Y.
Shietal.
(Eds.
):ICCS2007,PartIII,LNCS4489,pp.
141–144,2007.
Springer-VerlagBerlinHeidelberg2007ExperimentofEventInjectionTechnologyforNetworkDependabilityEvaluationYonggangPang1,HuiqiangWang1,andYeDu21CollegeofComputerScienceandTechnology,HarbinEngeeringUniversity150001Harbin,Chinapangyonggang@hrbeu.
edu.
cn,wanghuiqiang@hrbeu.
edu.
cn2CollegeofComputer,BeijingJiaotongUniversity,100044Beijing,Chinamail_dy@163.
comAbstract.
Dependabilityevaluationofcomputernetworkisanintegratedandcomplexresearchproblem.
Evolvingfromfaultinjection,eventinjectioncanbebetterusedtoevaluatedependabilityofcomputernetworksystem.
Accordingtotheprincipleofeventinjection,anexperimentmodelfornetworkdependabilityevaluationwasdesignedandcorrelativeexperimentswerecarriedout.
Atlast,applicationofeventinjectionfordependabilityevaluationoncomputernetworkwasdiscussed.
Keywords:dependabilityevaluation;eventinjection;DDoS;Loadrunner.
1IntroductionInsomeimportantdomains,suchasnationaldefense,avigation,financeandtranspor-tation,dependabilityofitscomputernetworksystemisanimportantproblem.
De-pendabilityofasystemisrelatedtonetworkreliability,availability,securityandsafety,sohowtoevaluatetheintegrateddependabilityisaproblemtobesolvedur-gently[1].
Nowadays,theresearchondependabilityofcomputernetworksystemconcludesimportantserversystem,small-sizenetworkandwebapplicationnetwork,andtheconceptionofdependabilityisstilldeveloping.
However,method,modelandrelativeindexsystemofdependabilityevaluationarelacking,researchonthesedo-mainssillneedtobefurthercarriedon.
Eventinjectiontechnologyisintroducedtotheresearchondependabilityevalua-tionofnetworksystem,bywhichtheintegrateddependabilityofatargetsystemcanbetested[2].
Eventinjectiontechnologyadaptsbettertotheexperimentinthecom-puternetworkenvironmentthanfaultinjection.
Intheeventinjectionexperiment,relativecharacteristiceventscanbeinjectedintothesystemtocheckitsreactionac-cordingtotherelativeattributesandcharactersofdependabilityevaluation.
Thispapersequentiallydissertatestheconceptionofeventinjectiontechnology,someeventinjectionexperimentsandintegratedjudgmenttotheexperiments.
Atlast,someproblemsofeventinjectiontechnologyinnetworkexperimentarediscussed.
142Y.
Pang,H.
Wang,andY.
Du2DependabilityofComputerNetworkThenewconceptionofdependability[3]wasformallyadvancedbyJ.
C.
Lapriein1985,whichincludedconceptionsofreliability,availability,maintainabilityandsafetyatthattime,thatistosay,thereliablecomputingandfault-tolerancewerejoinedintothecon-ceptionofdependability.
Fromthemediumtermof1980s',fault-tolerancetechnologywasappliedtodealwiththesecuritythreatandaseriesofexploringresearchesonhos-tilefailureproblemsledtoafusionofthetwoconceptionsofsecurityanddependablecomputing.
Afterthat,deepandclosediscussionofsomeexpertscausedtheappearanceofanacademicpatentwhichhasfurthereffect[4].
Afterthat,J.
C.
Lapriedeeperillus-tratedhisviewpointmanytimesatdifferentoccasions.
After1995,withtheworseningofInternetsecurity,togetherwiththedevelopingofsecuritytechnologiesandchangingofattackmeans,peoplehadtoafreshscantheessenceofdependablecomputingandsecuritycomputing.
AndthenewconsiderationofdependablecomputingandsecuritycomputingbyA.
Avizienis,,J.
C.
LaprieBrianRandell,andCarlLandwehrreflectedthenewestchanges.
CorrelativeconceptionsincludingtrustedcomputingfromU.
S.
military[5]andtrustworthycomputingadvancedbyBillGatesofMicrosoftdeveloped.
Duringre-searchondependability[6],correlativeconceptionsaredevelopingcontinuously,butthereisn'tuniformstandard.
