首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--计算机的应用论文--计算机网络论文--一般性问题论文

网络信息系统生存性自适应关键技术研究

摘要第5-6页
Abstract第6-7页
Chapter 1 Introduction第12-18页
    1.1 Research Purpose and Significance第12-13页
    1.2 International and Domestic Scope of Research第13-16页
        1.2.1 Domestic and International Scope第13-14页
        1.2.2 US DARPA Survivability Programs第14-15页
        1.2.3 European Survivability Programs第15页
        1.2.4 Research Scope of Technique第15-16页
    1.3 Main Contents of the Research第16-18页
Chapter 2 Overview Survivability Evaluation Model and Different Techniques of Survivability第18-37页
    2.1 The Development of Network and Information Security System第18-19页
        2.1.1 Intrusion Detection第18页
        2.1.2 Intrusion Prevention第18页
        2.1.3 Research of Survivability第18-19页
    2.2 Concepts and Characteristics of Network Information System and Survivability第19-20页
    2.3 Research Contents of Network Information System and Survivability第20-22页
        2.3.1 Definition of Survivability第20页
        2.3.2 Descriptive Definition第20-21页
        2.3.3 Formal Definition第21-22页
    2.4 Survivability Evaluation Model of Network & Information System第22-26页
        2.4.1 Evaluation Model Based on Critical Services第22-23页
        2.4.2 Evaluation Model Based on Service Components第23-24页
        2.4.3 Evaluation Model Based on 3r Attributes第24页
        2.4.4 Evaluation Model Based State Transition第24-25页
        2.4.5 Evaluation Model Based Data Flow Chart第25-26页
    2.5 Different Techniques of Survivability第26-27页
        2.5.1 Prediction Technique for Survivability of Networked Information System第26-27页
    2.6 Survivability Enhancement Technique of Network Information System第27-30页
        2.6.1 Survivability Enhancement Technique Based On 3r第28-29页
        2.6.2 Survivability Enhancement Technique Based On Tabu Algorithm第29页
        2.6.3 Survivability Enhancement Technique Based on Dynamic Drift第29页
        2.6.4 Survivability Enhancement Technique Based on P2p第29-30页
    2.7 Survivable Database Design of the Network Information System第30-36页
        2.7.1 Current Research Situation of Survivability Evaluation and Prediction Technique第30-36页
    2.8 Summary第36-37页
Chapter 3 Quantitative Evaluation Model of Network Information System and Survival Situation第37-54页
    3.1 Overview第37-38页
    3.2 Introduction第38-39页
    3.3 3R and 1A第39页
    3.4 Parameter Analysis第39-40页
    3.5 Definitions第40页
    3.6 Resistance第40-41页
        3.6.1 Risk Situation第41页
        3.6.2 Impedance Rate of Attack Situation第41页
    3.7 Identifiability第41-42页
        3.7.1 Attack Scenario第42页
        3.7.2 Attack Sequence第42页
    3.8 Recoverability (Restoration)第42-44页
        3.8.1 Definition of Recoverability第42-43页
        3.8.2 Self-Adaptability第43-44页
    3.9 Computation and Calculation Resistibility第44-52页
        3.9.1 Attack Scenario and Risk第45-46页
        3.9.2 Impedance Rate of Attack Situation/Scenario第46页
        3.9.3 Resistibility of the System第46-47页
        3.9.4 Computation and Calculatin of Identifiablity第47-49页
        3.9.5 Computation and Calculation for Recovery/Restoration第49-51页
        3.9.6 Calculation and Computation of Self-Adaptability第51-52页
    3.10 Summary第52-54页
Chapter 4 Approach Intrusion Tolerance on Networked and Information System第54-70页
    4.1 Introduction第54-56页
    4.2 Past Research Work on Intrusion Tolerance and System Security第56-57页
    4.3 Attacks on Networked Information System第57-61页
        4.3.1 XML Bombs第58-59页
        4.3.2 Coercive Parsing第59页
        4.3.3 Flooding Attacks第59页
        4.3.4 Instantiation Flooding Attacks第59-60页
        4.3.5 Indirect Flooding Attacks第60页
        4.3.6 External Entity Referencing第60页
        4.3.7 Oversized Cryptography第60-61页
    4.4 Approach Intrusion Tolerance第61-67页
        4.4.1 Attack Monitoring第62-63页
        4.4.2 Intrusion Diagnosis第63页
        4.4.3 Recovery第63-65页
        4.4.4 The Experimental Testbed第65-67页
    4.5 Intrusion Model第67-68页
    4.6 Summary第68-70页
Chapter 5 Self-Adaptive techniques of survivability and Intrusion Recovery第70-85页
    5.1 Introduction第70-71页
    5.2 Qualitative Analysis of Survivability第71-72页
    5.3 Fault Tolerance第72-73页
    5.4 A Framework of Multi-Layer Network第73-75页
        5.4.1 Multi-Layer Restoration第73-74页
        5.4.2 Layered Response第74页
        5.4.3 Managed Response第74页
        5.4.4 Simultaneous Response第74-75页
    5.5 Past Research Work on Defense Mechanism and Survivability第75-77页
        5.5.1 Enabling of Defense第75-76页
        5.5.2 The middleware-based Integration Approach第76页
        5.5.3 Autonomic Dynamic Response第76-77页
    5.6 Technique for Survivability第77-82页
        5.6.1 Survivability Architecture第77-78页
        5.6.2 Requirements Definition for Survivability第78-79页
        5.6.3 System Integration第79页
        5.6.4 Recoverability in Survivability第79-81页
        5.6.5 Adaptation for Survivability第81-82页
    5.7 Estimate of Survivability第82-83页
    5.8 Summary第83-85页
Conclusion第85-87页
References第87-92页
Academic Achievements第92-93页
Expression of Thanks第93页

论文共93页,点击 下载论文
上一篇:企业行政办公自动化管理系统的设计与实现
下一篇:ALL HISTORY知识社区交互设计研究实践