Skip to main content

2021 | OriginalPaper | Buchkapitel

9. Evaluation and Design of Performable Distributed Systems

verfasst von : Naazira B. Bhat, Dulip Madurasinghe, Ilker Ozcelik, Richard R. Brooks, Ganesh Kumar Venayagamoorthy, Anthony Skjellum

Erschienen in: Handbook of Advanced Performability Engineering

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Performability measures system performance including quality, reliability, maintainability and availability over time, regardless of faults. This is challenging for distributed systems, since the internet was designed as a best-effort network that does not guarantee that data delivery meets a certain level of quality of service. In this chapter, we explain the design, test and performability evaluation of distributed systems by utilizing adversarial components. In our approach, the system design uses adversarial logic to make the system robust. In system test, we can leverage existing, powerful attacks to verify our design by using existing denial of service (DoS) attacks to stress the system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Myerson, R. B. (1997). Game theory: Analysis of conflict. Harvard University Press. Myerson, R. B. (1997). Game theory: Analysis of conflict. Harvard University Press.
2.
Zurück zum Zitat Shubik, M. (1982). Game theory in the social sciences (Vol. 1). The MIT Press. Shubik, M. (1982). Game theory in the social sciences (Vol. 1). The MIT Press.
3.
Zurück zum Zitat Leven, S. (1996). Models of market behavior: Bringing realistic games to market. In IEEE/IAFE 1996 Conference on Computational Intelligence for Financial Engineering (CIFEr), (pp. 41–48). Leven, S. (1996). Models of market behavior: Bringing realistic games to market. In IEEE/IAFE 1996 Conference on Computational Intelligence for Financial Engineering (CIFEr), (pp. 41–48).
4.
Zurück zum Zitat Chen, M., Tian, S., & Chen, P. (2015). Evolutionary game analysis between service of public library and the investment of government. In 2015 7th International Conference on Intelligent Human-Machine Systems and Cybernetics (Vol. 1, pp. 191–194). Chen, M., Tian, S., & Chen, P. (2015). Evolutionary game analysis between service of public library and the investment of government. In 2015 7th International Conference on Intelligent Human-Machine Systems and Cybernetics (Vol. 1, pp. 191–194).
5.
Zurück zum Zitat Trestian, R., Ormond, O.,& Muntean, G. (2012). Game theory-based network selection: Solutions and challenges. IEEE Communications Surveys Tutorials, 14(4), 1212–1231, Fourth 2012. Trestian, R., Ormond, O.,& Muntean, G. (2012). Game theory-based network selection: Solutions and challenges. IEEE Communications Surveys Tutorials, 14(4), 1212–1231, Fourth 2012.
6.
Zurück zum Zitat Changwon Kim, R. L. (2014). Game theory based autonomous vehicles operation. International Journal of Vehicle Design, 65(4), 360–383. Changwon Kim, R. L. (2014). Game theory based autonomous vehicles operation. International Journal of Vehicle Design, 65(4), 360–383.
7.
Zurück zum Zitat Li, C. (2013). Z-test of computer-and-internet-aided multimodal English listening and speaking. In 2013 IEEE Third International Conference on Information Science and Technology (ICIST) (pp. 98–101). Li, C. (2013). Z-test of computer-and-internet-aided multimodal English listening and speaking. In 2013 IEEE Third International Conference on Information Science and Technology (ICIST) (pp. 98–101).
8.
Zurück zum Zitat Bo, P., Hai, L., & Xing, J. (2009). A new sampling test method for maximum maintenance time of normal distribution items. In 2009 IEEE 10th International Conference on Computer-Aided Industrial Design Conceptual Design (pp. 2210–2212). Bo, P., Hai, L., & Xing, J. (2009). A new sampling test method for maximum maintenance time of normal distribution items. In 2009 IEEE 10th International Conference on Computer-Aided Industrial Design Conceptual Design (pp. 2210–2212).
9.
Zurück zum Zitat Hegde, V., Pallavi, M. S. (2015). Descriptive analytical approach to analyze the student performance by comparative study using z score factor through r language. In 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) (pp. 1–4). Hegde, V., Pallavi, M. S. (2015). Descriptive analytical approach to analyze the student performance by comparative study using z score factor through r language. In 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC) (pp. 1–4).
