A New Method for Abnormal Behavior Propagation in Networked Software

被引:6
作者
Peng, Cheng [1 ,2 ,3 ]
Liu, Ming [1 ,3 ]
Yuan, Xin-Pan [1 ,3 ]
Zhang, Long-Xin [1 ,3 ]
Man, Jun-Feng [1 ,2 ,3 ]
机构
[1] Hunan Univ Technol, Sch Comp Sci & Technol, Zhuzhou, Hunan, Peoples R China
[2] Cent S Univ, Sch Informat Sci & Engn, Changsha, Hunan, Peoples R China
[3] Key Lab Hunan Prov Intelligent Informat Percept &, Zhuzhou, Peoples R China
来源
JOURNAL OF INTERNET TECHNOLOGY | 2018年 / 19卷 / 02期
关键词
Networked software; Abnormal behavior; Propagation model; System bug; ORIENTED DESIGN;
D O I
10.3966/160792642018031902017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In general, bugs in software are inevitable. The study on the abnormal behavior propagation mechanism trigged by bugs in networked software provides the way for people to grasp the execution rule and to adopt corresponding pinning measurements. Based on the situation of abnormal behavior propagation at different granularity software entities, three factors - propagation probability, interactive frequency and connection rate which affects the abnormal behavior propagation, are proposed, and corresponding definition and computation method are also investigated. The process model for abnormal behavior propagation is constructed in reference to the compartment model, individual models and three factors mentioned above, which improves the expression ability of model and enhances its completeness and accuracy. Then, the analytical method for abnormal behavior propagation is applied to the online electronic shopping system, and the results testify the correctness and feasibility of the propagation mechanism.
引用
收藏
页码:489 / 498
页数:10
相关论文
共 23 条
  • [1] Basic concepts and taxonomy of dependable and secure computing
    Avizienis, A
    Laprie, JC
    Randell, B
    Landwehr, C
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) : 11 - 33
  • [2] Aspect-oriented middleware framework for resolving service discovery issues in Internet of Things
    Balakrishnan, Senthil Murugan
    Sangaiah, Arun Kumar
    [J]. INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2016, 9 (2-3) : 62 - 78
  • [3] Chen Ping, 2010, Acta Electronica Sinica, V38, P1741
  • [4] A METRICS SUITE FOR OBJECT-ORIENTED DESIGN
    CHIDAMBER, SR
    KEMERER, CF
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1994, 20 (06) : 476 - 493
  • [5] Properties and achievable data rate of a cyclic prefix based imperfect reconstruction filter bank multiple access system
    Dou, Jianqing
    Zhang, Zaichen
    Dang, Jian
    Wu, Liang
    Wei, Yuxin
    Sun, Chen
    [J]. IET COMMUNICATIONS, 2016, 10 (17) : 2427 - 2434
  • [6] Safety-Oriented Design of Component Assemblies using Safety Interfaces
    Elmqvist, Jonas
    Nadjm-Tehrani, Simin
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 182 : 57 - 72
  • [7] Fang J. Q., 2014, COMPLEX SYSTEMS COMP, V7, P5
  • [8] Grunske L., 2013, EASY, V2, P23
  • [9] [何成万 HE Chengwan], 2011, [电子学报, Acta Electronica Sinica], V39, P1771
  • [10] EPIC: Profiling the propagation and effect of data errors in software
    Hiller, M
    Jhumka, A
    Suri, N
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2004, 53 (05) : 512 - 530