Using non-deterministic finite automaton to research intrusion tolerant system

  • Authors:
  • Cuicui Zhang;Xiaoyao Xie

  • Affiliations:
  • Key Laboratory of Information and Computing Science of Guizhou Province, Guizhou Normal Univ., Guiyang, China and School of Mathematics & Computer Science, Guizhou Normal Univ., Guiyang, China;Key Laboratory of Information and Computing Science of Guizhou Province, Guizhou Normal University, Guiyang, China

  • Venue:
  • ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Intrusion Tolerant is a new network information security technology after firewall, access control and intrusion detection. When a network system is attacked by illegal intrusion, intrusion tolerant system is capable of self-diagnosing, recovering, reconstruction and continuing to provide service to legitimate clients in the presence of intrusions. It is the last defense line of system after the intruder successfully bypassed firewall, intrusion detection or access permission control. Based on non-deterministic finite automaton, the working method after attacked is described, and a different way to develope intrusion tolerant technology is provided.