期刊文献+

一种基于权值的大规模分布式系统结构脆弱性分析算法 被引量:8

A Structural Vulnerability Analysis Algorithm for Large-Scale Distributed System
下载PDF
导出
摘要 结构脆弱性是大规模分布式系统的典型脆弱性类型之一.针对大规模分布式系统实体间复杂的依赖关系和冗余备份机制,构建了实体拓扑模型.该模型采用简单有向图描述实体间依赖关系,采用故障容忍机制刻画节点间的冗余关系,并引入权值刻画节点或边失效对于业务流程的影响.在此基础上,提出了基于权值的大规模分布式系统结构脆弱性分析算法,该算法通过权值计算和基于故障传递的剪枝方法发现并验证结构脆弱性.通过算法分析和实现充分验证了算法的有效性. As large-scale distributed system plays an increasingly important role in such fields as national security,critical infrastructure and social life,its vulnerability analysis problem has become a growing focus nowadays.Because of wide area deployment,heterogeneity,dynamism,incapable centralized control and other characteristics,structural vulnerability is a typical type of vulnerabilities on large-scale distributed system.Aiming at the complex relation between entities and redundancy mechanism in large-scale distributed system,a new entity topology model is proposed.In the model,the simple digraph is used to describe the relation between entities;the fault tolerance mechanism is put forward to describe the redundancy of entities;and weight is introduced to score the influence of the entity or link failure on system function.Based on the entity topology model,a structural vulnerability analysis algorithm based on weight is put forward,which discovers the structural vulnerabilities by computing weight of every entity and link,and validates them by graph pruning.Experimental results by analyzing,implementation and evaluation,show that the algorithm can effectively discover the structural vulnerability of large-scale distributed system including single point failure node or link and combination failure of nodes and links.
出处 《计算机研究与发展》 EI CSCD 北大核心 2011年第5期906-912,共7页 Journal of Computer Research and Development
基金 国家"八六三"高技术研究发展计划基金项目(2009AA01Z421)
关键词 大规模分布式系统 结构脆弱性 实体拓扑模型 故障容忍 脆弱性分析 large-scale distributed system structural vulnerability entity topology module fault tolerance vulnerability analysis
  • 相关文献

参考文献10

  • 1Helsinger A, Ferguson W, Lazarus R. Exploring largescale, distributed system behavior with a focus on information assurance [C] //Proc of DARPA Information Survivability Conference & Exposition II. Piscataway, NJ: IEEE, 2001: 273-286.
  • 2羌卫中,邹德清,金海.网格环境中证书和策略的隐私保护机制研究[J].计算机研究与发展,2007,44(1):11-19. 被引量:11
  • 3Lu Z, Yu Y, Woodman N J, et al. A theory of structural vulnerability [J]. The Structural Engineer, 1999, 77 (18) : 17-24.
  • 4Agarwal J, Blockley D I, Woodman N J. Vulnerability of 3D trusses [J]. Structural Safety, 2001, 23(3): 203-220.
  • 5Albert R, Albert I, Nakarado G L. Structural vulnerability of the North American power grid [J]. Physics Review, 2004, 69(2): 25-35.
  • 6Rosas-Casals M, Valverde S, Sole R. Topological vulnerability of the European power grid under errors and attacks [J]. International Journal of Bifurcations and Chaos, 2007, 17(7) : 2465-2475.
  • 7Jenelius E, Petersen T, Mattson L. Importance and exposure in road network vulnerability analysis [J].Transportation Research, 2008, 40(7): 537-560.
  • 8DallAsta L, Barrat A, Barthelemy M, et al. Vulnerability of weighted networks [J]. Journal of Statistical Mechanics, 2006, 4:4-6.
  • 9Farago A. A graph theoretic model for complex network failure scenarios [C] //Proc of INFORMS. Dallas, USA.. Dallas Informs, 2006:2-3.
  • 10Kurant M, Thiran P. Survivable mapping algorithm by ring trimming (SMART) for large IP-over-WDM networks [C]// Proc of BroadNets 2004. Piscataway, NJ: IEEE, 2004: 25- 29.

