首页 > 最新文献

2010 29th IEEE Symposium on Reliable Distributed Systems最新文献

英文 中文
Fixed Cost Maintenance for Information Dissemination in Wireless Sensor Networks 无线传感器网络中信息传播的固定成本维护
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.15
R. Panta, M. Vintila, S. Bagchi
Because of transient wireless link failures, incremental node deployment, and node mobility, existing information dissemination protocols used in wireless ad-hoc and sensor networks cause nodes to periodically broadcast "advertisement" containing the version of their current data item even in the "steady state" when no dissemination is being done. This is to ensure that all nodes in the network are up-to-date. This causes a continuous energy expenditure during the steady state, which is by far the dominant part of a network's lifetime. In this paper, we present a protocol called Varuna which incurs a constant energy cost, independent of the duration of the steady state. In Varuna, nodes monitor the traffic pattern of the neighboring nodes to decide when an advertisement is necessary. Using testbed experiments and simulations, we show that Varuna achieves several orders of magnitude energy savings compared to Trickle, the existing standard for dissemination in sensor networks, at the expense of a reasonable amount of memory for state maintenance.
由于瞬态无线链路故障、增量节点部署和节点移动,无线自组织和传感器网络中使用的现有信息传播协议导致节点定期广播包含其当前数据项版本的“广告”,即使在没有传播的“稳定状态”下也是如此。这是为了确保网络中的所有节点都是最新的。这导致在稳态期间持续的能量消耗,这是迄今为止网络生命周期的主要部分。在本文中,我们提出了一种名为Varuna的协议,该协议产生恒定的能量成本,与稳态的持续时间无关。在Varuna中,节点监视相邻节点的流量模式,以决定何时需要发布广告。通过试验台实验和模拟,我们表明,与现有的传感器网络传播标准Trickle相比,Varuna实现了几个数量级的节能,但代价是为状态维护提供了合理的内存。
{"title":"Fixed Cost Maintenance for Information Dissemination in Wireless Sensor Networks","authors":"R. Panta, M. Vintila, S. Bagchi","doi":"10.1109/SRDS.2010.15","DOIUrl":"https://doi.org/10.1109/SRDS.2010.15","url":null,"abstract":"Because of transient wireless link failures, incremental node deployment, and node mobility, existing information dissemination protocols used in wireless ad-hoc and sensor networks cause nodes to periodically broadcast \"advertisement\" containing the version of their current data item even in the \"steady state\" when no dissemination is being done. This is to ensure that all nodes in the network are up-to-date. This causes a continuous energy expenditure during the steady state, which is by far the dominant part of a network's lifetime. In this paper, we present a protocol called Varuna which incurs a constant energy cost, independent of the duration of the steady state. In Varuna, nodes monitor the traffic pattern of the neighboring nodes to decide when an advertisement is necessary. Using testbed experiments and simulations, we show that Varuna achieves several orders of magnitude energy savings compared to Trickle, the existing standard for dissemination in sensor networks, at the expense of a reasonable amount of memory for state maintenance.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116133646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Thicket: A Protocol for Building and Maintaining Multiple Trees in a P2P Overlay 灌木丛:在P2P覆盖层中构建和维护多棵树的协议
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.19
M. Ferreira, J. Leitao, L. Rodrigues
One way to efficiently disseminate information in a P2P overlay is to rely on a spanning tree. However, in a tree, interior nodes support a much higher load than leaf nodes. Also, the failure of a single node can break the tree, impairing the reliability of the dissemination protocol. These problems can be addressed by using multiple trees, such that each node is interior in just a few trees and a leaf node in the remaining, the multiple trees approach allows to achieve load distribution and also to send redundant information for fault-tolerance. This paper proposes Thicket, a decentralized algorithm to efficiently build and maintain such multiple trees over a single unstructured overlay network. The algorithm has been implemented and is extensively evaluated using simulation in a P2P overlay with 10.000 nodes.
