Journal on Communications ›› 2016, Vol. 37 ›› Issue (3): 117-128.doi: 10.11959/j.issn.1000-436x.2016059
• Academic paper • Previous Articles Next Articles
Gang XIONG,Ju-long LAN,Yu-xiang HU,Shi-ran LIU
Online:
2016-03-25
Published:
2017-08-04
Supported by:
Gang XIONG,Ju-long LAN,Yu-xiang HU,Shi-ran LIU. Evaluation approach for network components performance using trustworthiness measurement[J]. Journal on Communications, 2016, 37(3): 117-128.
"
名称 | 编号 | S | O | |||||||||||
NL11 | NL12 | NL13 | NL21 | NL22 | NL31 | NL51 | NL52 | NL53 | NL32 | NL41 | NL421 | NL422 | ||
NOX | I1 | G | E | G | T | G | E | G | G | E | 0.3 | 0.015 | 12 | 350 |
Beacon | I2 | T | T | E | E | T | E | E | T | E | 0.2 | 0.01 | 16 | 1 300 |
Maestro | I3 | T | E | E | G | E | G | E | T | G | 0.2 | 0.013 | 20 | 500 |
Floodlight | I4 | T | T | T | E | T | T | T | T | T | 0.15 | 0.023 | 10 | 600 |
Ryu | I5 | E | G | T | T | E | T | T | E | T | 0.1 | 0.14 | 30 | 100 |
"
权重 | NA1 | NA2 | NA3 | NA4 | NA5 | ||||||||
NL11 | NL12 | NL13 | NL21 | NL22 | NL31 | NL32 | NL41 | NL42 | NL43 | NL51 | NL52 | NL53 | |
0.265 9 | 0.573 9 | 0.160 2 | 0.187 8 | 0.812 2 | 0.216 2 | 0.783 8 | 0.251 6 | 0.260 5 | 0.487 8 | 0.075 2 | 0.202 | 0.722 8 | |
0.356 4 | 0.321 8 | 0.321 8 | 0.5 | 0.5 | 0.079 4 | 0.920 6 | 0.648 1 | 0.084 7 | 0.267 | 0.321 8 | 0.356 4 | 0.321 8 | |
WNL | 0.311 1 | 0.447 9 | 0.241 0 | 0.343 9 | 0.656 1 | 0.147 8 | 0.852 2 | 0.449 9 | 0.172 6 | 0.377 5 | 0.198 5 | 0.279 2 | 0.522 3 |
"
实例 | 可信指标及其可信值 | ||||||||||||
NL11 | NL12 | NL13 | NL21 | NL22 | NL31 | NL32 | NL41 | NL421 | NL422 | NL51 | NL52 | NL53 | |
I1 | 0 | 0.633 | 0 | 1 | 0 | 0.633 | 0 | 0.962 | 0.9 | 0.208 | 0 | 0 | 0.633 |
I2 | 1 | 1 | 0.633 | 0.633 | 1 | 0.633 | 0.5 | 1 | 0.7 | 1 | 0.633 | 1 | 0.633 |
I3 | 1 | 0.633 | 0.633 | 0 | 0.633 | 0 | 0.5 | 0.977 | 0.5 | 0.333 | 0.633 | 1 | 0 |
I4 | 1 | 1 | 1 | 0.633 | 1 | 1 | 0.75 | 0.9 | 1 | 0.417 | 1 | 1 | 1 |
I5 | 0.633 | 0 | 1 | 0.633 | 0.633 | 1 | 1 | 0 | 0 | 0 | 1 | 0.633 | 1 |
[1] | PAUL S , PAN J L , JAIN R . Architectures for the future works and next generation internet:a survey[J]. Computer Communications, UK, 2011,34(1): 2-42. |
[2] | 黄韬, 刘江, 霍如 , 等. 未来网络体系架构研究综述[J]. 通信学报, 2014,35(8): 184-197. HUANG T , LIU J , HUO R , et al. Survey of research on future network architectures[J]. Journal on Communications, 2014,35(8): 184-197. |
[3] | BENGT A , CHRISTIAN D , et al. A survey of information-centric networking[J]. IEEE Communications Magazine, 2012,50(7): 26-36. |
[4] | XIE , SUN Y , ZHANG Y , et al. Service oriented future Internet archi-tecture[C]// INFOCOM Poster. Shanghai,China, c2011. |
[5] | MCKEOWN N , ANDERSON T , BALAKRISHNAN H , et al. Open-Flow:enabling innovation in campus networks[J]. ACM SIGCOMM Computer Communication Review, 2008,38(2): 69-74. |
[6] | SHIN S , PORRAS P , YEGNESWARAN V , et al. FRESCO:modular composable security services for software-defined networks[C]// The 20th Annual Network and Distributed System Security Sympo-sium(NDSS). c2013. |
[7] | 郜帅, 王洪超, 王凯 , 等. 智慧网络组件协同机制研究[J]. 电子学报, 2013,41(7): 1261-1267. GAO S , WANG H H , WANG K , et al. Research on cooperation me-chanisms of smart network components[J]. Acta Electronica Sinica, 2013,41(7): 1261-1267. |
[8] | 兰巨龙, 程东年, 胡宇翔 . 可重构信息通信基础网络体系研究[J]. 通信学报, 2014,35(1): 64-76. LAN J L , CHENG D N , HU Y X . Research on reconfigurable infor-mation communication basal network architecture[J]. Journal on Communications, 2014,35(1): 64-76. |
