Font Size: a A A

Runtime Interactive Behavior Process Characteristic Analysis Of Networked Software

Posted on:2014-10-28Degree:DoctorType:Dissertation
Country:ChinaCandidate:C PengFull Text:PDF
GTID:1488304322470914Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
ABSTRACT:Software has become a mainstay industry of the national economy, and plays an increasingly important role in people's daily life. However, the loss and disaster caused by the software quality defects, has been made people disappointed. Especially the emergency of networked software, ensuring and improving the software credibility attributes like reliability and safety facing great challenges. Research on networked software complex characteristics has become a hot issue, it is one of the key to solve the network software credibility problem that take networked software runtime interactive behavior as the research object, and grasp the behavior execution law and the internal mechanism. Therefore, researching the networked software runtime interactive behavior process characteristic has a strong practical significance.The current behavior analysis method for traditional software, neither consider the complex operating environment, nor have the ability to express the infrastructure, software entities structure, and behavior complexity of the networked software. Under open, uncontrollable, dynamic internet environment, how to accurately describe interactive behavior, construct efficient behavioral models, and sufficiently take abnormal behavior spreading analysis for this kind of networked software with complex structure, complex behavior and multiple fusion complexes, and finally apply the method to the actual system, which has important challenges significance in promoting empirical research and improving the credibility of networked software.In consideration of the existing problems such as footprints token lost, missing actors, and can not recognize which transactions generate these behavior footprints when networked software multi-entity parallel executed the method of network flow and bipartite graph matching for separately re-tokenizing the incomplete transaction with part tokens and without tokens is then presented. This method can effectively solve the above problem, and find actors for the behavior footprints which temporally staggered and spatial overlapped. Therefore, facilitate the description of the networked software runtime behavior.In consideration of the existing problems such as lack of log format standards, inadequate constraints condition, model spatial redundancy, unreasonable status setting, the method based on invariant constrains for dynamic modeling is then presented. Six types of invariants extracted from a pre-set format behavior log to constraint event correlation, refinement and abstraction is adopted to ensure the model certainty and completeness. By anglicizing the counterexample path in the model can reveal the potential threat in the existing system, and verify the known vulnerabilities.In consideration of the existing problems such as inadequate description of the abnormal behavior propagation characteristics, limited detective ability of the model, a method of investigating the networked software from different view, combining the compartment model and the individual model to construct the abnormal behavior propagation model is then presented. Three types of parameters, spread probability, interaction frequency and connection rate, which affecting the spread of abnormal behavior were proposed, and related definition and calculation method are also investigated, which not only enhances the analysis accuracy of abnormal behavior propagation but show us some light on abnormal behavior predicting and pinning control.Based on the modeling and analysis methods of networked software discussed above, we have further studied the online electronic trading system, verified the feasibility of these methods, including software interactive behavior description, dynamic modeling, reliability improvement by abnormal behavior propagation analysis. Thus the thesis opens a new theoretic way to improve the credibility of networked software.
Keywords/Search Tags:networked software, behavior process characteristic, behaviordescription, dynamic modeling, abnormal behavior propagation analysis
PDF Full Text Request
Related items