在P2P覆盖层中有效传播信息的一种方法是依赖生成树。然而,在树中,内部节点支持的负载比叶节点高得多。此外,单个节点的故障可能会破坏树,从而损害传播协议的可靠性。这些问题可以通过使用多树来解决,这样每个节点只在几棵树的内部,在其余的树中有一个叶节点,多树方法允许实现负载分配,也可以发送冗余信息以实现容错。本文提出了一种去中心化算法Thicket,用于在单个非结构化覆盖网络上高效地构建和维护这样的多棵树。该算法已经实现,并在10,000个节点的P2P覆盖中进行了广泛的仿真评估。
{"title":"Thicket: A Protocol for Building and Maintaining Multiple Trees in a P2P Overlay","authors":"M. Ferreira, J. Leitao, L. Rodrigues","doi":"10.1109/SRDS.2010.19","DOIUrl":"https://doi.org/10.1109/SRDS.2010.19","url":null,"abstract":"One way to efficiently disseminate information in a P2P overlay is to rely on a spanning tree. However, in a tree, interior nodes support a much higher load than leaf nodes. Also, the failure of a single node can break the tree, impairing the reliability of the dissemination protocol. These problems can be addressed by using multiple trees, such that each node is interior in just a few trees and a leaf node in the remaining, the multiple trees approach allows to achieve load distribution and also to send redundant information for fault-tolerance. This paper proposes Thicket, a decentralized algorithm to efficiently build and maintain such multiple trees over a single unstructured overlay network. The algorithm has been implemented and is extensively evaluated using simulation in a P2P overlay with 10.000 nodes.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126534655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
A Study on Latent Vulnerabilities 潜在漏洞研究
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.47
Beng Heng Ng, Xin Hu, A. Prakash
Software code reuse has long been touted as a reliable and efficient software development paradigm. Whilst this practice has numerous benefits, it is inherently susceptible to latent vulnerabilities. Source code which is re-used without being patched for various reasons may result in vulnerable binaries, despite the vulnerabilities being made publicly known. To aggravate matters, crackers have access to information on these vulnerabilities as well. Defenders need to ensure all loopholes are patched, while attackers need just one such loophole. In this work, we define latent vulnerabilities, and study the prevalence of the problem. This provides us the motivation, and an insight into the future work to be done in solving the problem. Our results show that unpatched source files which are more than one year old are commonly used in the latest operating systems. In fact, several of these files are more than ten years old. We explore the premises of using symbols in identifying binaries and conclude that they are insufficient in solving the problem. Additionally, we discuss two possible approaches to solve the problem.
软件代码重用长期以来一直被吹捧为可靠和高效的软件开发范例。虽然这种做法有很多好处,但它本身就容易受到潜在漏洞的影响。由于各种原因被重用而没有打补丁的源代码可能会导致易受攻击的二进制文件,尽管这些漏洞已被公开。更糟糕的是,黑客也可以获得有关这些漏洞的信息。防御者需要确保所有漏洞都被修补,而攻击者只需要一个这样的漏洞。在这项工作中,我们定义了潜在的漏洞,并研究了问题的普遍性。这为我们提供了动力,并对解决问题的未来工作有了深入的了解。我们的研究结果显示,在最新的操作系统中经常使用超过一年的未打补丁的源文件。事实上,这些文件中有几个是十多年前的。我们探讨了使用符号识别二进制的前提,并得出结论,它们不足以解决问题。此外,我们讨论了两种可能的方法来解决这个问题。
{"title":"A Study on Latent Vulnerabilities","authors":"Beng Heng Ng, Xin Hu, A. Prakash","doi":"10.1109/SRDS.2010.47","DOIUrl":"https://doi.org/10.1109/SRDS.2010.47","url":null,"abstract":"Software code reuse has long been touted as a reliable and efficient software development paradigm. Whilst this practice has numerous benefits, it is inherently susceptible to latent vulnerabilities. Source code which is re-used without being patched for various reasons may result in vulnerable binaries, despite the vulnerabilities being made publicly known. To aggravate matters, crackers have access to information on these vulnerabilities as well. Defenders need to ensure all loopholes are patched, while attackers need just one such loophole. In this work, we define latent vulnerabilities, and study the prevalence of the problem. This provides us the motivation, and an insight into the future work to be done in solving the problem. Our results show that unpatched source files which are more than one year old are commonly used in the latest operating systems. In fact, several of these files are more than ten years old. We explore the premises of using symbols in identifying binaries and conclude that they are insufficient in solving the problem. Additionally, we discuss two possible approaches to solve the problem.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123655565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Lightweight Task Graph Inference for Distributed Applications 分布式应用的轻量级任务图推理
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.20
Bin Xin, P. Eugster, X. Zhang, Jinlin Yang
