期刊文献+

被动测试中网络监测问题 被引量:1

Network Monitor Problem in Passive Testing
下载PDF
导出
摘要 研究了被动测试中如何放置观察者使得放置的数目最少并且能监视整个网络的运行情况.先把该问题归结为图的顶点覆盖问题,它是一个NP完全问题;接着讨论了在网络拓扑是树的特殊情形下带权和不带权顶点覆盖问题的解,并给出了树结构上带权顶点覆盖问题的线性时间算法;然后在已有的一个近似比为2的算法基础上,结合树结构上不带权顶点覆盖问题的算法给出了图的不带权顶点覆盖问题的一个改进算法,最后用实验验证了改进算法能使观察者数目减小20%左右. The problem that how to place the smallest observers in passive testing and assure they can monitor all the behavior of a network was studied. First the problem was modeled as an instance of vertex cover problem which was an NP-Complete problem. Then the solution to the weighted and unweighted vertex cover problem was discussed in the special case that the topology of network is a tree, and linear time algorithms for weighted vertex cover problem were proposed. Based on an existing algorithm whose approximate rate is 2, an improved algorithm for unweighted vertex cover problem on graphic topology was proposed by combining with the algorithm for unwighted vertex cover problem on tree topology, and a simulating experiment showed the improved algorithm can reduce the number of the observers by about 20%.
出处 《天津大学学报》 EI CAS CSCD 北大核心 2006年第7期801-805,共5页 Journal of Tianjin University(Science and Technology)
基金 国家自然科学基金重大研究计划资助项目(90104010) 国家自然科学基金(60241004) 国家973计划资助项目(2003CB314801).
关键词 被动测试 NP完全问题 近似算法 passive testing NP-complete problem approximation algorithm
  • 相关文献

参考文献7

  • 1Miller R E, Arisha K A. Fault identification in networks by passive testing[ C]//Proceedings of the 34th Annual Simulation Symposium. Seattle, USA, 2001:277-284.
  • 2Cormen T H. Introduction to Algorithms [ M ]. 2nd ed. Beijing: Higher Education Press, 2002.
  • 3刘湘辉,殷建平,卢锡城,赵建民.基于弱顶点覆盖的网络链路使用带宽监测模型[J].软件学报,2004,15(4):545-549. 被引量:12
  • 4Subhash K, Oded R. Vertex cover might be hard to approximation to within 2 -ε [C]//Proc of the 18th IEEE Annual Conference on Computational Complexity. Los Alamitos,USA, 2003: 379-386.
  • 5王晓东.若干NP完全问题的特殊情形[J].福州大学学报(自然科学版),1999,27(5):10-13. 被引量:6
  • 6Gonzalez T F. A simple LP-free approximation algorithm for the minimum weight vertex cover problem [ J ]. Information Processing Letters, 1995, 54(3):129-131.
  • 7Miller R E. Passive testing of networks using a CFSM specification [ C ] //IEEE International Performance Computing and Communications Conference. Phoenix/Tempe, USA,1998 : 111-116.

二级参考文献3

  • 1刘湘辉 殷建平 唐乐乐 赵建民.网络流量的有效测量方法分析.软件学报,2003.14(2)300~304.http://www.jos.org.cn/ 1000-9825/14/300.htm.,.
  • 2傅清祥,算法与数据结构,1998年
  • 3姜照华,姜颜君.神经网络理论在投入产出分析中的应用[J].系统工程理论与实践,1997,17(7):102-105. 被引量:1

共引文献16

同被引文献15

  • 1马建峰,朱建明,等.无线局域网安全-方法与技术[M].北京:机械工业出版社.2007,7.
  • 2胡运松,单洪,马涛.WLAN安全检测与评估系统的设计与实现[J].微计算机信息,2007,23(30):108-110. 被引量:1
  • 3Stubblefield A, Ioannidis J, Rubin A, et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP[C]//Proc. of Network and Distributed Systems Security Symposium. San Diego, USA: [s. n.], 2002: 46-74.
  • 4Ahuja S P, Krishna D. Security Problems in 802.11-based Wireless Networks[C]//Proc. of the 3rd International Conference on Communications, Internet, and Information Technology. [S. l.]: IEEE Press, 2004: 153-164.
  • 5Shu Guoqiang, Lee D. Message Confidentiality Testing of Security Protocols——Passive Monitoring and Active Checking[C]// Proc. of International Federation for Information Processing. [S. l.]: Springer, 2006.
  • 6Shu Guoqiang, Lee D. Testing Security Protocol Properties of Protocol Implementations: A Machine Learning Based Approach[C]//Proc. of International Conference on Distributed Computing Systems. [S. l.]: Springer, 2007.
  • 7Zhang Yongguang, Lee W. Intrusion Detection in Wireless Ad- hoc Networks[C]//Proc. of the 6th Annual International Conference on Mobile Computing and Networking. New York, USA: ACM Press, 2000: 275-283.
  • 8Wilhelm T. Professional Penetration Testing: Creating and Operating a Formal Hacking Lab[M]. [S. l.]: Syngress, 2010.
  • 9Bacudio A G, Yuan Xiaohong, Chu B T B, et al. An Overview of Penetration Testing[J]. International Journal of Network Security & Its Applications, 2011, 3(6): 19-38.
  • 10Shewmaker J. Introduction to Network Penetration Testing[C]// Proc. of the 7th Annual IT Conference on Security Awareness Fair. Sacramento, USA: [s. n.], 2008.

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部