期刊文献+

服务跳变系统性能的随机Petri网评价 被引量:5

Performance Evaluation for Service Hopping System Using Stochastic Petri Net
下载PDF
导出
摘要 运用随机Petri网理论,给出服务跳变系统的性能评价模型,通过求解同构的连续状态马尔可夫链各状态稳定概率,推理影响服务跳变系统的平均时延和吞吐率等主要性能指标,分析了与同步时延、数据迁徙效率的关系,对于研究主动网络对抗应用的服务跳变系统性能具有理论意义. A performance evaluation model is presented for service hopping system using stochastic Petri Net. Through obtaining the steady-state probabilities of all states in the underlying continuous-time Markov chain, theoretic analysis is performed for the parameters of average latency and throughput, which are crucial to service hopping system. Thereafter the relationships between the two parameters and the efficiency of synchronization and data swapping are discussed. Our work is useful in theory for service hopping exploits of active cyber-defense.
出处 《南开大学学报(自然科学版)》 CAS CSCD 北大核心 2009年第1期72-75,共4页 Acta Scientiarum Naturalium Universitatis Nankaiensis
基金 国家自然科学基金(60577039) 天津市科技发展计划(05YFGZGX24200)
关键词 随机PETRI网 性能评价 服务跳变 吞吐率 时延 stochastic Petri Net performance evaluation service Hopping throughput Latency
  • 相关文献

参考文献10

  • 1Lee H C J, Thing V L L. Port Hopping for Resilient Networks[C]. IEEE: Proe. 60th Vehicular Technology Conference, Sept 26--29, 2004. Los Angeles, USA. Washington.. IEEE CS Press, 2004.. 3 291--3 295.
  • 2Atighetehi M, Pal P, Webber F, et al. Adaptive use of network-centric mechanisms in cyber-dcfense[C]. IEEE: Proc. 6th Int'l Syrup Object-Oriented Real-Time Distributed Computing, May 14--16, 2003, Hakodate, Japan. Washington: IEEE CS Press, 2003: 183--192.
  • 3Sifalakis M, Schmid S, Hutchison D. Network address hopping: a mechanism to enhance data protection for packet communications[C]. IEEE International Conference on Communications, May 16-- 20, 2005, Seoul, Korea. Washington: IEEE CS Press, 2005:1 518--1 523.
  • 4Bedishiy G, Herzberg A, Keidar L. Keeping denial-of-service attagkers in the dark[C]. EATCS: 19th International Symposium on Distributed Computing, Sept 26-- 29, 2005.. Cracow Poland. Berlin: Springer-Verlag, 2005, LNCS 3 724.. 18--31.
  • 5Shi LY, Jia C F, Lu S W, et al. Port and address hopping for active eyber-defense[C]. IEEE.. Pacific Asia Workshop on Intelligence and Security informatics, Apr 11-- 12, 2007, Chengdu China. Berlin : Springer-Veriag, 2007 : LHCS 4 430: 295--300.
  • 6Shi LY. Jia C F, Lu S W. DoS Evading Mechanism upon service hopping[C]. IEEE:IFIP International Conference on Neiwork and Parallel Computing, Sept 18--21, 2007, Dalian, China. Washington: IEEE CS Press. 2007:119-- 122.
  • 7石乐义,贾春福,吕述望.基于端信息跳变的主动网络防护研究[J].通信学报,2008,29(2):106-110. 被引量:45
  • 8Petri C A. Kommunikation mit Automaten[D]. Bonn: University of Bonn, Institut fur Instrumentelle Mathematik, 1962.
  • 9Vautberin J. Calculation of Semi Flows for Pr/T Systems[C]. IEEE: International Workshop on Petri Nets and Performance Models, Aug 24 26, 1987, Madison, Wisconsin, USA. Washington: IEEE CS Press, 1987: 174-- 183.
  • 10Trivedi K S. Probability and Statistics with Reliability, Queuing, and Computer Science Applications[M]. New Jersey : Prentice-Hall Inc, 1982.

二级参考文献7

  • 1李树军.基于协议转变的拒绝服务攻击技术的研究[J].计算机应用,2006,26(10):2323-2325. 被引量:4
  • 2LEE H, THING V. Port hopping for resilient networks[A]. Conf 60th IEEE Vehicular Technology[C]. 2004.3291-3295.
  • 3BADISHIY G. HERZBERG A, KEIDAR I, et al. Keeping denial-of-service attackers in the dark[A]. Int Symp Distributed Computing (DISC)[C]. Springer-Vedag, 2005.18-31.
  • 4SIFALAKIS M, SCHMID S, HUTCHISON D. Network address hopping: a mechanism to enhance data protection for packet communications[A]. ICC 2005[C]. 2005.1518 - 1523.
  • 5BBN Technologies. Applications that participate in their own defense[EB/OL].http://apod.bbn.com. 2002.
  • 6ATIGHETCHI M, PAL P, WEBBER E et al. Adaptive use of net- work-centric mechanisms in cyber-defense[A]. Proc 6th IEEE Int Syrup Object-Oriented Real-Tune Distributed Computing [C]. 2003. 183-192.
  • 7FERRARI L. The aglets-2.0.2 user's manual[EB/OL], http://aglets. sourceforge.net. 2004.

共引文献44

同被引文献36

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部