Recent paradigm shifts in distributed computing such as the advent of cloud computing pose new challenges to the analysis of distributed executions. One important new characteristic is that the management staff of computing platforms and the developers of applications are separated by corporate boundaries. The net result is that once applications go wrong, the most readily available debugging aids for developers are the visible output of the application and any log files collected during their execution. In this paper, we propose the concept of task graphs as a foundation to represent distributed executions, and present a low overhead algorithm to infer task graphs from event log files. Intuitively, a task represents an autonomous segment of computation inside a thread. Edges between tasks represent their interactions and preserve programmers’ notion of data and control flows. Our technique leverages existing logging support where available or otherwise augments it with aspect-based instrumentation to collect events of a set of predefined types. We show how task graphs can improve the precision of anomaly detection in a request-oriented analysis of field software and help programmers understand the running of the Hadoop Distributed File System (HDFS).
最近分布式计算中的范式转变(例如云计算的出现)对分布式执行的分析提出了新的挑战。一个重要的新特征是计算平台的管理人员和应用程序的开发人员被公司边界分开。最终的结果是,一旦应用程序出错,开发人员最容易获得的调试辅助工具是应用程序的可见输出和在执行过程中收集的任何日志文件。在本文中,我们提出了任务图的概念作为表示分布式执行的基础,并提出了一种从事件日志文件中推断任务图的低开销算法。直观地说,任务代表线程内的一个自治的计算段。任务之间的边界表示它们之间的交互,并保留了程序员对数据和控制流的概念。我们的技术在可用的情况下利用现有的日志支持,或者使用基于方面的插装对其进行扩充,以收集一组预定义类型的事件。我们展示了任务图如何在面向请求的现场软件分析中提高异常检测的精度,并帮助程序员了解Hadoop分布式文件系统(HDFS)的运行情况。
{"title":"Lightweight Task Graph Inference for Distributed Applications","authors":"Bin Xin, P. Eugster, X. Zhang, Jinlin Yang","doi":"10.1109/SRDS.2010.20","DOIUrl":"https://doi.org/10.1109/SRDS.2010.20","url":null,"abstract":"Recent paradigm shifts in distributed computing such as the advent of cloud computing pose new challenges to the analysis of distributed executions. One important new characteristic is that the management staff of computing platforms and the developers of applications are separated by corporate boundaries. The net result is that once applications go wrong, the most readily available debugging aids for developers are the visible output of the application and any log files collected during their execution. In this paper, we propose the concept of task graphs as a foundation to represent distributed executions, and present a low overhead algorithm to infer task graphs from event log files. Intuitively, a task represents an autonomous segment of computation inside a thread. Edges between tasks represent their interactions and preserve programmers’ notion of data and control flows. Our technique leverages existing logging support where available or otherwise augments it with aspect-based instrumentation to collect events of a set of predefined types. We show how task graphs can improve the precision of anomaly detection in a request-oriented analysis of field software and help programmers understand the running of the Hadoop Distributed File System (HDFS).","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130059649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Monitoring Local Progress with Watchdog Timers Deduced from Global Properties 用从全局属性推导出的看门狗定时器监视局部进程
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.23
R. Barbosa
Distributed systems are used in numerous applications where failures can be costly. Due to concerns that some of the nodes may become faulty, critical services are usually replicated across several nodes, which execute distributed algorithms to ensure correct service in spite of failures. To prevent replica-exhaustion, it is fundamental to detect errors and trigger appropriate recovery actions. In particular, it is important to detect situations in which nodes cease to execute the intended algorithm, e.g., when a replica is compromised by an attacker or when a hardware fault causes the node to behave erratically. This paper proposes a method for monitoring the local execution of nodes using watchdog timers. The approach consists in deducing, from the global system properties, local states that must be visited periodically by nodes that execute the intended algorithm correctly. When a node fails to trigger a watchdog before the time limit, an appropriate response can be initiated. The approach is applied to a well-known Byzantine consensus algorithm. The algorithm is modeled in the Promela language and the Spin model checker is used to identify local states that must be visited periodically by correct nodes. Such states are suitable for online monitoring using watchdog timers.
