Nothing Special   »   [go: up one dir, main page]

Skip to main content

A Probabilistic Method to Estimate Life Expectancy of Application Software

  • Conference paper
Advances in Neural Networks - ISNN 2008 (ISNN 2008)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5263))

Included in the following conference series:

  • 3050 Accesses

Abstract

The security of network applications is more important in Internet days. A kind of randomized protocol to find out application software security bug is raised. We discuss the security testing method with randomized protocol; put forward an attack-proof theorem which shows a way of computing average number of attack times easily with a Weibull probability map before a software system having concealed bugs becomes invalid. It is also proved a fairly good method to estimate life expectancy of application software on Internet under various random attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Li, T.: An Immune Based Model for Network Monitoring. Chinese Journal of Computers (2006)

    Google Scholar 

  2. Tang, Y., Lu, X.C., Hu, H.P., Zhu, P.D.: Automatic Generation of Attack Signatures Based on Multi-Sequence Alignment. Chinese Journal of Computers (2006)

    Google Scholar 

  3. Michael, H., David, L.B.: Writing Secure Code. Microsoft Press (2002)

    Google Scholar 

  4. Rajeev, M., Prabhakar, R.: Randomized Algorithms. Cambridge University Press, Cambridge (1995)

    MATH  Google Scholar 

  5. James, W., Herbet, H.T.: How to Break Software Security: Effective Techniques for Security Testing. Addison Wesley, Reading (2003)

    Google Scholar 

  6. Herbet, H.T., Scott, G.C.: The Red TeamProgram Testing, Software Research and Programmin (2004)

    Google Scholar 

  7. Gary, M.G., John, V.: Ten Principles of Software Security, http://www.nap.edu/catalog/6161.html

  8. Ross, S.M.: Stochastic Processes. John Wiley, Chichester (1983)

    MATH  Google Scholar 

  9. Foster, I., Kesselman, C. (eds.): The Grid: Blueprint for a New Computing Infrastructure, ch. 3. Morgan Kaufmann, San Francisco (1998)

    Google Scholar 

  10. Lawless, J.F.: Statistical Models and Methods for Lifetime Data. John Wiley, Chichester (1983)

    Google Scholar 

  11. Li, A.G., Hong, B.R., Wang, S.: An Approach for Identifying Software Vulnerabilities Based on Error Propagation Analysis. Chinese Journal of Computers (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yuan, S., He, H. (2008). A Probabilistic Method to Estimate Life Expectancy of Application Software. In: Sun, F., Zhang, J., Tan, Y., Cao, J., Yu, W. (eds) Advances in Neural Networks - ISNN 2008. ISNN 2008. Lecture Notes in Computer Science, vol 5263. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-87732-5_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-87732-5_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-87731-8

  • Online ISBN: 978-3-540-87732-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics