2019
DOI: 10.18280/rces.060105
|View full text |Cite
|
Sign up to set email alerts
|

Study of Two Kinds of Analysis Methods of Intrusion Tolerance System State Transition Model

Abstract: The existing network security technologies cannot prevent all of intrusion, so the purpose of this study is to ensure that the system can continue to operate normally after the invasion. On the basis of existing intrusion tolerance model, increased to learning Status, the optimal state transition model of the invasion-tolerant system is proposed and analyzed respectively with the theory of finite automata and markov theory, further establish intrusion tolerance system. The experimental results show that increa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…Each type of the above methods has its defects. For knowledge-based methods, the experts are often unable to obtain the accurate qualitative knowledge, owing to the complexity of the ICS and the numerous factors [13]. The model-based methods depend heavily on specific samples and cannot be extended easily to general cases.…”
Section: Introductionmentioning
confidence: 99%
“…Each type of the above methods has its defects. For knowledge-based methods, the experts are often unable to obtain the accurate qualitative knowledge, owing to the complexity of the ICS and the numerous factors [13]. The model-based methods depend heavily on specific samples and cannot be extended easily to general cases.…”
Section: Introductionmentioning
confidence: 99%