Checkpoint trust evaluation method based on Markov

According to the trust evaluation of software and its modules after running for a period of time a checkpoint trust evaluation model was presented based on Markov to find the vulnerability of software by monitoring software behavior dynamically.The model reflected the software running situation by s...

Full description

Saved in:
Bibliographic Details
Main Authors: Jun-feng TIAN, Ya-jiao ZHANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2015-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015026/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539670746333184
author Jun-feng TIAN
Ya-jiao ZHANG
author_facet Jun-feng TIAN
Ya-jiao ZHANG
author_sort Jun-feng TIAN
collection DOAJ
description According to the trust evaluation of software and its modules after running for a period of time a checkpoint trust evaluation model was presented based on Markov to find the vulnerability of software by monitoring software behavior dynamically.The model reflected the software running situation by some checkpoints worked in the software behavior trace,then divided some trust levels to reflect the checkpoint trusted situation by the Markov model and the weight of checkpoint,and finally synthesized the checkpoint trusted situation to determine the software trust value.Experimental results showed that the model could effectively reflect the trusted situation of the various parts of the software,and verify the rationality and availability of the model.
format Article
id doaj-art-9211aef84c1c4f76b611cdf44e18acee
institution Kabale University
issn 1000-436X
language zho
publishDate 2015-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-9211aef84c1c4f76b611cdf44e18acee2025-01-14T06:45:35ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2015-01-013623023659690438Checkpoint trust evaluation method based on MarkovJun-feng TIANYa-jiao ZHANGAccording to the trust evaluation of software and its modules after running for a period of time a checkpoint trust evaluation model was presented based on Markov to find the vulnerability of software by monitoring software behavior dynamically.The model reflected the software running situation by some checkpoints worked in the software behavior trace,then divided some trust levels to reflect the checkpoint trusted situation by the Markov model and the weight of checkpoint,and finally synthesized the checkpoint trusted situation to determine the software trust value.Experimental results showed that the model could effectively reflect the trusted situation of the various parts of the software,and verify the rationality and availability of the model.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015026/software trust evaluationcheckpointMarkov modelGaussian mixture model
spellingShingle Jun-feng TIAN
Ya-jiao ZHANG
Checkpoint trust evaluation method based on Markov
Tongxin xuebao
software trust evaluation
checkpoint
Markov model
Gaussian mixture model
title Checkpoint trust evaluation method based on Markov
title_full Checkpoint trust evaluation method based on Markov
title_fullStr Checkpoint trust evaluation method based on Markov
title_full_unstemmed Checkpoint trust evaluation method based on Markov
title_short Checkpoint trust evaluation method based on Markov
title_sort checkpoint trust evaluation method based on markov
topic software trust evaluation
checkpoint
Markov model
Gaussian mixture model
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015026/
work_keys_str_mv AT junfengtian checkpointtrustevaluationmethodbasedonmarkov
AT yajiaozhang checkpointtrustevaluationmethodbasedonmarkov