Theoretical Analysis and Realistic Implementation of Secure Servers Switching System

作者: Yu-Hong Chen , Kuang-Tse Chen , Lei Wang

DOI: 10.1007/978-3-642-35473-1_18

关键词:

摘要: Protective measures for server invasions should not solely focus on events before an invasion occur. Recording and monitoring successful with endless streams of security mechanisms be employed attentively to reduce the loss data due intrusion attacks any system. This paper implementation embedded system technology developed in a host control module group which entire achieves coordinated allocation resources combined larger number hosts designed meet demand. The switching uses load balancing prevent failures, errors, interruptions, accompanied ever so important theory fault-tolerance grace degradation purposes.

参考文章(5)
Rogier Dittner, David Rule, An Introduction to Virtualization The Best Damn Server Virtualization Book Period. pp. 1- 35 ,(2007) , 10.1016/B978-1-59749-217-1.00001-0
Teresa F. Lunt, A survey of intrusion detection techniques Computers & Security. ,vol. 12, pp. 405- 418 ,(1993) , 10.1016/0167-4048(93)90029-5
Wang Yu-Sheng, Lei Wang, Secure Server Switching System international conference on computer engineering and applications. ,vol. 1, pp. 224- 228 ,(2010) , 10.1109/ICCEA.2010.51
E. Jonsson, T. Olovsson, A quantitative model of the security intrusion process based on attacker behavior IEEE Transactions on Software Engineering. ,vol. 23, pp. 235- 245 ,(1997) , 10.1109/32.588541
J.E. Smith, Ravi Nair, The architecture of virtual machines IEEE Computer. ,vol. 38, pp. 32- 38 ,(2005) , 10.1109/MC.2005.173