期刊文献+

用于网络可信性评测的事件注入技术仿真研究 被引量:2

Simulation Research of Event Injection Technology for Network Dependability Evaluation
下载PDF
导出
摘要 计算机网络系统的可信性评测是一个综合、复杂的研究问题,而在故障注入的基础上发展而来的事件注入技术,可以较好地应用于计算机网络系统可信性评测的研究。根据事件注入技术的原理,设计了一个用于网络可信性评测的仿真模型,并进行了相关仿真实验研究,最后讨论了该技术在计算机网络可信性评测中应用的问题。 Dependability evaluation on computer network is an integrated and complex research problem. Developing from fault injection, event injection can evaluate dependability of computer network system better. According to the principle of event injection, a simulation model for network dependability evaluation was designed and correlative simulations were carried out. At last, aoolication of event injection for dependability evaluation on computer network was discussed.
出处 《系统仿真学报》 EI CAS CSCD 北大核心 2008年第10期2713-2717,共5页 Journal of System Simulation
基金 高等学校博士学科点专项科研基金项目(20050217007)
关键词 可信性评测 事件注入 DDOS LOADRUNNER dependability evaluation event injection DDoS LoadRunner
  • 相关文献

参考文献11

  • 1Yves Deswarte, Karama Kanoun, Jeam-Claude Laprie. Diversity against accidental and deliberate faults. [C]//PRDC'99, Hong Kong, 1999. P. Amman, Eds., IEEE CS Press, 1999: 171-182.
  • 2Deavours Daniel Duane. Formal specification of the Mobius modeling framework [D]. Urbana, USA: University of Illinois at Urbana Champaign, 2001.
  • 3RMLR Carmo, LR de Carvalho, E de Souzae Silva, et al. TANGRAM-II: A performability modeling environment tool. [C]// The 9^th Int'l Conf on Computer Performance Evaluation, St Malo, France, 1997. London UK: Springer-Verlag, 1997: 6-18.
  • 4Yangyang Yu. A perspective on the state of research on fault injection techniques [D]. Pittsburgh, USA: Carnegie Mellon University, 2001.
  • 5Huiqiang Wang, Yonggang Pang. Evaluation of network dependability using event injection. [C]//Proc of the APWeb 2006 Int'l Workshop: XRA, IWSN, MEGA, and ICSE. Berlin: Springer, 2006: 991-998.
  • 6J C Laprie. Dependable Computing and Fault Tolerance: Concepts and Terminology. [C]//Proc. 15th IEEE Int'l Syrup. Fault-Tolerant Computing (FTCS-15), 1985. USA: IEEE, 1985: 2-11.
  • 7J C Laprie. Dependability: basic concepts and terminology-in English, French, German, Italian and Japanese. In Dependable Computing and Fault Tolerance. Vienna, Austria: Springer-Verlag, 1992: 265.
  • 8Department of defense standard. The rainbow books. [EB/OL]. ( 1983-08-15) [2006-05-10].http://www.fas.org/irp/nsa/rainbow/std001 .htm.
  • 9Bill Gates. Trustworthy Computing. [EB/oL]. (2002431-17) [2006433-20]. http://www.wired.com/techbiz/media/news/2002/01/49826.
  • 10陈左宁.大规模计算机系统可信性技术的研究[J].高性能计算技术,2004,0(6). 被引量:4

共引文献3

同被引文献17

  • 1李志刚,周兴社.传感器网络[J].计算机应用研究,2004,21(12):9-12. 被引量:16
  • 2陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 3马华东,陶丹.多媒体传感器网络及其研究进展[J].软件学报,2006,17(9):2013-2028. 被引量:186
  • 4赫建营,晏海华,刘超,金茂忠.一种有效的Web性能测试方法及其应用[J].计算机应用研究,2007,24(1):275-277. 被引量:28
  • 5EDWARD H. Attacks evolving toward exploiting network services [ EB/OL]. (2003 - 12 -02) [2008 -05 - 15]. http://searchsecurity. techtarget, corn/news/article/0, 289142, sidl4 gei939419,00. html.
  • 6HANEMANN A, SCHMITZ D, SAILER M. A framework for failure impact analysis and recovery with respect to service level agreements [ C]// Proceedings of the 2005 IEEE International Conference on Services Computing. Piscataway: IEEE Computer Society, 2005:49 -58.
  • 7KRUGEL C, TOTH T, KIRDA E. Service specific anomaly detection for network intrusion detection [ C]// Proceedings of the 2002 ACM symposium on Applied Computing. New York: ACM Press, 2002:201 -208.
  • 8YAU S S. GONG H, HUANG D, et al. Automated agent synthesis for situation in service-based systems [ C ]// COMPSAC'06: Proceedings of the 30th Annual International Computer Software and Applications Conference. Chicago: IEEE Computer Society, 2006:503-512.
  • 9DoD Muhidiseiplinary University. Adaptable secure situation-aware service-based (AS3) systems[ EB/OL]. [2009 -02 -24]. http:// dpse. eas. asu. edu/AS3/index, shtml.
  • 10AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y, et al. Wireless sensor networks:a survey[J].Computer Networks, 2002,38(4) : 393-422.

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部