期刊文献+

分布式任务关键系统生存性自动分析与验证 被引量:4

Automated analysis and validation for survivability of distributed mission-critical systems
下载PDF
导出
摘要 提出了一种应用概率模型检测技术进行分布式任务关键系统生存性的量化分析研究方法。该方法对攻击者和系统的交互行为进行精简抽象,在此基础上使用PRISM高级语言构造连续时间马尔可夫链系统概率模型。针对不同程度的攻击故障及系统服务水平,以连续随机逻辑建立系统生存性的形式化规约。借助概率模型检测工具PRISM对模型进行统计和验证,并图形化地表示出系统生存性的自动分析结果。理论分析和实验结果验证了上述方法的合理性和有效性,这些结果可在理论上指导可生存系统的设计和实现。 The paper proposes a method for guantitative analysis of the survivability of distributed mission-critical systems based on the probabilistic model checking technology. The method abstracts the interactive behaviors between intruders and the system, and constructs the continuous-time Markov chains probabilistic model of the system using the PRISM language, then identifies the formal specification for the system survivability by continuous stochastic logic aiming at different disas- ter degrees and service levels, and ultimately, analyzes the model statistically and validates the model with the probabilis- tic model checking tool PRISM, and graphically demonstrates the automated analysis results of the system' s survivability. The results of the theoretical analysis and the experiment show the proposed method' s rationality and effectiveness. These conclusions can help to direct the design and implementation of survivable systems.
出处 《高技术通讯》 EI CAS CSCD 北大核心 2009年第6期572-579,共8页 Chinese High Technology Letters
基金 863计划(2007AA01Z401) 国家自然科学基金(90718003)资助项目
关键词 生存性 概率模型检测 形式化规约 任务关键系统 量化分析 survivability, probabilistic model checking, formal specification, mission-critical systems, quantitative analysis
  • 相关文献

参考文献15

  • 1Ellison R J, Fisher D A, Linger R C, et al. Survivable network system: an emerging discipline: [ Technical Report, CMU/SEI-97-TR-013]. Pittsburgh: Carnegie Mellon Software Engineering Institute, USA, 1997. 被引量:1
  • 2Louca S, Pitsillides A, Samaras G. On network survivability algorithms based on trellis graph transformations. In: Proceedings of the 4th IEEE Symposium on Computers and Communications, Red Sea, Egypt, 1999. 235-243. 被引量:1
  • 3Krings A W, Azadmanesh A. A graph based model for survivability apphcations. European Journal of Operational Research, 2005, 164(3): 680-689. 被引量:1
  • 4包秀国,胡铭曾,张宏莉,张绍瑞.两种网络安全管理系统的生存性定量分析方法[J].通信学报,2004,25(9):34-41. 被引量:27
  • 5Gao Z X, Ong C H, Tan W K. Survivability assessment: modeling dependencies in information systems. In: Proceedings of the 4th IEEE/CMU/SEI Information Survivabihty Workshop, Vancouver, Canada, 2001. 被引量:1
  • 6Hevner A, Linger R, Sobel A, et al. The tlow-service-quality framework: unified engineering for large-scale, adaptive systems. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences, Hawaii, USA, 2002. 4006-4015. 被引量:1
  • 7郭渊博,马建峰.分布式系统中服务可生存性的定量分析[J].同济大学学报(自然科学版),2002,30(10):1190-1193. 被引量:34
  • 8Casey F, Chen Y L, Wang X Y, et al. Survivability analysis of distributed systems using attack tree methodology. In: Proceeding of IEEE Military Communications Conference, Atlantic City, New Jersey, 2005. 583-589. 被引量:1
  • 9Jha S, Wing J, Linger R, et al. Survivability analysis of network specifications. In: Proceedings of the 2000 International Conference on Dependable Systems and Networks, New York, USA, 2000. 613-622. 被引量:1
  • 10Jha S, Wing J M. Survivability analysis of network System. In: Proceedings of the 23rd International Conference on Software Engineering, Toronto, Canada, 2001. 307-317. 被引量:1

