Computer Science ›› 2014, Vol. 41 ›› Issue (4): 65-69.

Previous Articles     Next Articles

Model of Autonomous Management for Survivable System

SU Yan,ZHAO Guo-sheng,WANG Jian,ZHANG Nan and LI Lin   

  • Online:2018-11-14 Published:2018-11-14

Abstract: This paper presented a model of autonomous management for survivable system based on the survivable detection parameters.Autonomous management mechanism is implemented by autonomous detection and control unit.Firstly,a number of survivable detection parameters were defined,and according to the cumulative distribution function,the dynamic and variable threshold constraints were determined.Then,based on the reference mark of parameters,the calculation methods of comprehensive evaluation for service connections were given,and autonomous management of survivable system was achieved through the control unit.Finally,the simulation experiment shows that the proposed method can effectively improve the service capacity of survivable system and enhance the survivability of system.

Key words: Survivability,Autonomous management,Control unit,CDF,Detection parameters

[1] Westmark V R.A Definition for Information System Survivabi-lity[C]∥Proceedings of the 37th Hawaii Internal Conference on System Sciences,Track 9.Washington,IEEE Computer Society Press,2004:2086-2096
[2] Ellison R J,Fisher D A,Linger R C,et al.Survivable network systems:An emerging discipline[R].CMU/SEI,Technical Report,CMU/SEI-97-TR-013.1997
[3] Ellison R J,Moore A P.Trustworthy refinement through intru-sion-aware design (TRIAD):An Overview[C]∥Proceedings of the 3rd Annual High Confidence Software and Systems Confe-rence.Baltimore,MD,2003:1-10
[4] Richard C L,Howard F L,John M,et al.Life-cycle models for survivable systems[R].CMU/SEI-2002-ESC-TR-026.Boston:Carnegie Mellon University,2002
[5] 赵国生,王慧强,王健.一种基于灰色关联分析的网络可生存性态势评估方法[J].小型微型计算机系统,2006,7(10):1861-1864
[6] 王健,王慧强,赵国生.基于序列蒙特卡罗的网络生存态势跟踪评估[J].哈尔滨工业大学学报,2008,0(5):802-806
[7] Wang J,Wang H Q,Zhao G S.A situation assessment method for network survivability[J]. Journal of Wuhan University:Na-tural Sciences,2006,1(6):1785-1788
[8] Wang J,Wang H Q,Zhao G S.Formal modeling and quantitative evaluation for information system survivability based on PEPA[J].The Journal of China Universities of Posts and Telecommunications,2008,15(2):88-96
[9] 王健,王慧强,赵国生.分布式任务关键系统生存性自动分析与验证[J].高技术通讯,2009,19(6):572-579
[10] Zhao G S,Wang H Q,Wang J.A novel formal analysis method of network survivability based on stochastic process algebra[J].Tsinghua Science & Technology,2007,12(1):175-179
[11] Zinky J A,Bakken D E,Schantz R.Architectural support for quality of service for CORBA objects[J].Theory and Practice of Object Systems,1997,3(1):55-73
[12] Matti A H,Richard D S,Carlos A U,et al.Survivability through customization and adaptability:The cactus approach[C]∥DARPA Information Survivability Conference and Exposition (DISCEX 2000).Hilton Head,SC,USA,2000:294-307
[13] Xie W,Hong Y,Trivedi K.Analysis of a two-level software rejuvenation policy[J].Reliability Engineering and System Safety,2005,7(1):13-22
[14] Patterson D,Brown A,Broadwell P,et al.Recovery-orientedcomputing (ROC):Motivation,definition,techniques,and case studies[R].Technical Report UCB//CSD-02-1175.UC Berkeley Computer Science,2002
[15] 赵国生.任务关键系统生存性应急增强技术研究[D].哈尔滨:哈尔滨工程大学,2009
[16] Xie Y,Yu S Z.A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors[J].Networking,IEEE/ACM Transactions on,2009,17(1):54-65
[17] Beitollahi H,Deconinck G.ConnectionScore:A Statistical Technique to Resist Application-layer DDoS Attacks[R].Tech.Rep.01-2012-0130.Electrical Engineering Department,University of Leuven,Belgium

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!