Y.
Shietal.
(Eds.
):ICCS2007,PartIII,LNCS4489,pp.
141–144,2007.
Springer-VerlagBerlinHeidelberg2007ExperimentofEventInjectionTechnologyforNetworkDependabilityEvaluationYonggangPang1,HuiqiangWang1,andYeDu21CollegeofComputerScienceandTechnology,HarbinEngeeringUniversity150001Harbin,Chinapangyonggang@hrbeu.
edu.
cn,wanghuiqiang@hrbeu.
edu.
cn2CollegeofComputer,BeijingJiaotongUniversity,100044Beijing,Chinamail_dy@163.
comAbstract.
Dependabilityevaluationofcomputernetworkisanintegratedandcomplexresearchproblem.
Evolvingfromfaultinjection,eventinjectioncanbebetterusedtoevaluatedependabilityofcomputernetworksystem.
Accordingtotheprincipleofeventinjection,anexperimentmodelfornetworkdependabilityevaluationwasdesignedandcorrelativeexperimentswerecarriedout.
Atlast,applicationofeventinjectionfordependabilityevaluationoncomputernetworkwasdiscussed.
Keywords:dependabilityevaluation;eventinjection;DDoS;Loadrunner.
1IntroductionInsomeimportantdomains,suchasnationaldefense,avigation,financeandtranspor-tation,dependabilityofitscomputernetworksystemisanimportantproblem.
De-pendabilityofasystemisrelatedtonetworkreliability,availability,securityandsafety,sohowtoevaluatetheintegrateddependabilityisaproblemtobesolvedur-gently[1].
Nowadays,theresearchondependabilityofcomputernetworksystemconcludesimportantserversystem,small-sizenetworkandwebapplicationnetwork,andtheconceptionofdependabilityisstilldeveloping.
However,method,modelandrelativeindexsystemofdependabilityevaluationarelacking,researchonthesedo-mainssillneedtobefurthercarriedon.
Eventinjectiontechnologyisintroducedtotheresearchondependabilityevalua-tionofnetworksystem,bywhichtheintegrateddependabilityofatargetsystemcanbetested[2].
Eventinjectiontechnologyadaptsbettertotheexperimentinthecom-puternetworkenvironmentthanfaultinjection.
Intheeventinjectionexperiment,relativecharacteristiceventscanbeinjectedintothesystemtocheckitsreactionac-cordingtotherelativeattributesandcharactersofdependabilityevaluation.
Thispapersequentiallydissertatestheconceptionofeventinjectiontechnology,someeventinjectionexperimentsandintegratedjudgmenttotheexperiments.
Atlast,someproblemsofeventinjectiontechnologyinnetworkexperimentarediscussed.
142Y.
Pang,H.
Wang,andY.
Du2DependabilityofComputerNetworkThenewconceptionofdependability[3]wasformallyadvancedbyJ.
C.
Lapriein1985,whichincludedconceptionsofreliability,availability,maintainabilityandsafetyatthattime,thatistosay,thereliablecomputingandfault-tolerancewerejoinedintothecon-ceptionofdependability.
Fromthemediumtermof1980s',fault-tolerancetechnologywasappliedtodealwiththesecuritythreatandaseriesofexploringresearchesonhos-tilefailureproblemsledtoafusionofthetwoconceptionsofsecurityanddependablecomputing.
Afterthat,deepandclosediscussionofsomeexpertscausedtheappearanceofanacademicpatentwhichhasfurthereffect[4].
Afterthat,J.
C.
Lapriedeeperillus-tratedhisviewpointmanytimesatdifferentoccasions.
After1995,withtheworseningofInternetsecurity,togetherwiththedevelopingofsecuritytechnologiesandchangingofattackmeans,peoplehadtoafreshscantheessenceofdependablecomputingandsecuritycomputing.
AndthenewconsiderationofdependablecomputingandsecuritycomputingbyA.
Avizienis,,J.
C.
LaprieBrianRandell,andCarlLandwehrreflectedthenewestchanges.
CorrelativeconceptionsincludingtrustedcomputingfromU.
S.
military[5]andtrustworthycomputingadvancedbyBillGatesofMicrosoftdeveloped.
Duringre-searchondependability[6],correlativeconceptionsaredevelopingcontinuously,butthereisn'tuniformstandard.