二级参考文献23

  • 1Hollway B A,Neumann P G.Survivable computer-communication systems:The problem and working group recommendations[R].Washington:US Army Research Laboratory,1993. 被引量:1
  • 2Neumann P.Commputer related risks[M].Boston:Addison-Wesley,1995. 被引量:1
  • 3Marsh T.Critical foundations:Protecting america's Infrastructures[R].Washington:President's Commission on Critical Infrastructure Protection,1997. 被引量:1
  • 4Ellison R,Fisher D,Linger R,et al.Survivable network systems:An emerging discpline[R].Pittsburgh:Software Engineering Institute,Carnegie Mellon Univesity,1997. 被引量:1
  • 5Vaidya N H.A case for two-level recovery schemes[J].IEEE Transactions on Computers,1998,47(6):656-666. 被引量:1
  • 6Ellison R,Linger R,Longstaff T,et al.Survivability network system analysis:A case study[J].IEEE Software,1999,16(4):70-77. 被引量:1
  • 7Ortalo R,Deswarte Y,Kaaniche M.Experimenting with quantitative evaluation tools for monitoring operational security[J].IEEE Transactions on Software Engineering,1999,25(5):633-650. 被引量:1
  • 8Courcoubetis C,Yannakakis M.The complexity of probabilistic verification[J].Journal of ACM,1995,42(4):857-907. 被引量:1
  • 9Lann G L.Predictability in critical systems[A].Lecture Notes in Computer Science,Formal Techniques in Real-Time and Fault-Tolerant Systems[C].Berlin:Springer-Verlag,1998.315-338. 被引量:1
  • 10Lann G L.Proof-based system engineering and embedded systems[A].Lecture Notes in Computer Science,Embedded Systems[C].Berlin:Springer-Veraly,1998.208-248. 被引量:1

共引文献44

同被引文献25

  • 1赵国生,王慧强,王健.基于灰色关联分析的网络可生存性态势评估研究[J].小型微型计算机系统,2006,27(10):1861-1864. 被引量:25
  • 2WANG Jian,WANG Huiqiang,ZHAO Guosheng.A Novel Situation Assessment Method for Network Survivability[J].Wuhan University Journal of Natural Sciences,2006,11(6):1785-1788. 被引量:2
  • 3Kristensen L M, Christensen S, Jensen K. The Practitioner’s Guide to Coloured Petri Nets[J]. International Journal on Software Tools for Technology Transfer, 1998, 2(2): 98-132. 被引量:1
  • 4Jensen K, Kristensen L M. Coloured Petri Nets: Modeling and Validation of Concurrent Systems[M]. New York, USA: Springer Publishing Company Inc., 2009. 被引量:1
  • 5llison R J, Fisher D A, Linger R C, et al. Survivable Network Systems: An Emerging Discipline[R]. Software Engineering Institute, Carnegie Mellon University, Tech. Rep.: 97-013, 1997. 被引量:1
  • 6Zuo Y, Lande S, Pimple M. Analysis and Simulation of System Survivability[C] //Proc. of the 7th International Conference on Information Technology: New Generations. Washington D. C., USA: IEEE Computer Society, 2010: 36-41. 被引量:1
  • 7Ellison R J, Linger R C,Longstaff T, et al. Survivable network system analysis: a case study [ J ]. IEEE Soft- ware, 1999,16(4) :70 - 77. 被引量:1
  • 8Heegaard P E, Trivedi K S. Network survivability modeling J]. Computer Networks:the International Journal of Computer and Telec, ommunications Networ- king ,2009,53 ( 8 ) : 1215 - 1234. 被引量:1
  • 9Cetinkaya E K, Broyles D, Dandekar A, et al. A com- prehensive framework to simulate network attacks and challenges I C]//Proceedings of 2010 International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT). Moscow, Russia,2010:538 - 544. 被引量:1
  • 10Fung C, Chen Y L, Wang X, et al. Survivability analy- sis of distributed systems using attack tree methodolo- gy [ C ]//2006 IEEE Military Communications Con- ference. Atlantic City, USA,21)05 : 583 - 589. 被引量:1

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部