PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Structural Vulnerability Analysis for Large-Scale Distributed System based on Multi-layer Topology Model

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
PL
Analiza strukturalnej wrażliwości systemów o wielkiej skali rozproszenia LSDS
Języki publikacji
EN
Abstrakty
EN
Vulnerability analysis of LSDS (Large-Scale distributed systems) has become a growing focus nowadays. A new multi-layer topology model is proposed to describe complex relations between LSDS entities, redundancy mechanism and failure tolerant mechanism in LSDS. Based on this model, a structural vulnerability analysis algorithm based on weight is proposed, which can discover and validate structural vulnerabilities by computing weight of every entity and link with by graph pruning. After that, a new multi-topology model structural vulnerability analysis algorithm is proposed, which can detect the critical entities on different layers of LSDS according to the interdependencies between them. In the end, the efficiency of the algorithms is verified by experiment.
PL
Zaproponowano nowy wielowarstwowy model topologii systemów wielkiej skali rozproszenia LSDS uwzględniający mechanizm błędów i redundancji. Na podstawie tego modelu przeprowadzono analizę wrażliwości systemu.
Rocznik
Strony
78--83
Opis fizyczny
Bibliogr. 17 poz., wykr.
Twórcy
autor
autor
autor
autor
  • Science and Technology Laboratory on Information System Security, Beijing Institute of System Engineering, Beijing, China, xiaohui_kuang@163.com
Bibliografia
  • [1] Helsinger, A.; Ferguson, W.; Lazarus, R. Exploring large-scale, distributed system behavior with a focus on information assurance[C]. In: DARPA Information Survivability Conference& Exposition II, 2001. DISCEX apos;01. Proceedings Volume 2, Issue, 2001 p273~286 vol.2
  • [2] Qiang Weizhong, Zou Deqing, and Jin Hai. Research on privacy preservation mechanism for credentials and policies in Grid computing environment [J]. Journal of Computer Research and Development, 44(1), p11~19, 2007
  • [3] Lu Z, Yu Y, Woodman NJ & Blockley DI. A theory of structural vulnerability [J]. The Structural Engineer, 77(18):p17~24, 1999
  • [4] Agarwal J, Blockley DI & Woodman NJ. Vulnerability of 3D trusses [J]. Structural Safety, 23(3):203-220, 2001.
  • [5] R. Albert, I. Albert, G.L. Nakarado. Structural vulnerability of the North American power grid [J], Phys. Rev. E 69 (2004) 025103(R).
  • [6] Rosas-Casals, M., S. Valverde, and R. Solé. Topological vulnerability of the European power grid under errors and attacks[J]. International Journal of Bifurcations and Chaos, 2007.17(7).
  • [7] Jenelius, E., Petersen, T. and Mattson, L. Importance and exposure in road network vulnerability analysis [J]. Transportation Research vol.40, p537~560, 2008
  • [8] L. DallAsta, A. Barrat, M. Barth´elemy, and A. Vespignani. Vulnerability of weighted networks [J], physics/0603163, 2006.
  • [9] Eytan Modiano and Aradhana Narula-Tam. Survivable lightpath routing: A new approach to the design of WDM-based networks. IEEE Journal on Selected Areas in Communications, vol. 20, no. 4, pp. 800-809, May 2002
  • [10] Q. Deng, G. Sasaki, and C.-F. Su. Survivable IP over WDM: a mathematical programming problem formulation. In Proc 40th Allerton Conference on Communication, Control and Computing, Monticello, IL, October 2002.
  • [11] Maciej Kurant and Patrick Thiran. Survivable Routing of Mesh Topologies in IP-over-WDM Networks by Recursive Graph Contraction. IEEE Journal on Selected Areas in Communications, 25(5):922 – 933, 2007.
  • [12] Arunabha Sen, Bin Hao, and Bao Hong Shen. Minimum cost ring survivability in WDM networks. In Workshop on High Performance Switching and Routing, 2003, pages 183– 188, 2003.
  • [13] Kayi Lee, Eytan Modiano. Cross-Layer Survivability in WDMBased Networks.
  • [14] Ajay Todimala and Byrav Ramamurthy. Survivable virtual topology routing under Shared Risk Link Groups in WDM networks. In BROADNETS ’04: Proceedings of the First International Conference on Broadband Networks, pages 130–139, Washington, DC, USA, 2004. IEEE Computer Society
  • [15] M. Kurant and P. Thiran. Survivable Mapping Algorithm by Ring Trimming (SMART) for large IP-over-WDM networks[C]. In: Proceedings of BroadNets 2004, p25~29, San Jose, California, USA.
  • [16] A.Farago. A graph theoretic model for complex network failure scenarios[C], In: INFORMS 2006
  • [17] Kuang Xiaohui, Huang Minhuan, Li Jin. Large-scale network topology generation for emulation environment[C]. Proceedings of the 1st International Conference on Networking and Distributed Computing, p392-396,Hangzou,China, 2010
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BPOH-0062-0019
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.