{"title":"基于n版本编程技术的入侵容忍软件的多数派投票人","authors":"Zahra Aghajani, M. A. Azgomi","doi":"10.1109/IIT.2009.5413780","DOIUrl":null,"url":null,"abstract":"One of the drawbacks of the existing majority voters, which are widely used in N-version programming (NVP) technique, is the high probability of agreement on incorrect results generated by variants. Therefore, to propose an intrusion-tolerant software architecture based on NVP for hostile environments and to consider possible attacks, a new voting scheme is required. In this paper, we propose a voting scheme to improve the correctness of the binary majority voters in the hostile environments to treat the situations that more than half of the variants may have been compromised. We have used stochastic activity networks (SANs) to model the scheme for a triple-version programming (3VP) system and measure the probability of detecting the correct outputs by the voter. The evaluation results showed that the proposed scheme can improve the correctness of the classic majority voting algorithms to detect the correct output, especially the intrusion detection mechanisms are used in the scheme.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A majority voter for intrusion tolerant software based on N-version programming techniques\",\"authors\":\"Zahra Aghajani, M. A. Azgomi\",\"doi\":\"10.1109/IIT.2009.5413780\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the drawbacks of the existing majority voters, which are widely used in N-version programming (NVP) technique, is the high probability of agreement on incorrect results generated by variants. Therefore, to propose an intrusion-tolerant software architecture based on NVP for hostile environments and to consider possible attacks, a new voting scheme is required. In this paper, we propose a voting scheme to improve the correctness of the binary majority voters in the hostile environments to treat the situations that more than half of the variants may have been compromised. We have used stochastic activity networks (SANs) to model the scheme for a triple-version programming (3VP) system and measure the probability of detecting the correct outputs by the voter. The evaluation results showed that the proposed scheme can improve the correctness of the classic majority voting algorithms to detect the correct output, especially the intrusion detection mechanisms are used in the scheme.\",\"PeriodicalId\":239829,\"journal\":{\"name\":\"2009 International Conference on Innovations in Information Technology (IIT)\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Innovations in Information Technology (IIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IIT.2009.5413780\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Innovations in Information Technology (IIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IIT.2009.5413780","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A majority voter for intrusion tolerant software based on N-version programming techniques
One of the drawbacks of the existing majority voters, which are widely used in N-version programming (NVP) technique, is the high probability of agreement on incorrect results generated by variants. Therefore, to propose an intrusion-tolerant software architecture based on NVP for hostile environments and to consider possible attacks, a new voting scheme is required. In this paper, we propose a voting scheme to improve the correctness of the binary majority voters in the hostile environments to treat the situations that more than half of the variants may have been compromised. We have used stochastic activity networks (SANs) to model the scheme for a triple-version programming (3VP) system and measure the probability of detecting the correct outputs by the voter. The evaluation results showed that the proposed scheme can improve the correctness of the classic majority voting algorithms to detect the correct output, especially the intrusion detection mechanisms are used in the scheme.