Intrusion detection research has so far concentrated on techniques that effectively identify the malicious behaviors. No assurance can be assumed once the system is compromised. Intrusion tolerance, however, focuses o...
详细信息
Intrusion detection research has so far concentrated on techniques that effectively identify the malicious behaviors. No assurance can be assumed once the system is compromised. Intrusion tolerance, however, focuses on providing minimal level of services, even when some components have been partially compromised. the challenges here are how to take advantage of fault tolerant techniques in the intrusion tolerant system context and how to deal with possible unknown attacks and compromised components so as to continue providing the service. this paper presents our work on applying one important fault tolerance technique, acceptance testing, for building scalable intrusion tolerant systems. First, we propose a general methodology for designing acceptance testing. An Acceptance Monitor architecture is proposed to apply various tests for detecting the compromises based on the impact of the attacks. Second, we make a comprehensive vulnerability analysis on typical commercial-off-the-shelf (COTS) Web servers. Various acceptance testing modules are implemented to show the effectiveness of the proposed approach. By utilizing the fault tolerance techniques on intrusion tolerance system, we provide a mechanism for building reliable distributed services that are more resistant to both known and unknown attacks. Copyright (C) 2003 John Wiley Sons, Ltd.
Withthe rapid growth in network scale and capacity, the traditional peer-to-peer (P2P) network management model is not suitable. We present a novel network management framework model called "cloud to cloud"...
详细信息
Withthe rapid growth in network scale and capacity, the traditional peer-to-peer (P2P) network management model is not suitable. We present a novel network management framework model called "cloud to cloud" (C2C). A number of management services are deployed on geographically distributed servers to form a management service cloud, and the NMS uses services provided by this cloud to manage the underlying physical network cloud. the paper describes the general characteristics of the C2C model, and then introduces its architecture, information model, communication model and functional model. Finally, we give an implementation framework of the C2C model for wireless access network management.
the proceedings contain 35 papers. the special focus in this conference is on Abstract State Machines. the topics include: Experiments with test case generation and runtime analysis;a framework for proving contract-eq...
ISBN:
(纸本)3540006249
the proceedings contain 35 papers. the special focus in this conference is on Abstract State Machines. the topics include: Experiments with test case generation and runtime analysis;a framework for proving contract-equipped classes;mobile unity schemas for agent coordination;a unified formal specification and analysis of the new java memory models;modelling conditional knowledge discovery and belief revision by abstract state machines;formal description of a distributed location service for mobile ad hoc networks;remarks on turbo ASMS for functional equations and recursion schemes;integrating UML static and dynamic views and formalizing the interaction mechanism of UML state machines;the hidden computation steps of turbo abstract state machines;using spin to generate tests from ASM specifications;quantum computing and abstract state machines;consistent integration for sequential abstract state machines;deciding the verification problem for abstract state machines;a framework for modeling the semantics of expression evaluation with abstract state machines;modeling information services on the basis of ASM semantics;test case generation from ASML specifications;ASM specification of database systems;a non-standard approach to operational semantics for timed systems and on the semantics of abstract state machines.
Intrusion detection research has so far concentrated on techniques that effectively identify the malicious behaviors. No assurance can be assumed once the system is compromised. Intrusion tolerance, however, focuses o...
详细信息
Intrusion detection research has so far concentrated on techniques that effectively identify the malicious behaviors. No assurance can be assumed once the system is compromised. Intrusion tolerance, however, focuses on providing minimal level of services, even when some components have been partially compromised. the challenges here are how to take advantage of fault tolerant techniques in the intrusion tolerant system context and how to deal with possible unknown attacks and compromised components so as to continue providing the service. this paper presents our work on applying one important fault tolerance technique, acceptance testing, for building scalable intrusion tolerant systems. First, we propose a general methodology for designing acceptance testing. An Acceptance Monitor architecture is proposed to apply various tests for detecting the compromises based on the impact of the attacks. Second, we make a comprehensive vulnerability analysis on typical commercial-off-the-shelf (COTS) Web servers. Various acceptance testing modules are implemented to show the effectiveness of the proposed approach. By utilizing the fault tolerance techniques on intrusion tolerance system, we provide a mechanism for building reliable distributed services that are more resistant to both known and unknown attacks. Copyright (C) 2003 John Wiley Sons, Ltd.
the proceedings contain 27 papers. the special focus in this conference is on Static Analysis of Object-Oriented Languages and Static Analysis of Concurrent Languages. the topics include: Precise analysis of string ex...
