2019
DOI: 10.1109/access.2019.2943273
|View full text |Cite
|
Sign up to set email alerts
|

A Model for Availability and Security Risk Evaluation for Systems With VMM Rejuvenation Enabled by VM Migration Scheduling

Abstract: Most companies and organizations rely nowadays on virtualized environments to host and run their applications. Some of these applications have stringent availability and security requirements. An important challenge for high availability in virtualized systems is software aging, which can lead the system to hangs or other types of failures. Software rejuvenation is applied to cope with software aging problems, whereas previous research suggests the use of Virtual Machine (VM) migration to reduce the downtime r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 29 publications
0
6
0
Order By: Relevance
“…and the repair time follows a Weibull distribution with repair rate ν(x) = 50x, where the parameter values α 0 , α 1 , β used are based on the experimental studies, ν(x) is set by ourselves according to the values in references [43,44]. Let impulse action occur in t 1 = 1, t 2 = 3, t 3 = 6, t 4 = 8, which implies that the impulse lower bound τ 1 = 1 and impulse upper bound τ 2 = 3, then the instantaneous availability of system (3) and its range for the impulse strength θ = 0.8 are depicted in Figure 3.…”
Section: Numerical Examplesmentioning
confidence: 99%
“…and the repair time follows a Weibull distribution with repair rate ν(x) = 50x, where the parameter values α 0 , α 1 , β used are based on the experimental studies, ν(x) is set by ourselves according to the values in references [43,44]. Let impulse action occur in t 1 = 1, t 2 = 3, t 3 = 6, t 4 = 8, which implies that the impulse lower bound τ 1 = 1 and impulse upper bound τ 2 = 3, then the instantaneous availability of system (3) and its range for the impulse strength θ = 0.8 are depicted in Figure 3.…”
Section: Numerical Examplesmentioning
confidence: 99%
“…In the proposed work, system is rejuvenated either at a predetermined time or after reaching threshold whichever happens first. M. Torquato et al, [17] opine that in virtualized systems, the significant issue is software aging which may degrade the system performance and later lead to failure. In this work, researchers proposed a security evaluation method that is based on availability model.…”
Section: Related Workmentioning
confidence: 99%
“…In [16], Ge et al proposed a graphical security model and a stochastic reward net (SRN) model to evaluate security and capacity oriented availability of multiple redundancy designs when applying security patches in server systems. In a recent work [17], Torquato et al proposed an availability SPN model to assess the impact of security risks on the overall availability of a virtualized system equipped with a VMM rejuvenation technique enabled by scheduled VM migration. The authors provided an insightful understanding on the trade-offs between availability and security risks when applying VM migration for rejuvenation purposes.…”
Section: Related Workmentioning
confidence: 99%