[9] | 习宁, 马建峰, 孙聪 , 等. 基于模型检测的服务链信息流安全可组合验证方法[J]. 通信学报, 2014,35(11): 23-31. XI N , MA J F , SUN C , et al. Composable information flow verification for service chain based on model checking[J]. Journal on Communica-tions, 2014,35(11): 23-31. |
[10] | SYED A S , JANNET F , MAHAM F , et al. An architectural evaluation of SDN controllers[C]// IEEE ICC-Next-Generation Networking Symposium. c2013:23-31. |
[11] | 杨善林, 丁帅, 褚伟 . 一种基于效用和证据理论的可信软件评估方法[J]. 计算机研究与发展, 2009,46(7): 1152-1159. YANG S L , DING S , CHU W . Trustworthy software evaluation using utility based evidence theory[J]. Journal of Computer Research and Development. 2009,46(7): 1152-1159. |
[12] | SHI L , YANG S L , LI K , et al. Developing an evaluation approach for software trustworthiness using combination weights and TOPSIS[J]. Journal of Software, 2012,7(3): 532-543. |
[13] | 丁帅 . 软件可行性评估模型及其优化方法研究[D]. 合肥: 合肥工业大学, 2011. DING S . Research on software trustworthiness evaluation model and its optimization[D]. Hefei: Hefei University of Technology, 2011. |
[14] | 周剑, 张明新 . 软件可信评估综述[J]. 计算机应用研究, 2012,29(10): 3609-3613. ZHOU J , ZHANG M X . Survey on trustworthy software eval tion[J]. Application Research of Computers. 2012,29(10): 3609-3613. |
[15] | 郎波, 刘旭东, 王怀民 , 等. 一种软件可信分级模型[J]. 计算机科学与探索, 2010,4(3): 231-239. LANG B , LIU X D , WANG H M , et al. A classification model for software trustworthiness[J]. Journal of Frontiers of Computer Science and Technology, 2010,4(3): 231-239. |
[16] | 韩中庚 . 数学建模方法及其应用[M]. 北京: 高等教育出版社, 2005. HAN Z G . Mathematical modeling methods and application[M]. Bei-jing: Higher Education Press, 2005. |
[17] | 左青云, 陈鸣, 赵广松 , 等. 基于 OpenFlow 的 SDN 技术研究[J]. 软件学报, 2013,24(5): 1078-1097. ZUO Q Y , CHEN M , ZHAO G S , et al. Research on openflow-based SDN technologies[J]. Journal of Software, 2013,24(5): 1078-1097. |
[18] | 房秉毅, 张歌, 张云勇 , 等. 开源SDN控制器发展现状研究[J]. 邮电设计技术, 2014,(7):29-36. FANG B Y , ZHANG G , ZHANG Y Y , et al. Research on the develop-ment of open source SDN controller[J]. Designing Techniques of Posts and Telecommunications, 2014,(7):29-36. |
[19] | 江国龙, 付斌章, 陈明宇 , 等. SDN 控制器的调研和量化分析[J]. 计算机科学与探索, 2014,8(6): 653-664. JIANG G L , FU B Z , CHEN M Y , et al. Survey and quantitative analysis of SDN controllers[J]. Journal of Frontiers of Computer Science and Technology, 2014,8(6): 653-664. |
[1] | Junfeng TIAN,Yuhui GUO. Software behavior trust forecast model based on check point scene information [J]. Journal on Communications, 2018, 39(9): 147-158. |
[2] | Zhen LI,Jun-feng TIAN,Zhuo CHANG,Xiao-xue MA. Distributed software monitoring and trustworthiness evaluation based on checkpoints [J]. Journal on Communications, 2016, 37(3): 7-19. |
[3] | . Research on trustworthiness measurement approaches of component based BPRAS [J]. Journal on Communications, 2014, 35(3): 6-57. |
[4] | Qiang HAN,Yu-yu YUAN. Research on trustworthiness measurement approaches of component based BPRAS [J]. Journal on Communications, 2014, 35(3): 47-57. |
[5] | Guang-yuan SHI,Chang-xiang SHEN,Yi LIU. Dynamical attestation for trust based on secure virtual machine introspection [J]. Journal on Communications, 2011, 32(11A): 24-38. |
[6] | Sheng-hui ZHAO,Guo-xin WU,Gui-lin CHEN,Hai-bao CHEN. Service selection approach for enhancing trustworthiness of Web service [J]. Journal on Communications, 2011, 32(1): 37-45. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|