Methodology for Identifying Critical Vulnerabilities in Distributed Systems

被引:0
|
作者
Mikheev, Ivan [1 ]
Shapovalova, Olena [1 ]
Burmensky, Rustam [1 ]
机构
[1] Kharkiv Natl Univ Civil Engn & Architecture, Dept Comp Sci & Informat Technol, Kharkov, Ukraine
关键词
distributed system; analysis; bottleneck; theory of stationary processes;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The urgency of using modern mathematical methods in analyzing the reliability and fault tolerance of distributed system elements is not in doubt at this time. The trend of using the theory of stationary processes as a basis for methodologies for analysis and decision making has become global. To ensure the reliability and fault tolerance of distributed systems, modern analyzes include a mathematical device that allows you to unambiguously and quantitatively assess the state of the system, find bottlenecks and determine the direction of modernization. Identification of the bottleneck in the distributed data storage system was carried out on the basis of the developed data conversion mechanism.
引用
收藏
页码:654 / 658
页数:5
相关论文
共 50 条
  • [1] Vulnerabilities and threats in distributed systems
    Bhargava, B
    Lilien, L
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2004, 3347 : 146 - 157
  • [2] Vulnerabilities and threats in distributed systems
    Bhargava, Bharat
    Lilien, Leszek
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3347 : 146 - 157
  • [3] Identifying vulnerabilities in critical infrastructures by network analysis
    Lam, Chi Yung
    Lin, Jiaying
    Sim, Mong Soon
    Tai, Kang
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2013, 9 (03) : 190 - 210
  • [4] Identifying Vulnerabilities in Trust and Reputation Systems
    Gunes, Taha D.
    Long Tran-Thanh
    Norman, Timothy J.
    PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 308 - 314
  • [5] Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things
    Samtani, Sagar
    Yu, Shuo
    Zhu, Hongyi
    Patton, Mark
    Matherly, John
    Chen, Hsinchun
    IEEE INTELLIGENT SYSTEMS, 2018, 33 (02) : 63 - 73
  • [6] PROCEDURE FOR IDENTIFYING VULNERABILITIES IN NUCLEAR SAFEGUARDS SYSTEMS
    LIM, JJ
    LAMBERT, HE
    GILMAN, FM
    TRANSACTIONS OF THE AMERICAN NUCLEAR SOCIETY, 1979, 32 (JUN): : 344 - 345
  • [7] Critical Infrastructure Control Systems Vulnerabilities
    Graddy, Marchello
    Strouble, Dennis
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 106 - 111
  • [8] Vulnerabilities in SCADA and Critical Infrastructure Systems
    Robles, Rosslin John
    Choi, Min-kyu
    Cho, Eun-suk
    Kim, Seok-soo
    Park, Gil-cheol
    Yeo, Sang-Soo
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2008, 1 (01): : 99 - 104
  • [9] A Distributed Control Design Methodology for Damping Critical Modes in Power Systems
    Mahmoudi, Meimanat
    Tomsovic, Kevin
    2016 IEEE POWER AND ENERGY CONFERENCE AT ILLINOIS (PECI), 2016,
  • [10] Finding Trojan Message Vulnerabilities in Distributed Systems
    Banabic, Radu
    Candea, George
    Guerraoui, Rachid
    ACM SIGPLAN NOTICES, 2014, 49 (04) : 113 - 126