期刊文献+

一种基于自主配置的网络可生存性增强算法 被引量:4

An Improved Algorithm for Network Survivability Based on Autonomous Configuration
下载PDF
导出
摘要 基于中心极限定理和假设检验理论,通过比较当前关键服务请求的服务响应时间与该关键服务历史平均服务响应时间置信区间的关系,提出了一种增强网络可生存性的自主配置算法(NSAC).该算法对关键服务执行过程中的不同时段分两种情况采取适时的资源剥夺、服务迁移或者服务降级等策略,最大限度地保证关键服务请求在用户期望的截止时间内完成,整个配置过程对用户透明.仿真试验表明,本文提出的算法在网络重负载和轻负载情况下都可以更好地改善系统关键服务的可生存性. Through comparing the relationship between current response time of key service request and confidence interval of its history average response time, this paper presented an autonomous configuration algorithm for improving network survivability (abbreviated as NSAC) based on central limit theorem and hypothesis testing theory. According to different durations in the process of key services execution, the algorithm dynamically dealt with two instances for taking the timely policies such as resource reconfig uration, service degradation or service roaming, etc. As a result, key services could be accomplished far thest within its deadline expected by users. Moreover, the whole configuration process is transparent for users. Simulation experiments show that the proposed method can improve the survivability of key service effectively under the circumstance of the network light load and overload.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2006年第5期582-586,共5页 Journal of Wuhan University:Natural Science Edition
基金 高等学校博士学科点专项科研基金(20050217007) 武备预研基金(51416060104CB0101)资助项目
关键词 网络可生存性 关键服务 自主配置 置信区间 network survivability key service autonomous configuration confidence interval
  • 相关文献

参考文献10

  • 1Westmark R. A Definition for Information System Survivability[C]//Proceeding of the 37th Hawaii Internal Conference on System Sciences ( HICSS' 04).New York: IEEE Press, 2004:2086-2096. 被引量:1
  • 2Ellison R J, Fisher D A, Linger R C,et al. Survivable Network Systems: An Emerging Discipline [R]. Software Engineering Institute: Carnegie Mellon University, November 1997. 被引量:1
  • 3Liu Peng. Research Directions in Survivable Systems and Networks[EB/OL]. [2006-02-10]. http://old.is.ac.cn/ pliu-talk-beijing-2. ppt. 被引量:1
  • 4Fisher J, Linger R. Survivability: Protecting Your Critical Systems [J]. Internet Computing ,1999,3(6):55-63. 被引量:1
  • 5Knight J C, Sullivan K J, Matthew C,et al. Surviva-bility Architectures.. Issues and Approaches [EB/OL]. [2006-01-08]. http://www.cs.virginia.edu/-jck/ publications/discex2000.pd f . 被引量:1
  • 6Richard C L, Howard F L. Life-Cycle Model.s for Survivable Systems[R]. Sledge: CMU/SEI, October,2002. 被引量:1
  • 7Zhang Y G, Vin H, Alvisi L. Heterogeneous Networking : A New Survivability Paradigm[C]//Proceedingsof the 10th New Security Paradigms Workshop.Cloudcroft : New Mexico, 2001:33-39. 被引量:1
  • 8刘妍,包秀国,张宏莉,张绍瑞.基于Tabu算法的分布式系统可生存性增强[J].计算机工程与应用,2005,41(19):128-131. 被引量:3
  • 9黄遵国,卢锡城,胡华平.生存能力技术及其实现案例研究[J].通信学报,2004,25(7):137-145. 被引量:20
  • 10王田,杨士中.Web服务器的负荷状态检测技术[J].小型微型计算机系统,2005,26(3):532-535. 被引量:1

二级参考文献27

  • 1包秀国,胡铭曾,张宏莉,张绍瑞.两种网络安全管理系统的生存性定量分析方法[J].通信学报,2004,25(9):34-41. 被引量:27
  • 2何德全.互联网环境下的突发危机管理[A]..全国网络与信息安全技术研讨会主题报告[C].北京,2003.. 被引量:1
  • 3KNIGHT J C, et al. Survivability architectures[EB/OL]. http://www.cs.virginia.edu/~surviv/research/survirve arch/, 2000. 被引量:1
  • 4ELLISON R J, et al. Survivability: protecting your critical system[EB/OL]. http://www.sei.cmu.edu/organization/programs/nss/ protect-critical-systems.html. 被引量:1
  • 5LINGER R C, et al. Requirements definition for survivable network systems[EB/OL]. http://www.sei.cmu.edu/ 97icre.pdf, 1999. 被引量:1
  • 6ZHANG Y G, VIN H, ALVISI L. Heterogeneous Networking: A New Survivability Paradigm, NSPW'01 [R]. Cloudcroft, New Mexico, USA,2001. 被引量:1
  • 7BAIN C, FATZ D, FAYAD A, et al. Diversity as a defense strategy in information systems does evidence from previous events support such an approach [EB/OL]. http://www.mitre.org/work/tech_papers/tech_papers_01/bain_diversity/bain_diversity.pdf. 2000. 被引量:1
  • 8Dynamic DNS[EB/OL]. http://www.technopagan.org/dynamic/, 2000. 被引量:1
  • 9HUANG Z G. The tenure duty method (TDM) in the active incident recovery research[A]. IEEE 5th International Workshop, APPT 2003[C].Berlin: Spring Verlag,2003.557-564 被引量:1
  • 10LASZEWSKI G V, FOSTER I. Usage of LDAP in Globus[EB/OL]. http://www-leland.stanford.edu/ hodges/talks/. 被引量:1

共引文献21

同被引文献30

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部