To instruct the selecting of the redundancy variants for diversified software system at different situations
the evaluation systems of usability
security and performance was constructed by using some diversified software evaluation indicators.Then hierarchical analyzation system (HAS) was introduced based on the three evaluation systems.A real case verify that HAS is practicable at the situation that there are not many variants.
关键词
Keywords
references
ZHANG Y , VIN H , ALVISI L , et al . Heterogeneous networking:a new survivability paradigm [C ] // The 2001 Workshop on New Security Paradigms . New York:ACM Press , 2001 : 33 - 39 .
STAMP M . Risks of monoculture [J ] . Communications of the ACM , 2004 , 47 ( 3 ):120.
ZHANG Y J , PANG J M , ZHANG Z , WU J X . A mimic security defence strategy based on software diversity [J ] . Computer Science , 2018 , 45 ( 2 ): 215 - 221 .
PANG J M , ZHANG Y J , WU J X , et al . Applying a combination of mimic defense and software diversity in the software security industry [J ] . Strategic Study of Chinese Academy of Engineering , 2016 , 18 ( 6 ): 74 - 78 .
ZHANG Y J , ZHANG X C , PANG J M . Survey on code obfuscation research [J ] . Journal of Information Engineering University , 2017 , 18 ( 5 ): 635 - 640 .
ZHANG Y F , LOU F , ZHANG L . Security assessment of Web applications based on software attack surface [J ] . Computer Engineering &Science , 2016 , 38 ( 1 ): 73 - 77 .
XIONG P C , FAN Y S . Integrated software quality evaluation model based on fuzzy analytic hierarchy process [J ] . Journal of Computer Applications , 2006 , 26 ( 7 ): 1497 - 1499 .
ZHANG J X , PANG J M , ZHANG Z , et al . Heterogeneity quantization method of cyberspace security system based on dissimilar redundancy structure [J ] . Journal of Electronics and Information Technology , 2019 , 41 ( 7 ): 1594 - 1600 .
RAO C R . Diversity and dissimilarity coefficients:a unified approach [J ] . Theoretical Population Biology , 1982 , 21 ( 1 ): 24 - 43 .
ZHANG Z , WANG L Q , LI W C . Research on formal model for an information system’s attack surface with dissimilar redundant architecture [J ] . Journal on Communications , 2018 , 39 ( S2 ): 223 - 230 .