分布式系统在许多应用程序中使用,在这些应用程序中,故障可能代价高昂。由于担心某些节点可能出现故障,关键服务通常跨多个节点复制,这些节点执行分布式算法,以确保即使出现故障也能提供正确的服务。为了防止副本耗尽,检测错误并触发适当的恢复操作至关重要。特别是,检测节点停止执行预期算法的情况非常重要,例如,当副本被攻击者破坏时,或者当硬件故障导致节点行为不正常时。本文提出了一种利用看门狗定时器监控节点本地执行的方法。该方法包括从全局系统属性推断本地状态,这些状态必须由正确执行预期算法的节点定期访问。当某个节点未能在规定时间内触发看门狗时,可以发起适当的响应。该方法被应用于一个著名的拜占庭共识算法。该算法用Promela语言建模,Spin模型检查器用于识别必须由正确节点定期访问的本地状态。这种状态适合使用看门狗计时器进行在线监控。
{"title":"Monitoring Local Progress with Watchdog Timers Deduced from Global Properties","authors":"R. Barbosa","doi":"10.1109/SRDS.2010.23","DOIUrl":"https://doi.org/10.1109/SRDS.2010.23","url":null,"abstract":"Distributed systems are used in numerous applications where failures can be costly. Due to concerns that some of the nodes may become faulty, critical services are usually replicated across several nodes, which execute distributed algorithms to ensure correct service in spite of failures. To prevent replica-exhaustion, it is fundamental to detect errors and trigger appropriate recovery actions. In particular, it is important to detect situations in which nodes cease to execute the intended algorithm, e.g., when a replica is compromised by an attacker or when a hardware fault causes the node to behave erratically. This paper proposes a method for monitoring the local execution of nodes using watchdog timers. The approach consists in deducing, from the global system properties, local states that must be visited periodically by nodes that execute the intended algorithm correctly. When a node fails to trigger a watchdog before the time limit, an appropriate response can be initiated. The approach is applied to a well-known Byzantine consensus algorithm. The algorithm is modeled in the Promela language and the Spin model checker is used to identify local states that must be visited periodically by correct nodes. Such states are suitable for online monitoring using watchdog timers.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121487181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practical Aspects in Analyzing and Sharing the Results of Experimental Evaluation 实验评价结果分析与共享的实践问题
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.46
F. Brancati, A. Bondavalli
Dependability evaluation techniques such as the ones based on testing, or on the analysis of field data on computer faults, are a fundamental process in assessing complex and critical systems. Recently a new approach [3] has been proposed consisting in collecting the row data produced in the experimental evaluation and store it in a multidimensional data structure. This paper reports the work in progress activities of the entire process of collecting, storing and analyzing the experimental data in order to perform a sound experimental evaluation. This is done through describing the various steps on a running example.