3EventInjectionModelDuringthedependabilityevaluationonsystem,therewerenotonlytraditionalexactmodelssuchasthenetworkhardwarereliabilityproblems,butalsothenon-accuratemodels,suchasthesecurityproblem,soeventinjectionevolvingfromfaultinjectioncansolvetheseproblemsbetter.
Eventinjectiontechnologyisanexperimentalprocess,inwhichdifferentkindsofsystemeventsincludingreliabilityevents,availabilityevents,securityeventsofnet-worksystemareinjectedintothetargetsystem,atthesametime,responseinforma-tionofinjectedeventsisanalyzedorcalledbackbycorrespondingsystem,andatlastrelativeresultsareprovidedtoexperimenters.
Keytechnologiesaffectingthedepend-abilityevaluationresultbyeventinjectiontechnologymainlyare:selectionofeventmodellibrary,statisticaleventcoverage,andexperimentcomprehensiveevaluation.
3.
1SelectionofEventModelLibraryEventmodellibraryshouldincludetheeventsthatcaninfluencetheserviceabilityofthetargetsystem.
Theinjectedeventmodelselectedismoresimilartotheeventsoccurredduringtheactualrunningofthesystemorcoversthemtothegreatestextent,theresultsoftheexperimentwillbemoreaccurate.
Asuitableeventmodellibraryshouldfollowtwoprinciples:Firstly,itshouldincludeamajorityofeventmodelsthatcaninfluencetheactualrunningofthesystemandcauseperformancedeclineofthetargetcomputersystems;Secondly,eventmodelsinitcandetectthevulnerabilityofthetargetsystem.
ExperimentofEventInjectionTechnologyforNetworkDependabilityEvaluation1433.
2StatisticalEventCoverageTheeventsinjectedintoanrunningsystemcan'tincludealloftheeventsfacedbysystemapplicationsandinjectionstrategyofoneeventcan'trepresententirein-stances,atthesametime,harmextentsofdifferenteventsfacedbysystemarediffer-entfromeachother,soduringthedependabilityevaluationonthetargetsystem,thesatisfactorydegreewhichisnamedasstatisticaleventcoverageshouldhaveacredi-bilityinterval.
3.
3ExperimentComprehensiveEvaluationComputernetworkdependabilityevaluationincludesreliability,availability,safetyandsecurity,andsoon,moreoverthenetworksystemcanbedividedintolocalareanetwork,distributednetworkandinternet,thereforethenetworksystemdependabilityresearchisverybroad,thecorrespondingtestdatawillbemassive,howtoobtainasystem'dependabilitydegreeisacomplexquestion.
4EventInjectionExperimentInthenetworkdependabilityevaluation,thenetworkserviceperformanceandsecu-rityareveryimportant.
Thisarticlesimulatesandevaluatesthewebserverinnetworkusingeventinjectiontechnology,useLoadrunnertotestthebasicperformanceofthenetworkandusetheDDoSattacktesttoinfluencethesystem.
Thisexperimentistotesttheoperatingperformanceofthetargetsystem,Load-Runner8.
0testsoftwareisused.
Theresultscanthenbeanalyzedindetails,toexplorethereasonsforparticularbehaviour.
thedatainTable1willbeusedastheindexdatainthedependabilityevaluationtothetargetserversystem.
Table1.
MaintesingdataofwebseverMeasureeventsindexminmaxaverageConnectionshutdowns0.
12583.
06342.
497connectionrateNewconnections0.
10783.
12542.
563errorrateError-2662805.
4382.
745HitsperSecHits/s0.
286153.
06375.
377HTTP_2000.
14391.
84441.
775HTTP_403075.
7533.
291HTTPRe-sponsesperSec_HTTP_40400.
6250.
311flowspeedB/s2313591651340855DDoSmakesthefailureofattackednetworkserver.
InFigure1andFigure2,theserveraverageresponsetimeincreasesalongwiththeattackflowincrease,themeanflowspeedreducesalongwiththeattackflowincrease.
Atthesametime,alongwiththeattackdurationextension,theserveraverageresponsetimeincreases,meanflowspeedreduces.
Whentheattackcomputerincreases,theserverresponse144Y.
Pang,H.
Wang,andY.
DuFig.
1.
AverageresponsetimecurvesofserverFig.
2.
