Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Using non-deterministic finite automaton to research intrusion tolerant system

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Cuicui Zhang ; Key Lab. of Inf. & Comput. Sci. of Guizhou Province, Guizhou Normal Univ., Guiyang, China ; Xiaoyao Xie

Intrusion Tolerant is a new network information security technology after firewall, access control and intrusion detection. When a network system is attacked by illegal intrusion, intrusion tolerant system is capable of self-diagnosing, recovering, reconstruction and continuing to provide service to legitimate clients in the presence of intrusions. It is the last defense line of system after the intruder successfully bypassed firewall, intrusion detection or access permission control. Based on non-deterministic finite automaton, the working method after attacked is described, and a different way to develope intrusion tolerant technology is provided.

Published in:

Anti-counterfeiting, Security, and Identification in Communication, 2009. ASID 2009. 3rd International Conference on

Date of Conference:

20-22 Aug. 2009