ISBN:
(纸本)3540403256
the proceedings contain 27 papers. the special focus in this conference is on Static Analysis of Object-Oriented Languages and Static Analysis of Concurrent Languages. the topics include: Precise analysis of string expressions;modular class analysis with datalog;class-level modular analysis for object oriented languages;checking interference with fractional permissions;message analysis for concurrent languages;instantaneous termination in pure esterel;stack size analysis for interrupt-driven programs;program development using abstract interpretation and the ciao system preprocessor;selective tail call elimination;inserting safe memory reuse commands into ML-like programs;weighted pushdown systems and their application to interprocedural dataflow analysis;client-driven pointer analysis;abstract interpretation of programs as markov decision processes;a logic for analyzing abstractions of graph transformation systems;type systems for distributed data sharing;using statistical analysis to counter the impact of static analysis approximations;computer-assisted verification of a protocol for certified email;craig interpolation and reachability analysis;precise widening operators for convex polyhedra;cartesian factoring of polyhedra in linear relation analysis;continuation-based partial evaluation without continuations;loop transformations for reducing data space requirements of resource-constrained applications;code compaction of matching single-entry multiple-exit regions;existential heap abstraction entailment is undecidable;abstraction techniques and complexity results;static analysis of accessed regions in recursive data structures and establishing local temporal heap safety properties with applications to compile-time memory management.
the paper introduces a new scheme of receiver-driven layered multicast using active networks (RLM-AN). As most layered multicast schemes conduct an end-to-end congestion control mechanism, we propose a distributed TCP...
详细信息
the paper introduces a new scheme of receiver-driven layered multicast using active networks (RLM-AN). As most layered multicast schemes conduct an end-to-end congestion control mechanism, we propose a distributed TCP-friendly congestion control scheme. the multicast tree is regarded as a set of virtual links and TCP-friendly congestion control is performed on each virtual link. By introducing the congestion control mechanism in the active nodes inside the network, we obtain smoother and more TCP-friendly throughputs and quick response to congestion inside the network.
Cellular array models of linear distributed parameter systems are proposed. One of the arrays is a discrete model of diffusion systems. the cells have one-bit variables /spl isin/{1, -1} and change their values accord...
详细信息
Cellular array models of linear distributed parameter systems are proposed. One of the arrays is a discrete model of diffusion systems. the cells have one-bit variables /spl isin/{1, -1} and change their values according to a pseudo-random walker rule. Another cellular array is a one-dimensional discrete wave propagation system. the array makes unidirectional waves with spatially distributedthree-level variables /spl isin/{1, 0, -1}. Numerical experiment shows that the temporally or spatially averaged behavior of these cellular arrays coincides withthe solutions of original diffusion and wave equations within 2.2% of error.
A methodology for the synthesis of communication protocols based on evolutionary techniques is presented. It enables to automatically generate finite-state models that synthesize protocol specifications from partial i...
详细信息
A methodology for the synthesis of communication protocols based on evolutionary techniques is presented. It enables to automatically generate finite-state models that synthesize protocol specifications from partial input/output sequences. these partial sequences, directly derived from service specifications and a set of associated protocol data units (PDUs), are training sequences that drive the evolution of finite-state machines (FSMs), each describing one protocol entity specification. the proposed approach has the advantage of reducing computation applicable to finite-state automata (FSA) in existing protocol synthesis methods, abstracting the protocol designer from such tasks.
A resource management scheme for multimedia ad hoc wireless LANs (AWLAN) based on orthogonal frequency division multiplexing-code division multiple access (OFDM-CDMA) is presented. this scheme combines distributed res...
详细信息
A resource management scheme for multimedia ad hoc wireless LANs (AWLAN) based on orthogonal frequency division multiplexing-code division multiple access (OFDM-CDMA) is presented. this scheme combines distributed resource management and OFDM-CDMA techniques to support multimedia services with QoS guarantees. the performance evaluation results for broadband wireless access (BWA) type physical layer supporting MPEG traffic sources shows that when the number of nodes is about 50 and the mean session arrival rate is less than 0.1, we can get a blocking probability of 10/sup -2/ and the QoS loss probability of 10/sup -1/.
the IFIP TC10 Working Group 10.1 "Computer Aided Systems theory" Committee Meeting at the Vienna University of Technology on the 30/sup th/ September 1999, resulted in a resolution to support a joint worksho...
详细信息
the IFIP TC10 Working Group 10.1 "Computer Aided Systems theory" Committee Meeting at the Vienna University of Technology on the 30/sup th/ September 1999, resulted in a resolution to support a joint workshop withthe IEEE Computer Society TC-ECBS on Formal Specifications of Computer-Based Systems (FS CBS). Owing to a substantial overlap in this research domain, Franz Pichler, the founder of the IFIP WG10.1, and Charles Rattray, the IFIP WG10.1 chair, delegated Miroslav Sveda, a member of both WG10.1 and TC-ECBS, to act as a contact person in this activity. the ECBS Executive Committee has welcomed and greatly supported the initiation and implementation of the IEEE/IFIP Joint Workshops on FS CBS as Formal Specifications Working Group Sessions following annual ECBS conferences.
暂无评论