完整後設資料紀錄
DC 欄位語言
dc.contributor.authorSun, Wen-Chun
dc.contributor.authorChen, Yi-Ming
dc.date.accessioned2009-08-23T04:43:19Z
dc.date.accessioned2020-05-25T06:52:10Z-
dc.date.available2009-08-23T04:43:19Z
dc.date.available2020-05-25T06:52:10Z-
dc.date.issued2007-01-29T08:19:17Z
dc.date.submitted2006-12-04
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/3596-
dc.description.abstractToday’s understaffed IT departments face a daunting security challenge – protect the enterprise from new, unknown threats. The most damaging threats, unfortunately, are coming from fatal malicious programs, such as zero day worms and viruses, which are hard to be stopped by traditional security mechanisms. Therefore, instead of trying to prevent every single intrusion, in this paper, we adopt a novel system architecture which will tolerate new worm attack temperately until administrator removes the vulnerability. With a set of intrusion pattern recognition mechanisms and the virtual machine technology, the proposed VMITN (Virtual Machine based Intrusion Tolerance Network) is able to achieve the goal of intrusion tolerance. We have implemented a prototype of VMITN. We present the design, implementation and evaluation of this prototype system. Our experiments in an emulation network proved the reliability and survivability of VMITN under Code Red worm attack.
dc.description.sponsorship元智大學,中壢市
dc.format.extent6p.
dc.format.extent938061 bytes
dc.format.mimetypeapplication/pdf
dc.language.isozh_TW
dc.relation.ispartofseries2006 ICS會議
dc.subject.otherNetwork and System Security
dc.titleVMITN: A Novel Intrusion Tolerance Architecture for Treating the Rapid Propagation of Malicious Programs
分類:2006年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics002006000142.pdf916.08 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。