3EventInjectionModelDuringthedependabilityevaluationonsystem,therewerenotonlytraditionalexactmodelssuchasthenetworkhardwarereliabilityproblems,butalsothenon-accuratemodels,suchasthesecurityproblem,soeventinjectionevolvingfromfaultinjectioncansolvetheseproblemsbetter.
Eventinjectiontechnologyisanexperimentalprocess,inwhichdifferentkindsofsystemeventsincludingreliabilityevents,availabilityevents,securityeventsofnet-worksystemareinjectedintothetargetsystem,atthesametime,responseinforma-tionofinjectedeventsisanalyzedorcalledbackbycorrespondingsystem,andatlastrelativeresultsareprovidedtoexperimenters.
Keytechnologiesaffectingthedepend-abilityevaluationresultbyeventinjectiontechnologymainlyare:selectionofeventmodellibrary,statisticaleventcoverage,andexperimentcomprehensiveevaluation.
3.
1SelectionofEventModelLibraryEventmodellibraryshouldincludetheeventsthatcaninfluencetheserviceabilityofthetargetsystem.
Theinjectedeventmodelselectedismoresimilartotheeventsoccurredduringtheactualrunningofthesystemorcoversthemtothegreatestextent,theresultsoftheexperimentwillbemoreaccurate.
Asuitableeventmodellibraryshouldfollowtwoprinciples:Firstly,itshouldincludeamajorityofeventmodelsthatcaninfluencetheactualrunningofthesystemandcauseperformancedeclineofthetargetcomputersystems;Secondly,eventmodelsinitcandetectthevulnerabilityofthetargetsystem.
ExperimentofEventInjectionTechnologyforNetworkDependabilityEvaluation1433.
2StatisticalEventCoverageTheeventsinjectedintoanrunningsystemcan'tincludealloftheeventsfacedbysystemapplicationsandinjectionstrategyofoneeventcan'trepresententirein-stances,atthesametime,harmextentsofdifferenteventsfacedbysystemarediffer-entfromeachother,soduringthedependabilityevaluationonthetargetsystem,thesatisfactorydegreewhichisnamedasstatisticaleventcoverageshouldhaveacredi-bilityinterval.
3.
3ExperimentComprehensiveEvaluationComputernetworkdependabilityevaluationincludesreliability,availability,safetyandsecurity,andsoon,moreoverthenetworksystemcanbedividedintolocalareanetwork,distributednetworkandinternet,thereforethenetworksystemdependabilityresearchisverybroad,thecorrespondingtestdatawillbemassive,howtoobtainasystem'dependabilitydegreeisacomplexquestion.
4EventInjectionExperimentInthenetworkdependabilityevaluation,thenetworkserviceperformanceandsecu-rityareveryimportant.
Thisarticlesimulatesandevaluatesthewebserverinnetworkusingeventinjectiontechnology,useLoadrunnertotestthebasicperformanceofthenetworkandusetheDDoSattacktesttoinfluencethesystem.
Thisexperimentistotesttheoperatingperformanceofthetargetsystem,Load-Runner8.
0testsoftwareisused.
Theresultscanthenbeanalyzedindetails,toexplorethereasonsforparticularbehaviour.
thedatainTable1willbeusedastheindexdatainthedependabilityevaluationtothetargetserversystem.
Table1.
MaintesingdataofwebseverMeasureeventsindexminmaxaverageConnectionshutdowns0.
12583.
06342.
497connectionrateNewconnections0.
10783.
12542.
563errorrateError-2662805.
4382.
745HitsperSecHits/s0.
286153.
06375.
377HTTP_2000.
14391.
84441.
775HTTP_403075.
7533.
291HTTPRe-sponsesperSec_HTTP_40400.
6250.
311flowspeedB/s2313591651340855DDoSmakesthefailureofattackednetworkserver.
InFigure1andFigure2,theserveraverageresponsetimeincreasesalongwiththeattackflowincrease,themeanflowspeedreducesalongwiththeattackflowincrease.
Atthesametime,alongwiththeattackdurationextension,theserveraverageresponsetimeincreases,meanflowspeedreduces.
Whentheattackcomputerincreases,theserverresponse144Y.
Pang,H.
Wang,andY.
DuFig.
1.
AverageresponsetimecurvesofserverFig.