二级参考文献18

  • 1K Seamons,M Winslett,T Yu,et al.Protecting privacy during on-line trust negotiation[C].In:Proc of the 2nd Workshop on Privacy Enhancing Technologies.Berlin:Springer-Verlag,2002.129-143
  • 2T YuAutomated trust estab.lishment in open systems:[Ph D dissertation][D].Urbana,USA:University of Iuinois,2003
  • 3W Winsborough,N Li.Protecting sensitive attributes in automated trust negotiation[C]In:Proc of the 2002 ACM Workshop on Privacy in the Electronic Society.New York:ACM Press,2002.41-51
  • 4W Winsborough,N Li.Towards practical automated trust negotiation[C].In:Proc of the 3rd Int'l Workshop on Policies for Distributed Systems and Networks.Los Alamitos,CA:IEEE Computer Society Press,2002.92-105
  • 5T Okamoto,S Uchiyama.A new public-key cryptosystem as secure as factoring[C].In:Advances in Cryptology:EUROCRYPT'98.Berlin:Springer-Verlag,1998.308-318
  • 6P Paillier.Public-key cryptosystems based on composite degree residuosity classes[C].In:Advances in Cryptology:EUROCRYPT'99.Berlin:Springer-Verlag,1999.223-238
  • 7I Damgard,M JurikA length-flexible threshold cryptosystem with applications[C].In:Proc of the 8th Australasian Conf on Information Security and Privacy.Berlin:Springer-Verlag,2003.350-364
  • 8A C Yao.How to generate and exchange secrets[C].In:Proc of the 27th IEEE Symp on Foundations of Computer Science (FOCS).Los Alamitos,CA:IEEE Computer Society Press,1986.162-167
  • 9A C Yao.Protocols for secure computations[C].In:Proc of the 23rd Symp on Foundations of Computer Science (FOCS).Los Alamitos,CA:IEEE Computer Society Press,1982.160-164
  • 10R Canetti,U Feige,O Goldreich,et al.Adaptively Secure multi-party computation[C].In:Proc of the 28th ACM Symp on Theory of Computing (STOC).New York:ACM Press,1996.639-648

共引文献10

同被引文献62

  • 1谭跃进,吴俊,邓宏钟.复杂网络中节点重要度评估的节点收缩方法[J].系统工程理论与实践,2006,26(11):79-83. 被引量:259
  • 2张永铮,方滨兴,迟悦,云晓春.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145. 被引量:76
  • 3羌卫中,邹德清,金海.网格环境中证书和策略的隐私保护机制研究[J].计算机研究与发展,2007,44(1):11-19. 被引量:11
  • 4Helsinger A,Ferguson W,Lazarus R.Exploring large-scale,distributed system behavior with a focus on informationassurance[C]//Proceedings DARPA Information SurvivabilityConference&Exposition II.2001,2:273-286.
  • 5Hoheisel A,Mueller S,Schnor S.Fine-grained securitymanagement in a service-oriented grid architecture[C]//Proceedings of the Cracow Grid Workshop'06.Cracow,Poland,2006.
  • 6Luna J,Flouris M,Marazakis M,et al.An analysis ofsecurity services in grid storage systems[C]//Proceedingsof the CoreGRID Workshop on Grid Middleware.Dresden,Germany,2007.
  • 7Welch V,Siebenlist F,Foster I,et al.Security for gridservices[C]//Proceedings of 12th IEEE InternationalSymposium on High Performance Distributed Computing.IEEE Computer Society Press,2003:48-57.
  • 8US Computer Emergency Readiness Team.US-CERT VulnerabilityNotes Database[EB/OL].www.kb.cert.org/vuls/.
  • 9Gustedt J,Jeannot E,Quinson M.Experimental validationin large-scale systems:A survey of methodologies[J].Parallel Processing Letters,2009,19:399-418.
  • 10Quetier B,Cappello F.A survey of grid research tools:Simulators,emulators and real life platforms[C]//Proceedings of the 17th IMACS World Congress(IMACS).2005:123-134.

引证文献8

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部