计算机科学 ›› 2016, Vol. 43 ›› Issue (8): 26-29.doi: 10.11896/j.issn.1002-137X.2016.08.005

• 目次 • 上一篇    下一篇

一种基于多层拓扑的大规模分布式系统结构脆弱性分析算法

况晓辉,李津,赵刚   

  1. 北京系统工程研究所信息系统安全技术国家级重点实验室 北京100101,北京系统工程研究所信息系统安全技术国家级重点实验室 北京100101,北京系统工程研究所信息系统安全技术国家级重点实验室 北京100101
  • 出版日期:2018-12-01 发布日期:2018-12-01

Multilayer Topology Structural Vulnerability Analysis Algorithm for Large-scale Distributed System

KUANG Xiao-hui, LI Jin and ZHAO Gang   

  • Online:2018-12-01 Published:2018-12-01

摘要: 结构脆弱性是大规模分布式系统中典型的脆弱性类型之一。针对大规模分布式系统实体间复杂的依赖关系和冗余备份机制,构建了多层拓扑模型,在实体拓扑结构脆弱性分析方法的基础上,提出了基于映射-回溯思想的LDS底层结构脆弱性分析算法,并通过实现该算法验证了其有效性。

关键词: 结构脆弱性,多层拓扑模型,脆弱性分析

Abstract: Structural vulnerability is a typical type of vulnerabilities on large-scale distributed system.Aiming at the complex relation between entities and redundancy mechanism in large-scale distributed system,a new multi-topology model was proposed.Based on entity topology model structural vulnerability analysis algorithm,a new LDS low layer structural vulnerability analysis algorithm was put forward.The algorithm was verified by implementation and evaluation.

Key words: Structural vulnerability,Multi-topology module,Vulnerability analysis

[1] Helsinger A,Ferguson W,Lazarus R.Exploring large-scale,distributed system behavior with a focus on information assurance[C]∥IEEE Computer Society.2001:1273-1286
[2] Qiang W Z,Zou D Q,Jin H.Research on Privacy Preservation Mechanism for Credentials and Policies in Grid Computing Environment[J].Journal of Computer Research & Development,2007,4(1):11-19(in Chinese) 羌卫中,邹德清,金海.网格环境中证书和策略的隐私保护机制研究[J].计算机研究与发展,2007,44(1):11-19
[3] Lu Z,Yu Y,et al.A theory of structural vulnerability [J].Structural Engineer,1999,77(18):17-24
[4] Agarwal J,Blockley D I,Woodman N J.Vulnerability of 3Dtrusses[J].Structural Safety,2001,23(3):203-220
[5] Albert R,Albert I,Nakarado G L.Structural vulnerability of the North American power grid[J].Phys.Rev.E Statistical Nonlinear & Soft Matter Physics,2004,9(2):292-313
[6] Rosas-Casals M,Valverde S,Solé R.Topological vulnerability of the European power grid under errors and attacks[J].International Journal of Bifurcations and Chaos,2007,17(7):2465-2475
[7] Jenelius E,Petersen T,Mattson L.Importance and exposure in road network vulnerability analysis [J].Transportation Research,2008,40:537-560
[8] DallAsta L,Barrat A,Barth′elemy M,et al.Vulnerability ofweighted networks [J].J.Stat.Mech,2006,5(4):04006
[9] Wang S,Hong L,Chen X.Vulnerability analysis of interdepen-dent infrastructure systems:A methodological framework[J].Physical A:Stat.Mech.Its Appl.,2012,391(11):3323-3335
[10] Yan J,He H,Sun Y.Integrated security analysis on cascading failure in complex networks[J].IEEE Trans.Inf.Forensics Security,2014,9(3):451-463
[11] Koc Y,Raman A,Warnier M,et al.Structural Vulnerability Analysis of Electric Power Distribution Grids[J].arXiv preprint arXiv:1506.08641,2015
[12] Farago A.A graph theoretic model for complex network failure scenarios[C]∥INFORMS.2006
[13] Kurant M,Thiran P.Survivable Mapping Algorithm by RingTrimming (SMART) for large IP-over-WDM networks[C]∥Proceedings of BroadNets.San Jose,California,USA,2004:25-29
[14] Zhou Z,Lin T,Thulasiraman K,et al.Cross-Layer NetworkSurvivability Under Multiple Cross-Layer Metrics[J].Journal of Optical Communications and Networking,2015,7(6):540-553
[15] Zhao Gang,Kuang Xiao-hui,Li Jin,et al.A Structural Vulnerability Analysis Algorithm for Large-Scale Distributed System[J].Journal of Computer Research & Development,2011,8(5):906-912(in Chinese) 赵刚,况晓辉,李津,等.一种基于权值的大规模分布式系统结构脆弱性分析算法[J].计算机研究与发展,2011,48(5):906-912

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!