可靠性评估技术,如基于测试或基于计算机故障现场数据分析的可靠性评估技术,是评估复杂和关键系统的基本过程。最近提出了一种新的方法[3],该方法包括收集实验评估中产生的行数据并将其存储在多维数据结构中。本文报告了实验数据收集、存储和分析的整个过程中正在进行的工作活动,以便进行完善的实验评价。这是通过描述一个正在运行的示例中的各个步骤来完成的。
{"title":"Practical Aspects in Analyzing and Sharing the Results of Experimental Evaluation","authors":"F. Brancati, A. Bondavalli","doi":"10.1109/SRDS.2010.46","DOIUrl":"https://doi.org/10.1109/SRDS.2010.46","url":null,"abstract":"Dependability evaluation techniques such as the ones based on testing, or on the analysis of field data on computer faults, are a fundamental process in assessing complex and critical systems. Recently a new approach [3] has been proposed consisting in collecting the row data produced in the experimental evaluation and store it in a multidimensional data structure. This paper reports the work in progress activities of the entire process of collecting, storing and analyzing the experimental data in order to perform a sound experimental evaluation. This is done through describing the various steps on a running example.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116512211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Invariants Based Failure Diagnosis in Distributed Computing Systems 基于不变量的分布式计算系统故障诊断
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.26
Haifeng Chen, Guofei Jiang, K. Yoshihira, Akhilesh Saxena
This paper presents an instance based approach to diagnosing failures in computing systems. Owing to the fact that a large portion of occurred failures are repeated ones, our method takes advantage of past experiences by storing historical failures in a database and retrieving similar instances in the occurrence of failure. We extract the system ‘invariants’ by modeling consistent dependencies between system attributes during the operation, and construct a network graph based on the learned invariants. When a failure happens, the status of invariants network, i.e., whether each invariant link is broken or not, provides a view of failure characteristics. We use a high dimensional binary vector to store those failure evidences, and develop a novel algorithm to efficiently retrieve failure signatures from the database. Experimental results in a web based system have demonstrated the effectiveness of our method in diagnosing the injected failures.
本文提出了一种基于实例的计算系统故障诊断方法。由于大部分发生的故障都是重复的,我们的方法利用了过去的经验,将历史故障存储在数据库中,并检索发生故障时的类似实例。我们通过在操作过程中建模系统属性之间的一致依赖关系来提取系统的“不变量”,并基于学习到的不变量构建网络图。当故障发生时,不变量网络的状态,即每个不变量链路是否断开,提供了故障特征的视图。我们使用高维二值向量来存储这些故障证据,并开发了一种新的算法来有效地从数据库中检索故障特征。在一个基于web的系统上的实验结果证明了该方法对注入故障诊断的有效性。
{"title":"Invariants Based Failure Diagnosis in Distributed Computing Systems","authors":"Haifeng Chen, Guofei Jiang, K. Yoshihira, Akhilesh Saxena","doi":"10.1109/SRDS.2010.26","DOIUrl":"https://doi.org/10.1109/SRDS.2010.26","url":null,"abstract":"This paper presents an instance based approach to diagnosing failures in computing systems. Owing to the fact that a large portion of occurred failures are repeated ones, our method takes advantage of past experiences by storing historical failures in a database and retrieving similar instances in the occurrence of failure. We extract the system ‘invariants’ by modeling consistent dependencies between system attributes during the operation, and construct a network graph based on the learned invariants. When a failure happens, the status of invariants network, i.e., whether each invariant link is broken or not, provides a view of failure characteristics. We use a high dimensional binary vector to store those failure evidences, and develop a novel algorithm to efficiently retrieve failure signatures from the database. Experimental results in a web based system have demonstrated the effectiveness of our method in diagnosing the injected failures.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133732417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
CloudRank: A QoS-Driven Component Ranking Framework for Cloud Computing 云计算的qos驱动组件排序框架
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.29
Zibin Zheng, Yilei Zhang, Michael R. Lyu
The rising popularity of cloud computing makes building high quality cloud applications a critical and urgently required research problem. Component quality ranking approaches are crucial for making optimal component selection from a set of functionally equivalent component candidates. Moreover, quality ranking of cloud components helps the application designers detect the poor performing components in the complex cloud applications, which usually include huge number of distributed components. To provide personalized cloud component ranking for different designers of cloud applications, this paper proposes a QoS-driven component ranking framework for cloud applications by taking advantage of the past component usage experiences of different component users. Our approach requires no additional invocations of the cloud components on behalf of the application designers. The extensive experimental results show that our approach outperforms the competing approaches.