Averageflowspeedcurvesofservertimeobviouslyincreases,withtheserverprocessingattackrequesteventincreases,theserverresponseslowsdowneveninthesameflowsituation.
5ConclusionsIntheexperimentmethod,eventinjectiontechnologycanpreferablysolvetheprob-lemsofnetworkdependabilityevaluation.
Eventinjectiontechnologycannotonlyanalyzethecaseswhenthetargetsystemfailbutalsoanalyzethecaseswhenthecapabilityoftargetsystemperformancedeclinesorthesystemnotbeingabletooffersatisfiedservicestousers.
References1.
YvesDeswarte,KaramaKanoun,Jeam-ClaudeLaprie.
Diversityagainstaccidentalandde-liberatefaults.
PRDC'99,HongKong,1999.
2.
HuiqiangWang,YonggangPang,YeDu.
Evaluationofnetworkdependabilityusingeventinjection.
In:ProcoftheAPWeb2006Int'1Workshop:XRA,IWSN,MEGA,andICSE.
Berlin:Springer,(2006)991-998.
3.
J.
C.
Laprie.
DependableComputingandFaultTolerance:ConceptsandTerminology.
Proc.
15thIEEEInt'lSymp.
Fault-TolerantComputing(FTCS-15),(1985)2-11.
4.
J.
C.
Laprie,ed.
Dependability:basicconceptsandterminology-inEnglish,French,German,ItalianandJapanese.
InDependableComputingandFaultTolerance.
Springer-Verlag,Vienna,(1992)265.
5.
Departmentofdefensetrustedcomputersystemevaluationcriteria.
http://www.
radium.
ncsc.
mil/tpep/library/rainbow/5200.
28-STD.
html.
6.
BillGates.
TrustworthyComputing,2002.
WebHorizon是一家去年成立的国外VPS主机商,印度注册,提供虚拟主机和VPS产品,其中VPS包括OpenVZ和KVM架构,有独立IP也有共享IP,数据中心包括美国、波兰、日本、新加坡等(共享IP主机可选机房更多)。目前商家对日本VPS提供一个8折优惠码,优惠后最低款OpenVZ套餐年付10.56美元起。OpenVZCPU:1core内存:256MB硬盘:5G NVMe流量:200GB/1G...
sharktech怎么样?sharktech (鲨鱼机房)是一家成立于 2003 年的知名美国老牌主机商,又称鲨鱼机房或者SK 机房,一直主打高防系列产品,提供独立服务器租用业务和 VPS 主机,自营机房在美国洛杉矶、丹佛、芝加哥和荷兰阿姆斯特丹,所有产品均提供 DDoS 防护。此文只整理他们家10Gbps专用服务器,此外该系列所有服务器都受到高达 60Gbps(可升级到 100Gbps)的保护。...
RAKsmart 商家八月份的促销活动今天更新。基本上和上个月的产品套餐活动差不多的,不过也是有简单的微调。对于RAKsmart商家还是比较了解的,他们家产品虽然这两年增加多个机房,以及在VPS主机方案上有丰富的机房和调整到一些自营机房,他们家的策划能力还是有限,基本上每个月的套餐活动都差不多。RAKsmart 在八月份看到有新增香港高防服务器可选,最高100GB防御。同时原来上个月缺货的日本独立...
http代理服务器软件为你推荐
phpwindPHPWind 都有什么功能企业推广企业营销活动主要包括哪些内容?搜狗360360浏览器为什么不能让我自动登录了163yeahyeah邮箱和163邮箱的区别在哪里 那个好用重庆杨家坪猪肉摊主杀人重庆一市民发现买的新鲜猪肉晚上发蓝光.专家解释,猪肉中含磷较多且携带了一种能发光的细菌--磷光杆菌时ipad代理ipad在哪里买是正品?密码cuteftp123456hd手机卡上出现符号hd怎么取消oa办公软件价格一套OA办公系统多少钱oa办公软件价格一般中小企业用的OA办公系统需要多少钱?
域名到期查询 免费网站域名注册 vps租用 net主机 z.com kddi 免费cdn加速 unsplash 双12活动 权嘉云 vip域名 wordpress中文主题 申请免费空间 lamp兄弟连 SmartAXMT800 新网dns windowssever2008 免费的加速器 vi命令 网络安装 更多