通信学报 ›› 2016, Vol. 37 ›› Issue (3): 7-19.doi: 10.11959/j.issn.1000-436x.2016048

• 学术论文 • 上一篇    下一篇

基于检查点的分布式软件监控与可信性评价

李珍1,田俊峰1,常卓1,马晓雪2   

  1. 1 河北大学计算机科学与技术学院,河北 保定071000
    2 河北大学计算机教学部,河北 保定071000
  • 出版日期:2016-03-25 发布日期:2017-08-04
  • 基金资助:
    国家自然科学基金资助项目;河北省自然科学基金资助项目;河北省自然科学基金资助项目;河北省高等学校科学技术研究青年基金项目;河北大学自然科学研究计划基金资助项目

Distributed software monitoring and trustworthiness evaluation based on checkpoints

Zhen LI1,Jun-feng TIAN1,Zhuo CHANG1,Xiao-xue MA2   

  1. 1 School of Computer Science and Technology,Hebei University,Baoding 071000,China
    2 Computer Department,Hebei University,Baoding 071000,China
  • Online:2016-03-25 Published:2017-08-04
  • Supported by:
    The National Natural Science Foundation of China;The Natural Science Foundation of Hebei Province;The Natural Science Foundation of Hebei Province;The Youth Foundation of Hebei Educational Committee;The Science Foundation of Hebei University

摘要:

基于检查点的传统软件可信性评价方法以及目前针对分布式软件的交互关联规则,对于具有复杂交互行为的分布式软件均不适用。采用伴随式分布式软件监控机制,在节点内织入3类检查点,引入适应复杂交互场景的交互关联规则。通过将节点分解为多层模块结构,进行基于检查点结构树的节点实例可信性以及基于节点的分布式软件可信性评价。实验表明能以较小的监控开销,更准确地评价分布式软件实例的可信性,能够处理无限路径,且不存在大状态空间问题。

关键词: 分布式软件, 可信性, 检查点, 交互, 行为监控

Abstract:

Traditional software trustworthiness evaluation based on checkpoints and the existing interaction association rules for distributed software were inapplicable to distributed software with complex interactions.According to this problem,an accompanying distributed software monitoring mechanism was used,and three types of checkpoints in nodes and interaction association rules were introduced for complex interaction scene.The trustworthiness of the node instance was evaluated based on checkpoint structure tree by dividing nodes into several modules,and then the trustworthiness of distributed soft-ware was evaluated based on nodes.The experimental results showed that the approaches could evaluate the trustworthiness of distributed software instance accurately with small monitoring cost,and could be suitable for infinitely long paths with no state explosion problem for trustworthiness evaluation of distributed software.

Key words: distributed software, trustworthiness, checkpoint, interaction, behavior monitoring

No Suggested Reading articles found!