Exercises for Course 4.10 Dependability and Security Evaluation of Computer-based Systems
ثبت نشده
چکیده
Exercise 1 Let us consider a system composed of n different components denoted 1, 2 ……n, with m identical replicas of each component. Two redundancy strategies are studied:-GR, in which redundancy is applied globally at the system level: the architecture is composed of m identical copies of the system that are organized according to a parallel structure.-LR, in which redundancy is applied locally at the level of each component. Let us denote by r i (t) the reliability function of component i. The components are assumed to fail according to independent stochastic processes. 1) Derive the system reliability functions R GR (t) and R LR (t) corresponding to the two considered redundancy strategies, as a function of r i (t). 2) Consider the case m = n = 2 and r i (t) = r(t) Compare R GR (t) and R LR (t). Exercise 2 Let us study the two following architectures I and II. 1) Build a Fault Tree describing the failure scenarios associated to each architecture. 2) The reliability functions r(t) associated to the components are assumed to be identical and exponentially distributed with a constant failure rate λ. For each architecture, derive the system failure rate and mean time to failure (MTTF).
منابع مشابه
Modeling and Evaluation of Stochastic Discrete-Event Systems with RayLang Formalism
In recent years, formal methods have been used as an important tool for performance evaluation and verification of a wide range of systems. In the view points of engineers and practitioners, however, there are still some major difficulties in using formal methods. In this paper, we introduce a new formal modeling language to fill the gaps between object-oriented programming languages (OOPLs) us...
متن کاملModeling and Evaluation of Stochastic Discrete-Event Systems with RayLang Formalism
In recent years, formal methods have been used as an important tool for performance evaluation and verification of a wide range of systems. In the view points of engineers and practitioners, however, there are still some major difficulties in using formal methods. In this paper, we introduce a new formal modeling language to fill the gaps between object-oriented programming languages (OOPLs) us...
متن کاملA Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملA Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملTEACHING COMPUTER SECURITY TO UNDERGRADUATES A Hands-On Approach
Increasing awareness of the vulnerabilities of computer systems has led to the introduction of several programs in computer security. Many of these programs are meant to attract graduate students. Southern Oregon University has recently started a new undergraduate track in computer security and information assurance (CSIA). The curriculum is first of its kind in Oregon to be available at the un...
متن کامل