计算机科学 ›› 2016, Vol. 43 ›› Issue (8): 26-29.doi: 10.11896/j.issn.1002-137X.2016.08.005
况晓辉,李津,赵刚
KUANG Xiao-hui, LI Jin and ZHAO Gang
摘要: 结构脆弱性是大规模分布式系统中典型的脆弱性类型之一。针对大规模分布式系统实体间复杂的依赖关系和冗余备份机制,构建了多层拓扑模型,在实体拓扑结构脆弱性分析方法的基础上,提出了基于映射-回溯思想的LDS底层结构脆弱性分析算法,并通过实现该算法验证了其有效性。
[1] Helsinger A,Ferguson W,Lazarus R.Exploring large-scale,distributed system behavior with a focus on information assurance[C]∥IEEE Computer Society.2001:1273-1286 [2] Qiang W Z,Zou D Q,Jin H.Research on Privacy Preservation Mechanism for Credentials and Policies in Grid Computing Environment[J].Journal of Computer Research & Development,2007,4(1):11-19(in Chinese) 羌卫中,邹德清,金海.网格环境中证书和策略的隐私保护机制研究[J].计算机研究与发展,2007,44(1):11-19 [3] Lu Z,Yu Y,et al.A theory of structural vulnerability [J].Structural Engineer,1999,77(18):17-24 [4] Agarwal J,Blockley D I,Woodman N J.Vulnerability of 3Dtrusses[J].Structural Safety,2001,23(3):203-220 [5] Albert R,Albert I,Nakarado G L.Structural vulnerability of the North American power grid[J].Phys.Rev.E Statistical Nonlinear & Soft Matter Physics,2004,9(2):292-313 [6] Rosas-Casals M,Valverde S,Solé R.Topological vulnerability of the European power grid under errors and attacks[J].International Journal of Bifurcations and Chaos,2007,17(7):2465-2475 [7] Jenelius E,Petersen T,Mattson L.Importance and exposure in road network vulnerability analysis [J].Transportation Research,2008,40:537-560 [8] DallAsta L,Barrat A,Barth′elemy M,et al.Vulnerability ofweighted networks [J].J.Stat.Mech,2006,5(4):04006 [9] Wang S,Hong L,Chen X.Vulnerability analysis of interdepen-dent infrastructure systems:A methodological framework[J].Physical A:Stat.Mech.Its Appl.,2012,391(11):3323-3335 [10] Yan J,He H,Sun Y.Integrated security analysis on cascading failure in complex networks[J].IEEE Trans.Inf.Forensics Security,2014,9(3):451-463 [11] Koc Y,Raman A,Warnier M,et al.Structural Vulnerability Analysis of Electric Power Distribution Grids[J].arXiv preprint arXiv:1506.08641,2015 [12] Farago A.A graph theoretic model for complex network failure scenarios[C]∥INFORMS.2006 [13] Kurant M,Thiran P.Survivable Mapping Algorithm by RingTrimming (SMART) for large IP-over-WDM networks[C]∥Proceedings of BroadNets.San Jose,California,USA,2004:25-29 [14] Zhou Z,Lin T,Thulasiraman K,et al.Cross-Layer NetworkSurvivability Under Multiple Cross-Layer Metrics[J].Journal of Optical Communications and Networking,2015,7(6):540-553 [15] Zhao Gang,Kuang Xiao-hui,Li Jin,et al.A Structural Vulnerability Analysis Algorithm for Large-Scale Distributed System[J].Journal of Computer Research & Development,2011,8(5):906-912(in Chinese) 赵刚,况晓辉,李津,等.一种基于权值的大规模分布式系统结构脆弱性分析算法[J].计算机研究与发展,2011,48(5):906-912 |
No related articles found! |
|