Abstract
The security of network applications is more important in Internet days. A kind of randomized protocol to find out application software security bug is raised. We discuss the security testing method with randomized protocol; put forward an attack-proof theorem which shows a way of computing average number of attack times easily with a Weibull probability map before a software system having concealed bugs becomes invalid. It is also proved a fairly good method to estimate life expectancy of application software on Internet under various random attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Li, T.: An Immune Based Model for Network Monitoring. Chinese Journal of Computers (2006)
Tang, Y., Lu, X.C., Hu, H.P., Zhu, P.D.: Automatic Generation of Attack Signatures Based on Multi-Sequence Alignment. Chinese Journal of Computers (2006)
Michael, H., David, L.B.: Writing Secure Code. Microsoft Press (2002)
Rajeev, M., Prabhakar, R.: Randomized Algorithms. Cambridge University Press, Cambridge (1995)
James, W., Herbet, H.T.: How to Break Software Security: Effective Techniques for Security Testing. Addison Wesley, Reading (2003)
Herbet, H.T., Scott, G.C.: The Red TeamProgram Testing, Software Research and Programmin (2004)
Gary, M.G., John, V.: Ten Principles of Software Security, http://www.nap.edu/catalog/6161.html
Ross, S.M.: Stochastic Processes. John Wiley, Chichester (1983)
Foster, I., Kesselman, C. (eds.): The Grid: Blueprint for a New Computing Infrastructure, ch. 3. Morgan Kaufmann, San Francisco (1998)
Lawless, J.F.: Statistical Models and Methods for Lifetime Data. John Wiley, Chichester (1983)
Li, A.G., Hong, B.R., Wang, S.: An Approach for Identifying Software Vulnerabilities Based on Error Propagation Analysis. Chinese Journal of Computers (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yuan, S., He, H. (2008). A Probabilistic Method to Estimate Life Expectancy of Application Software. In: Sun, F., Zhang, J., Tan, Y., Cao, J., Yu, W. (eds) Advances in Neural Networks - ISNN 2008. ISNN 2008. Lecture Notes in Computer Science, vol 5263. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-87732-5_47
Download citation
DOI: https://doi.org/10.1007/978-3-540-87732-5_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-87731-8
Online ISBN: 978-3-540-87732-5
eBook Packages: Computer ScienceComputer Science (R0)