Intrusion tolerance system is a new technology of network security. It can provide acceptable or degraded system service when intrusions occur. In this article, the system's basic function, technique and objective...Intrusion tolerance system is a new technology of network security. It can provide acceptable or degraded system service when intrusions occur. In this article, the system's basic function, technique and objective are introduced. A kind of state transition model is discussed. The intrusion tolerance architecture based on state the transition model and several vulnerabilities cases are proposed.展开更多
Intrusion detection techniques are attracted attention. There are a lot of projects which have their own emphasizes in the aspect now. The basic ideas and techniques of data mining-based intrusion detection and the ar...Intrusion detection techniques are attracted attention. There are a lot of projects which have their own emphasizes in the aspect now. The basic ideas and techniques of data mining-based intrusion detection and the architecture of a real time data mining-based IDS are discussed Some problems and the future directions are proposed.展开更多
基于覆盖率的错误定位(Coverage Based Fault Localization,CBFL)方法旨在通过分析程序执行的结果预测错误信息,是一种行之有效的错误定位方法.然而,CBFL方法中代码覆盖率的独立统计忽略了程序内存在的复杂控制依赖和数据依赖,从而忽视...基于覆盖率的错误定位(Coverage Based Fault Localization,CBFL)方法旨在通过分析程序执行的结果预测错误信息,是一种行之有效的错误定位方法.然而,CBFL方法中代码覆盖率的独立统计忽略了程序内存在的复杂控制依赖和数据依赖,从而忽视了语句间的语义关系,影响错误定位的准确性.该文借助实例重点分析了基于代码覆盖率所得到的错误可疑度与错误代码的表现关系,指出现有CBFL方法的不足是片面地将基于覆盖率的错误可疑度直接作为错误代码判定的依据;提出程序失效规则及基于覆盖向量的覆盖信息分析模型,并在此模型基础之上,指出高可疑代码与错误代码在执行路径上的覆盖一致性,进而提出用以挖掘与高可疑代码相关联的错误代码的频繁集求解方法.以SIR基准程序为实验对象建立的受控实验结果表明,相比之前的研究,文中方法在一定程度上能够改进错误定位结果.展开更多
文摘Intrusion tolerance system is a new technology of network security. It can provide acceptable or degraded system service when intrusions occur. In this article, the system's basic function, technique and objective are introduced. A kind of state transition model is discussed. The intrusion tolerance architecture based on state the transition model and several vulnerabilities cases are proposed.
文摘Intrusion detection techniques are attracted attention. There are a lot of projects which have their own emphasizes in the aspect now. The basic ideas and techniques of data mining-based intrusion detection and the architecture of a real time data mining-based IDS are discussed Some problems and the future directions are proposed.
文摘基于覆盖率的错误定位(Coverage Based Fault Localization,CBFL)方法旨在通过分析程序执行的结果预测错误信息,是一种行之有效的错误定位方法.然而,CBFL方法中代码覆盖率的独立统计忽略了程序内存在的复杂控制依赖和数据依赖,从而忽视了语句间的语义关系,影响错误定位的准确性.该文借助实例重点分析了基于代码覆盖率所得到的错误可疑度与错误代码的表现关系,指出现有CBFL方法的不足是片面地将基于覆盖率的错误可疑度直接作为错误代码判定的依据;提出程序失效规则及基于覆盖向量的覆盖信息分析模型,并在此模型基础之上,指出高可疑代码与错误代码在执行路径上的覆盖一致性,进而提出用以挖掘与高可疑代码相关联的错误代码的频繁集求解方法.以SIR基准程序为实验对象建立的受控实验结果表明,相比之前的研究,文中方法在一定程度上能够改进错误定位结果.