2.
Averageflowspeedcurvesofservertimeobviouslyincreases,withtheserverprocessingattackrequesteventincreases,theserverresponseslowsdowneveninthesameflowsituation.
5ConclusionsIntheexperimentmethod,eventinjectiontechnologycanpreferablysolvetheprob-lemsofnetworkdependabilityevaluation.
Eventinjectiontechnologycannotonlyanalyzethecaseswhenthetargetsystemfailbutalsoanalyzethecaseswhenthecapabilityoftargetsystemperformancedeclinesorthesystemnotbeingabletooffersatisfiedservicestousers.
References1.
YvesDeswarte,KaramaKanoun,Jeam-ClaudeLaprie.
Diversityagainstaccidentalandde-liberatefaults.
PRDC'99,HongKong,1999.
2.
HuiqiangWang,YonggangPang,YeDu.
Evaluationofnetworkdependabilityusingeventinjection.
In:ProcoftheAPWeb2006Int'1Workshop:XRA,IWSN,MEGA,andICSE.
Berlin:Springer,(2006)991-998.
3.
J.
C.
Laprie.
DependableComputingandFaultTolerance:ConceptsandTerminology.
Proc.
15thIEEEInt'lSymp.
Fault-TolerantComputing(FTCS-15),(1985)2-11.
4.
J.
C.
Laprie,ed.
Dependability:basicconceptsandterminology-inEnglish,French,German,ItalianandJapanese.
InDependableComputingandFaultTolerance.
Springer-Verlag,Vienna,(1992)265.
5.
Departmentofdefensetrustedcomputersystemevaluationcriteria.
http://www.
radium.
ncsc.
mil/tpep/library/rainbow/5200.
28-STD.
html.
6.
BillGates.
TrustworthyComputing,2002.
Sharktech 鲨鱼机房商家我们是不是算比较熟悉的,因为有很多的服务商渠道的高防服务器都是拿他们家的机器然后部署高防VPS主机的,不过这几年Sharktech商家有自己直接销售云服务器产品,比如看到有新增公有云主机有促销活动,一般有人可能买回去自己搭建虚拟主机拆分销售的,有的也是自用的。有看到不少网友在分享到鲨鱼机房商家促销活动期间,有赠送开通公有云主机$50,可以购买最低配置的,$49/月的...
ftlcloud怎么样?ftlcloud(超云)目前正在搞暑假促销,美国圣何塞数据中心的云服务器低至9元/月,系统盘与数据盘分离,支持Windows和Linux,免费防御CC攻击,自带10Gbps的DDoS防御。FTL-超云服务器的主要特色:稳定、安全、弹性、高性能的云端计算服务,快速部署,并且可根据业务需要扩展计算能力,按需付费,节约成本,提高资源的有效利用率。点击进入:ftlcloud官方网站...
这两天Linode发布了十八周年的博文和邮件,回顾了过去取得的成绩和对未来的展望。作为一家运营18年的VPS主机商,Linode无疑是有一些可取之处的,商家提供基于KVM架构的VPS主机,支持随时删除(按小时计费),可选包括美国、英国、新加坡、日本、印度、加拿大、德国等全球十多个数据中心,所有机器提供高出入网带宽,最低仅$5/月($0.0075/小时)。This month marks Linod...
http代理服务器软件为你推荐
开启javascript开启 JavaScript,重庆电信断网为什么重庆电信沙坪坝天星桥这网络老是掉线asp.net网页制作ASP.NET设计网页的方法?www.topit.mehttp://www.topit.me/ 中自己上传的照片如何删除平阴县教育和体育局下属锦东小学教学设备采购项目竞争性磋商文件上海市浦东新区人民法院民事判决书(2009)浦民三(知)初字第206号易名网诚询,易名网注册的域名怎么转到喜欢的网页上啊?三五互联股票三五互联是干什么的?discuz伪静态discuz怎么才能把专题目录也实现伪静态的方法详解团购程序有什么好用的社区团购小程序?
.cn域名注册 rak机房 名片模板psd 12306抢票助手 免空 免费个人空间 softbank邮箱 新家坡 空间合租 免费私人服务器 江苏双线服务器 个人免费主页 便宜空间 789 上海电信测速 cxz asp空间 windowssever2008 侦探online 卡巴斯基免费版 更多