软件中的漏洞不可避免,研究由漏洞引发的网络化软件的异常行为传播机制,为人们把握异常行为传播规律并采取相应的牵制措施提供了依据.根据异常行为在不同粒度的软件实体中传播的情形,提出了影响异常行为传播的三类因素:传播概率、交互频率和连接率,并给出了相关定义及其计算方法;结合仓室模型和个体模型及上述三因素,构建了描述软件异常行为传播过程的模型,提高了模型的表达能力,增强了模型的完备性和准确率.将异常行为传播分析方法应用于典型的网络化软件系统,通过实验计算出各参数及其变化规律,验证了该传播机制的正确性和可行性.
Abstract
Bugs in software are inevitable.The study on the networked software abnormal behavior propagation mechanism trigged by bugs provided the way for people to grasp the execution rule and to adopt corresponding pinning measurements.Based on the situation of abnormal behavior propagation at different granularity software entities,three factors——propagation probability,interactive frequency,and connection rate——affecting the abnormal behavior propagation were proposed,and the corresponding definition and calculation method were also investigated.The software abnormal behavior propagation process model was constructed in reference to the compartment model and individual models and three factors mentioned above,which improved model expression ability and enhanced the model competence and accuracy.Then,the abnormal behavior propagation analytical method was applied to the typical networked software system,and the results verified the correctness and feasibility of the propagation mechanism.
关键词
网络化软件 /
异常行为 /
传播模型 /
系统漏洞
{{custom_keyword}} /
Key words
networked software /
abnormal behavior /
propagation model /
system bug
{{custom_keyword}} /
中图分类号:
TP302.7
{{custom_clc.code}}
({{custom_clc.text}})
{{custom_sec.title}}
{{custom_sec.title}}
{{custom_sec.content}}
参考文献
[1] 马于涛,何克清,李兵,刘婧.网络化软件的复杂网络特性实证[J].软件学报,2011,22(3):381-407. Ma Yu-Tao,He Ke-qing,Li Bing,Liu Jing.Empirical study on the characteristics of complex networks in networked software[J].Journal of Software,2011,22(3):381-407.(in Chinese)
[2] Fang J Q,Wang X F,Zheng Z G.Research of dynamical complexity of nonlinear networks[J].Complex Systems and Complexity Science,2010,7(2-3):5-9.
[3] 何成万,张立军,张慧.基于元数据和反射的面向方面软件演化方法[J].电子学报,2011,39(8):1771-1777. He Cheng-wan,Zhang Li-jun,Zhang Hui.An approach to aspect-oriented software evolution based on metadata and reflection[J].Acta Electronica Sinica,2011,39(8):1771-1777.(in Chinese)
[4] Sureka A.Learning to classify bug reports into components[J].Objects,Models,Components,Patterns,2012,73(4):288-303.
[5] Hongyu Zhang.On the distribution of software faults[J].IEEE Transactions on Software Engineering,2008,34(2):301-302.
[6] 陈平,韩浩,沈晓斌.基于动静态程序分析的整形漏洞检测工具[J].电子学报,2010,38(8):1741-1747. Chen Ping,Han Hao,Shen Xiao-bin.Detecting integer bugs based on static and dynamic program analysis[J].Acta Electronica Sinica,2010,38(8):1741-1747.(in Chinese)
[7] 林闯,王元卓,杨扬,曲扬.基于随机Petri网的网络可信赖性分析方法研究[J].电子学报,2006,34(2):322-332. Lin Chuang,Wang Yuan zhuo,Yang Yang,Qu Yang.Research on network dependability analysis methods based on stochastic Petri Net[J].Acta Electronica Sinica,2006,34(2):322-332.(in Chinese)
[8] Monson J S,Wirthlin M,Hutchings B.A fault injection analysis of Linux operating on an FPGA-embedded platform[J].International Journal of Reconfigurable Computing,2012,2012(1):7-18.
[9] 彭成,杨路明,满君丰.网络化软件交互行为动态建模[J].电子学报,2013,41(2):314-320. Peng Cheng,Yang Lu-ming,Man Jun-feng.Dynamic modeling of networked software interactive behavior[J].Acta Electronica Sinica,2013,41(2):314-320.(in Chinese)
[10] Yukihiko Nakata,Philipp Getto,Anna Marciniak-Czochra,Tomás Alarcón.Stability analysis of multi-compartment models for cell production systems[J].Journal of Biological Dynamics,2012,6(1):2-18.
[11] Alsaade F,Fouda Y,Khan A R.Efficient cellular automata algorithm for template matching[J].Journal of Artificial Intelligence,2012,5(3):122-129.
[12] Vinay Singh,Vandana Bhattacherjee,Sandeep Bhattacharjee.An analysis of dependency of coupling on software defects[J].ACM SIGSOFT Software Engineering Notes,2012,37(1):1-6.
[13] 苏璞睿,冯登国.基于进程行为的异常检测模型[J].电子学报,2006,34(10):1809-1811. Su Pu-rui,Feng Deng-guo.An anomaly intrusion detection model based on nonhierarchical clustering[J].Acta Electronica Sinica,2006,34(10):1809-1811.(in Chinese)
[14] 徐建军,谭庆平,熊磊,叶俊.一种针对软错误的程序可靠性定量分析方法[J].电子学报,2011,39(3):675-679. Xu Jian-jun,Tan Qing-ping,Xiong Lei,Ye Jun.A quantitative approach for program reliability analysis of soft errors[J].Acta Electronica Sinica,2011,39(3):675-679.(in Chinese)
[15] Wei-Feng Pan,Bing Li,Yu-Tao Ma.Measuring structural quality of object-oriented software via bug propagation analysis on weighted software networks[J].Journal of Computer Science and Technology,2010,25(6):1202-1213.
[16] Avizienis A,Laprie J,Randell B,et al.Basic concepts and taxonomy of dependable and secure computing[J].Nato Security through Science Series E Human and Societal Dynamics,2007,23(10):11-33.
[17] Hiller,M,Jhumka,A,Suri,N.Epic.Profiling the propagation and effect of data errors in software[J].IEEE Transactions Computers,2004,53(5):512-530.
[18] Elmqvist J,Nadjm-Tehrani S.Safety-oriented design of component assemblies using safety interfaces[J].Electronic Notes in Theoretical Computer Science,2007,182:57-72.
[19] Grunske L,Neumann R.Quality improvement by integrating non-functional properties in software architecture specification[J].EASY,2002,2(1):23-32.
[20] Rugina A E,Kanoun K,Kaaniche M.An architecture-based dependability modeling framework using AADL[J].arXiv preprint arXiv:2007,3(10):0704-0865.
[21] P.Popic,D.Desovski,W.Abdelmoez.Error propagation in the reliability analysis of component-based systems [A].Proceedings of the 16th IEEE International Symposium on Software Reliability Engineering [C].Chicago:Academic Press,2005.10-15.
[22] Chidamber S R,Kemerer C F.A metrics suite for object oriented design[J].IEEE Transactions on Software Engineering,1994,20(6):476-493.
{{custom_fnGroup.title_cn}}
脚注
{{custom_fn.content}}
基金
国家自然科学基金 (No.60773110); 国家技术创新基金 (No.11C2614302856); 湖南省自然科学基金 (No.12JJ2036,No.11JJA4050)湖南省教育厅优秀青年项目 (No.11B039)
{{custom_fund}}