云计算的日益普及使得构建高质量的云应用程序成为一个关键而迫切需要研究的问题。组件质量排序方法对于从一组功能等效的候选组件中进行最优组件选择至关重要。此外,云组件的质量排序有助于应用程序设计人员检测复杂云应用程序中性能较差的组件,这些应用程序通常包含大量分布式组件。为了给不同的云应用设计者提供个性化的云组件排名,本文利用不同组件用户过去的组件使用经验,提出了一个qos驱动的云应用组件排名框架。我们的方法不需要代表应用程序设计人员对云组件进行额外调用。大量的实验结果表明,我们的方法优于竞争对手的方法。
{"title":"CloudRank: A QoS-Driven Component Ranking Framework for Cloud Computing","authors":"Zibin Zheng, Yilei Zhang, Michael R. Lyu","doi":"10.1109/SRDS.2010.29","DOIUrl":"https://doi.org/10.1109/SRDS.2010.29","url":null,"abstract":"The rising popularity of cloud computing makes building high quality cloud applications a critical and urgently required research problem. Component quality ranking approaches are crucial for making optimal component selection from a set of functionally equivalent component candidates. Moreover, quality ranking of cloud components helps the application designers detect the poor performing components in the complex cloud applications, which usually include huge number of distributed components. To provide personalized cloud component ranking for different designers of cloud applications, this paper proposes a QoS-driven component ranking framework for cloud applications by taking advantage of the past component usage experiences of different component users. Our approach requires no additional invocations of the cloud components on behalf of the application designers. The extensive experimental results show that our approach outperforms the competing approaches.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126067727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 108
DKSM: Subverting Virtual Machine Introspection for Fun and Profit DKSM:颠覆虚拟机自省的乐趣和利益
Pub Date : 2010-10-31 DOI: 10.1109/srds.2010.39
Sina Bahram, Xuxian Jiang, Zhi Wang, Michael C. Grace, Jinku Li, D. Srinivasan, J. Rhee, Dongyan Xu
Virtual machine (VM) introspection is a powerful technique for determining the specific aspects of guest VM execution from outside the VM. Unfortunately, existing introspection solutions share a common questionable assumption. This assumption is embodied in the expectation that original kernel data structures are respected by the untrusted guest and thus can be directly used to bridge the well-known semantic gap. In this paper, we assume the perspective of the attacker, and exploit this questionable assumption to subvert VM introspection. In particular, we present an attack called DKSM (Direct Kernel Structure Manipulation), and show that it can effectively foil existing VM introspection solutions into providing false information. By assuming this perspective, we hope to better understand the challenges and opportunities for the development of future reliable VM introspection solutions that are not vulnerable to the proposed attack.
虚拟机(VM)自省是一种强大的技术,用于从VM外部确定来宾VM执行的特定方面。不幸的是,现有的自省解决方案都有一个共同的可疑假设。这一假设体现在期望原始内核数据结构受到不受信任的客户机的尊重,从而可以直接用于弥合众所周知的语义差距。在本文中,我们假设攻击者的角度,并利用这个可疑的假设来破坏VM自省。特别是,我们提出了一种称为DKSM(直接内核结构操纵)的攻击,并表明它可以有效地阻止现有的VM自省解决方案提供虚假信息。通过假设这个观点,我们希望更好地理解未来可靠的VM自省解决方案开发的挑战和机遇,这些解决方案不容易受到提议的攻击。
{"title":"DKSM: Subverting Virtual Machine Introspection for Fun and Profit","authors":"Sina Bahram, Xuxian Jiang, Zhi Wang, Michael C. Grace, Jinku Li, D. Srinivasan, J. Rhee, Dongyan Xu","doi":"10.1109/srds.2010.39","DOIUrl":"https://doi.org/10.1109/srds.2010.39","url":null,"abstract":"Virtual machine (VM) introspection is a powerful technique for determining the specific aspects of guest VM execution from outside the VM. Unfortunately, existing introspection solutions share a common questionable assumption. This assumption is embodied in the expectation that original kernel data structures are respected by the untrusted guest and thus can be directly used to bridge the well-known semantic gap. In this paper, we assume the perspective of the attacker, and exploit this questionable assumption to subvert VM introspection. In particular, we present an attack called DKSM (Direct Kernel Structure Manipulation), and show that it can effectively foil existing VM introspection solutions into providing false information. By assuming this perspective, we hope to better understand the challenges and opportunities for the development of future reliable VM introspection solutions that are not vulnerable to the proposed attack.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133564219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 177