10.
Zurück zum Zitat Nash, J. F. Equillibrium points in N-person Games. Proceedings of the National Academy of Sciences of the United States of America, 36(1), 48–49. Nash, J. F. Equillibrium points in N-person Games. Proceedings of the National Academy of Sciences of the United States of America, 36(1), 48–49.
11.
Zurück zum Zitat Ozcelik, I., & Brooks, R. (2020). Distributed denial of service attacks: Real-world detection and mitigation. Ozcelik, I., & Brooks, R. (2020). Distributed denial of service attacks: Real-world detection and mitigation.
12.
Zurück zum Zitat Kan, L., Wei, Y., Hafiz Muhammad, A., Siyuan, W., Linchao, G., Kai, H. (2018). A multiple blockchains architecture on inter-blockchain communication. In 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C) (pp. 139–145). Kan, L., Wei, Y., Hafiz Muhammad, A., Siyuan, W., Linchao, G., Kai, H. (2018). A multiple blockchains architecture on inter-blockchain communication. In 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C) (pp. 139–145).
13.
Zurück zum Zitat Miller, D. (2018). Blockchain and the internet of Things in the industrial sector. IT Professional, 20(3), 15–18.CrossRef Miller, D. (2018). Blockchain and the internet of Things in the industrial sector. IT Professional, 20(3), 15–18.CrossRef
14.
Zurück zum Zitat Fiaidhi, J., Mohammed, S., & Mohammed, S. (2018). EDI with blockchain as an enabler for extreme automation. IT Professional, 20(4), 66–72.CrossRef Fiaidhi, J., Mohammed, S., & Mohammed, S. (2018). EDI with blockchain as an enabler for extreme automation. IT Professional, 20(4), 66–72.CrossRef
15.
Zurück zum Zitat Samaniego, M., & Deters, R. (2016). Blockchain as a service for IoT. In 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (pp. 433–436) Samaniego, M., & Deters, R. (2016). Blockchain as a service for IoT. In 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (pp. 433–436)
16.
Zurück zum Zitat van Gulik, D. -W. (2011). Retrieved from https://mail-archives.apache.org/mod_mbox/httpdannounce/201108.mbox/<20110824161640.122D387DD@minotaur.apache.org>. van Gulik, D. -W. (2011). Retrieved from https://​mail-archives.​apache.​org/​mod_​mbox/​httpdannounce/​201108.​mbox/​<20110824161640.​122D387DD@minotaur.apache.org>.
19.
Zurück zum Zitat Mansfield-Devine, S. (2011). DDoS: Threats and mitigation. Network Security, 2011(12), 5–12.CrossRef Mansfield-Devine, S. (2011). DDoS: Threats and mitigation. Network Security, 2011(12), 5–12.CrossRef
20.
Zurück zum Zitat Brooks, R. R. (2004). Disruptive security technologies with mobile code and peer-to-peer networks. CRC Press. Brooks, R. R. (2004). Disruptive security technologies with mobile code and peer-to-peer networks. CRC Press.
21.
Zurück zum Zitat Dingankar, C., & Brooks, R. R. (2007). Denial of service games. In Proceedings of the Third Annual Cyber Security and Information Infrastructure Research Workshop (pp. 7–17). Dingankar, C., & Brooks, R. R. (2007). Denial of service games. In Proceedings of the Third Annual Cyber Security and Information Infrastructure Research Workshop (pp. 7–17).
22.
Zurück zum Zitat Venkatesan, S., Albanese, M., Amin, K., Jajodia, S., Wright, M. (2016). A moving target defense approach to mitigate DDoS attacks against proxy-based architectures. In 2016 IEEE Conference On Communications And Network Security (CNS), (pp. 198–206). IEEE. Venkatesan, S., Albanese, M., Amin, K., Jajodia, S., Wright, M. (2016). A moving target defense approach to mitigate DDoS attacks against proxy-based architectures. In 2016 IEEE Conference On Communications And Network Security (CNS), (pp. 198–206). IEEE.
23.
Zurück zum Zitat Wright, M., Venkatesan, S, Albanese, M., & Wellman, M. P. (2016). Moving target defense against DDoS attacks: An empirical game-theoretic analysis. In Proceedings of the 2016 ACM Workshop on Moving Target Defense (pp. 93–104). Wright, M., Venkatesan, S, Albanese, M., & Wellman, M. P. (2016). Moving target defense against DDoS attacks: An empirical game-theoretic analysis. In Proceedings of the 2016 ACM Workshop on Moving Target Defense (pp. 93–104).
Metadaten
Titel
Evaluation and Design of Performable Distributed Systems
verfasst von
Naazira B. Bhat
Dulip Madurasinghe
Ilker Ozcelik
Richard R. Brooks
Ganesh Kumar Venayagamoorthy
Anthony Skjellum
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-55732-4_9

Neuer Inhalt