Distributed software monitoring and trustworthiness evaluation based on checkpoints

被引:0
|
作者
Li Z. [1 ]
Tian J.-F. [1 ]
Chang Z. [1 ]
Ma X.-X. [2 ]
机构
[1] School of Computer Science and Technology, Hebei University, Baoding
[2] Computer Department, Hebei University, Baoding
来源
基金
中国国家自然科学基金;
关键词
Behavior monitoring; Checkpoint; Distributed software; Interaction; Trustworthiness;
D O I
10.11959/j.issn.1000-436x.2016048
中图分类号
学科分类号
摘要
Traditional software trustworthiness evaluation based on checkpoints and the existing interaction association rules for distributed software were inapplicable to distributed software with complex interactions. According to this problem, an accompanying distributed software monitoring mechanism was used, and three types of checkpoints in nodes and interaction association rules were introduced for complex interaction scene. The trustworthiness of the node instance was evaluated based on checkpoint structure tree by dividing nodes into several modules, and then the trustworthiness of distributed software was evaluated based on nodes. The experimental results showed that the approaches could evaluate the trustworthiness of distributed software instance accurately with small monitoring cost, and could be suitable for infinitely long paths with no state explosion problem for trustworthiness evaluation of distributed software. © 2016, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:8 / 19
页数:11
相关论文
共 19 条
  • [1] Reynolds P., Killian C., Wiener J.L., Et al., Pip: detecting the unexpected in distributed systems, The 3rd Symposium on Networked Systems Design and Implementation, pp. 115-128, (2006)
  • [2] Yang X.H., Zhou X.H., Tian J.F., Et al., Novel dynamic trusted evaluation model of software behavior, Journal of Chinese Computer Systems, 31, 11, pp. 2113-2120, (2010)
  • [3] Liu Y.L., Du R.Z., Feng J.L., Et al., Trust model of software behaviors based on check point risk assessment, Journal of Xidian University, 39, 1, pp. 179-184, (2012)
  • [4] Tian J.F., Zhang Y.J., Checkpoint trust evaluation method based on Markov, Journal on Communications, 36, 1, pp. 230-236, (2015)
  • [5] Liu D.H., Guo C.G., Wang H.M., Et al., Monitoring enabled distributed software construction method, Journal of Software, 22, 11, pp. 2610-2624, (2011)
  • [6] Wen Z.C., Li C.Y., Man J.F., Analyzing running-time behavioral credibility for distributed software based on Bayesian network, Journal of Chinese Computer Systems, 33, 3, pp. 504-511, (2012)
  • [7] Peng C., Yang L.M., Man J.F., Dynamic modeling of networked software interactive behavior, Acta Electronica Sinica, 41, 2, pp. 314-320, (2013)
  • [8] Wang Q., Lu Y., Xu Z.J., Et al., Software reliability model for component interaction mode, Journal of Electronics (China), 28, 4-6, pp. 632-642, (2011)
  • [9] Yang N.H., Yu H.Q., Qian Z.L., Et al., Modeling and quantitatively predicting software security based on stochastic Petri nets, Mathematical and Computer Modeling, 55, 1-2, pp. 102-112, (2012)
  • [10] Tyagi K., Sharma A., An adaptive neuro fuzzy model for estimating the reliability of component-based software systems, Applied Computing and Informatics, 10, s1, pp. 38-51, (2014)