期刊文献+

基于随机Petri网的容灾系统安全性分析 被引量:3

Security analysis of disaster recovery systems using Stochastic Petri Nets
原文传递
导出
摘要 该文采用基于状态的随机模型对容灾系统进行安全性分析。通过构建一个通用的远程容灾系统模型,使用随机回报网SRN描述了整个系统模型的备份与恢复过程,包括SRN模型中的各个位置、变迁的含义,对该系统模型进行建模。使用随机Petri网软件包SPNP对所建立模型进行仿真,通过对不同概率参数的设定得出系统可用性的量化值。仿真实验结果表明:不同的参数变化对系统可用性的影响不同,在本地备份中失效检测对于系统可用性的影响最大,远程备份中的失效检测对于系统可用性的影响最小。 The security of disaster recovery systems was analyzed using Stochastic Petri Nets.A generic remote disaster recovery model was constructed with system backup and recovery using Stochastic Petri Nets,including finding the meanings of places and transitions.Then,simulation was made using Stochastic Petri Nets software package(SPNP).Value of the availability can be obtained by the various probability parameters setting.Simulations show that probability parameters have different effects on the system availability.Failure of the local backup has the greatest influence on the system availability while failure of the remote backup has the least influence on the system availability.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2011年第10期1281-1286,共6页 Journal of Tsinghua University(Science and Technology)
基金 网络与交换技术国家重点实验室开放课题资助项目(SKLNST-2008-1-12) 国家自然科学基金资助项目(No.90818016) 中国博士后科学基金资助项目(20090460245)
关键词 容灾系统 安全性 PETRI网 随机回报网SRN disaster recovery security Petri Net stochastic reward net(SRN)
  • 相关文献

参考文献12

  • 1Schneier B. Secrets and Lies: Digital Security in a Networked World [M]. New York, USA: John Wiley & Sons, 2000.
  • 2Tritilanunt S, Boyd C, Foo E, Gonzalez N J. Using coloured Petri Nets to simulate DoS-resistant protocols [C]// Proceedings of the 7th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools. Aarhus, USA: IEEE Press, 2006:261-280.
  • 3XU Yang, XIE Xiaoyao. Modeling and analysis of security protocols using colored Petri Nets [J]. Journal of Computers, 2011, 6(2) : 19 - 27.
  • 4WANG Dazhi, Bharat B M, Kishor S. Security analysis of SITAR intrusion tolerance system [C]// Proceedings of the 2003 Workshop on Survivable and Self Regenerative Systems, in Association with 10^th ACM Conference on Computer and Communications Security 2003. New York,.
  • 5WANG Feiyi, Jou F, GONG Fengmin, et al. SITAR: Scalable intrusion tolerance architecture for distributed services [C]// Proceedings of the IEEE Second SMC Information Assurance Workshop. West Point, New York, USA; IEEE Press, 2001: 38-45.
  • 6Singh S, Cukier M, Sanders W H. Probabilistic validation of an intrusion tolerant replication system [C]// Proceedings of the International Conference on Dependable Systems and Networks, San Francisco, USA: IEEE Press, 2003: 616-624.
  • 7Oupta V, Lam V V, Ramasamy H V, et al. Dependability and performance evaluation of intrusion tolerant server architectures [C]// Proceedings of the 1^st Latin American Symposium on Dependable Computing. Sao Paulo, Brazil: IEEE Press, 2003: 81 - 101.
  • 8殷丽华.网络系统的入侵容忍技术研究[D].哈尔滨:哈尔滨工业大学,2006.
  • 9胡晓辉,党建武,周兴社.基于着色Petri网分布式系统的行为建模方法[J].兰州交通大学学报,2004,23(3):26-29. 被引量:5
  • 10姜浩,董逸生.一种基于扩展时间Petri网的工作流时间性能评价方法[J].计算机研究与发展,2005,42(5):849-855. 被引量:13

二级参考文献13

  • 1Kurt Jensen.An introduction to the practical use of colored petri nets[M].New York:Springer-Verlag ,1997.
  • 2John Anil Saldhana , Sol M.Shatz . UML Diagrams to object petri net models: An approach for modeling and analysis[EB/OL]. http://www.cs.uic.edu/-shatz/papers/ijseke01,2000-06-15.
  • 3Mohammed Elkoutbi.Modeling interactive systems with hierarchical colored petri nets[EB/OL] .http://www.iro.umontreal.ca/-elkoutbi,2001-04-26.
  • 4Rémi Bastide, Ousmane Sy, Philippe Palanque . Formal specification and prototyping of CORBA systems[EB/OL]. http://www.ifs.uni-linz.ac.at/-ecoop/cd/papers/1628/16280474.2001-12-3.
  • 5Khodakaram Salimifard, Mike Wright. Petri net based modeling of workflow systems: An overview. European Journal of Operational Research, 2001, 134(3): 218~230.
  • 6W.M. P. van der Aalst, B. F. van Dongen. Discovering workflow performance models from timed logs. In: LNCS 2480.New York: Springer-Verlag, 2002. 45~63.
  • 7Lin Chuang, Qu Yang, Ren Fengyuan, et al. Performance equivalent analysis of workflow systems based on stochastic Petri net models. In: LNCS 2480. New York: Springer-Verlag,2002. 64~79.
  • 8W.M. P. van der Aalst. The application of Petri nets to workflow management. The Journal of Circuit, Systems and Computers, 1998, 8(1): 22~66.
  • 9Jiang Hao, Dong Yisheng, Luo Junzhou. An effective approach to verifying the correctness of workflow process models based on Petri net. Journal of Southeast University, 2002, 18(4): 361~366.
  • 10H.R. Oh, W. H. Chung, M. Kim. Transformation of timed Petri nets for response time estimation. Computers and Digital Techniques, 1990, 137(1): 74~80.

共引文献16

同被引文献32

  • 1林闯,王元卓,杨扬,曲扬.基于随机Petri网的网络可信赖性分析方法研究[J].电子学报,2006,34(2):322-332. 被引量:43
  • 2HOLLWAY B A, NENMMAN P G. Survivable computer communication systems: the problem and working group recommendations JR] Washington: US Army Research Laboratory, 1993.
  • 3FISHER J, LINGER R. Survivability: protecting your critical systems [J]. IEEE Journal of Internet Com- puting, 1999 (6): 55-63.
  • 4KNIGHT J C, SULLIVAN K J. On the definition of sur- vivability [R]. CS-TR-33-00, Department of Com- puter Science, University of Virginia, Dec, 2000.
  • 5DUGAN J B, TRIVEDI K S, GEIST R M, NICOLA V F. Extended stochastic Petri nets: applications and analysis[C]//Proceedings of the Tenth International Symposium on Computer Performance Modeling, Measurement and Evaluation, Amsterdam, Nether- lands, 1984: 507-519.
  • 6ZHANG Haihui, CHEN Yongfeug. Network security analysis based on reliability model of new stochastic Petri net [C]//Proceedings of International Confer- ence of China Communication and Information Tech- nology (ICCCIT2010), Guangxi, China, 2010: 278- 282.
  • 73GPP TS 23.228, Release 9.IP multimedia subsys- tem (IMS) [S]. 2010.
  • 83CPP TS 24.229, Release 9.IP multimedia call con- trol protocol based on session initiation protocol (SIP) and session description protocol (SDP) [S]. 2010.
  • 9杜红兵.建筑火灾风险评价中定性指标的模糊灰色评价方法研究[J].太原理工大学学报,2007,38(5):441-444. 被引量:7
  • 10Schneier B.Secrets and Lies:Digital Security in a Networked World[M].New York,USA:John Wiley & Sons,2000.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部