全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电子学报  2013 

网络化软件异常行为传播研究

DOI: 10.3969/j.issn.0372-2112.2013.10.031, PP. 2074-2081

Keywords: 网络化软件,异常行为,传播模型,系统漏洞

Full-Text   Cite this paper   Add to My Lib

Abstract:

软件中的漏洞不可避免,研究由漏洞引发的网络化软件的异常行为传播机制,为人们把握异常行为传播规律并采取相应的牵制措施提供了依据.根据异常行为在不同粒度的软件实体中传播的情形,提出了影响异常行为传播的三类因素:传播概率、交互频率和连接率,并给出了相关定义及其计算方法;结合仓室模型和个体模型及上述三因素,构建了描述软件异常行为传播过程的模型,提高了模型的表达能力,增强了模型的完备性和准确率.将异常行为传播分析方法应用于典型的网络化软件系统,通过实验计算出各参数及其变化规律,验证了该传播机制的正确性和可行性.

References

[1]  Fang J Q,Wang X F,Zheng Z G.Research of dynamical complexity of nonlinear networks[J].Complex Systems and Complexity Science,2010,7(2-3):5-9.
[2]  何成万,张立军,张慧.基于元数据和反射的面向方面软件演化方法[J].电子学报,2011,39(8):1771-1777. He Cheng-wan,Zhang Li-jun,Zhang Hui.An approach to aspect-oriented software evolution based on metadata and reflection[J].Acta Electronica Sinica,2011,39(8):1771-1777.(in Chinese)
[3]  Sureka A.Learning to classify bug reports into components[J].Objects,Models,Components,Patterns,2012,73(4):288-303.
[4]  林闯,王元卓,杨扬,曲扬.基于随机Petri网的网络可信赖性分析方法研究[J].电子学报,2006,34(2):322-332. Lin Chuang,Wang Yuan zhuo,Yang Yang,Qu Yang.Research on network dependability analysis methods based on stochastic Petri Net[J].Acta Electronica Sinica,2006,34(2):322-332.(in Chinese)
[5]  Vinay Singh,Vandana Bhattacherjee,Sandeep Bhattacharjee.An analysis of dependency of coupling on software defects[J].ACM SIGSOFT Software Engineering Notes,2012,37(1):1-6.
[6]  Hiller,M,Jhumka,A,Suri,N.Epic.Profiling the propagation and effect of data errors in software[J].IEEE Transactions Computers,2004,53(5):512-530.
[7]  Grunske L,Neumann R.Quality improvement by integrating non-functional properties in software architecture specification[J].EASY,2002,2(1):23-32.
[8]  P.Popic,D.Desovski,W.Abdelmoez.Error propagation in the reliability analysis of component-based systems [A].Proceedings of the 16th IEEE International Symposium on Software Reliability Engineering [C].Chicago:Academic Press,2005.10-15.
[9]  Chidamber S R,Kemerer C F.A metrics suite for object oriented design[J].IEEE Transactions on Software Engineering,1994,20(6):476-493.
[10]  马于涛,何克清,李兵,刘婧.网络化软件的复杂网络特性实证[J].软件学报,2011,22(3):381-407. Ma Yu-Tao,He Ke-qing,Li Bing,Liu Jing.Empirical study on the characteristics of complex networks in networked software[J].Journal of Software,2011,22(3):381-407.(in Chinese)
[11]  Hongyu Zhang.On the distribution of software faults[J].IEEE Transactions on Software Engineering,2008,34(2):301-302.
[12]  陈平,韩浩,沈晓斌.基于动静态程序分析的整形漏洞检测工具[J].电子学报,2010,38(8):1741-1747. Chen Ping,Han Hao,Shen Xiao-bin.Detecting integer bugs based on static and dynamic program analysis[J].Acta Electronica Sinica,2010,38(8):1741-1747.(in Chinese)
[13]  Monson J S,Wirthlin M,Hutchings B.A fault injection analysis of Linux operating on an FPGA-embedded platform[J].International Journal of Reconfigurable Computing,2012,2012(1):7-18.
[14]  彭成,杨路明,满君丰.网络化软件交互行为动态建模[J].电子学报,2013,41(2):314-320. Peng Cheng,Yang Lu-ming,Man Jun-feng.Dynamic modeling of networked software interactive behavior[J].Acta Electronica Sinica,2013,41(2):314-320.(in Chinese)
[15]  Yukihiko Nakata,Philipp Getto,Anna Marciniak-Czochra,Tomás Alarcón.Stability analysis of multi-compartment models for cell production systems[J].Journal of Biological Dynamics,2012,6(1):2-18.
[16]  Alsaade F,Fouda Y,Khan A R.Efficient cellular automata algorithm for template matching[J].Journal of Artificial Intelligence,2012,5(3):122-129.
[17]  苏璞睿,冯登国.基于进程行为的异常检测模型[J].电子学报,2006,34(10):1809-1811. Su Pu-rui,Feng Deng-guo.An anomaly intrusion detection model based on nonhierarchical clustering[J].Acta Electronica Sinica,2006,34(10):1809-1811.(in Chinese)
[18]  徐建军,谭庆平,熊磊,叶俊.一种针对软错误的程序可靠性定量分析方法[J].电子学报,2011,39(3):675-679. Xu Jian-jun,Tan Qing-ping,Xiong Lei,Ye Jun.A quantitative approach for program reliability analysis of soft errors[J].Acta Electronica Sinica,2011,39(3):675-679.(in Chinese)
[19]  Wei-Feng Pan,Bing Li,Yu-Tao Ma.Measuring structural quality of object-oriented software via bug propagation analysis on weighted software networks[J].Journal of Computer Science and Technology,2010,25(6):1202-1213.
[20]  Avizienis A,Laprie J,Randell B,et al.Basic concepts and taxonomy of dependable and secure computing[J].Nato Security through Science Series E Human and Societal Dynamics,2007,23(10):11-33.
[21]  Elmqvist J,Nadjm-Tehrani S.Safety-oriented design of component assemblies using safety interfaces[J].Electronic Notes in Theoretical Computer Science,2007,182:57-72.
[22]  Rugina A E,Kanoun K,Kaaniche M.An architecture-based dependability modeling framework using AADL[J].arXiv preprint arXiv:2007,3(10):0704-0865.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133