponsorship | 元智大學,中壢市 | |
dc.format.extent | 6p. | |
dc.format.extent | 938061 bytes | |
dc.format.mimetype | application/pdf | |
dc.language.iso | zh_TW | |
dc.relation.ispartofseries | 2006 ICS會議 | |
dc.subject.other | Network and System Security | |
dc.title | VMITN: A Novel Intrusion Tolerance Architecture for Treating the Rapid Propagation of Malicious Programs | |
分類: | 2006年 ICS 國際計算機會議 |
文件中的檔案:
檔案 | 描述 | 大小 | 格式 | |
---|---|---|---|---|
ce07ics002006000142.pdf | 916.08 kB | Adobe PDF | 檢視/開啟 |
在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。