Attack Injection to Support the Evaluation of Ad Hoc Networks 支持Ad Hoc网络评估的攻击注入
Pub Date : 2010-10-31 DOI: 10.1109/SRDS.2010.11
Jesus Friginal, D. Andrés, Juan-Carlos Ruiz-Garcia, P. Gil
The increasing emergence of mobile computing devices seamlessly providing wireless communication capabilities opens a wide range of new application domains for ad hoc networks. However, the sensitivity of ad hoc routing protocols to malicious faults (attacks) limits in practice their confident use in commercial products. This requires not only practical means to enforce the security of these protocols, but also approaches to evaluate their behaviour in the presence of attacks. Our previous contribution to the evaluation of ad hoc networks has been focused on the definition of an approach for injecting grey hole attacks in real (non-simulated) ad hoc networks. This paper relies on the use of this methodology to evaluate (i) three different implementations of a proactive ad hoc routing protocol, named OLSR, and (ii) two ad hoc routing protocols of different nature, one proactive (OLSR) and one reactive (AODV). Reported results have proven useful to extend the applicability of attack injection methodologies for evaluation beyond the mere assessment of the robustness of ad hoc routing protocols.
不断涌现的移动计算设备无缝地提供无线通信功能,为自组织网络开辟了广泛的新应用领域。然而,自组织路由协议对恶意故障(攻击)的敏感性在实践中限制了其在商业产品中的可靠使用。这不仅需要实际的手段来加强这些协议的安全性,还需要在存在攻击时评估其行为的方法。我们之前对ad hoc网络评估的贡献主要集中在定义在真实(非模拟)ad hoc网络中注入灰洞攻击的方法。本文依赖于使用这种方法来评估(i)一种名为OLSR的主动自组织路由协议的三种不同实现,以及(ii)两种不同性质的自组织路由协议,一种主动(OLSR)和一种被动(AODV)。报告的结果已被证明有助于扩展攻击注入方法的适用性,以进行评估,而不仅仅是评估自组织路由协议的鲁棒性。
{"title":"Attack Injection to Support the Evaluation of Ad Hoc Networks","authors":"Jesus Friginal, D. Andrés, Juan-Carlos Ruiz-Garcia, P. Gil","doi":"10.1109/SRDS.2010.11","DOIUrl":"https://doi.org/10.1109/SRDS.2010.11","url":null,"abstract":"The increasing emergence of mobile computing devices seamlessly providing wireless communication capabilities opens a wide range of new application domains for ad hoc networks. However, the sensitivity of ad hoc routing protocols to malicious faults (attacks) limits in practice their confident use in commercial products. This requires not only practical means to enforce the security of these protocols, but also approaches to evaluate their behaviour in the presence of attacks. Our previous contribution to the evaluation of ad hoc networks has been focused on the definition of an approach for injecting grey hole attacks in real (non-simulated) ad hoc networks. This paper relies on the use of this methodology to evaluate (i) three different implementations of a proactive ad hoc routing protocol, named OLSR, and (ii) two ad hoc routing protocols of different nature, one proactive (OLSR) and one reactive (AODV). Reported results have proven useful to extend the applicability of attack injection methodologies for evaluation beyond the mere assessment of the robustness of ad hoc routing protocols.","PeriodicalId":219204,"journal":{"name":"2010 29th IEEE Symposium on Reliable Distributed Systems","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115398074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2010 29th IEEE Symposium on Reliable Distributed Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1