2020
DOI: 10.1049/iet-sen.2019.0018
|View full text |Cite
|
Sign up to set email alerts
|

Efficient improved ant colony optimisation algorithm for dynamic software rejuvenation in web services

Abstract: Software rejuvenation is an effective technique to counteract software ageing in continuously-running applications such as web-service-based systems. In a client-server application, where the server is intended to run perpetually, rejuvenation of the server process periodically during the server idle times increases the availability of that service. In these systems, web services are allocated based on the receiver's requirements and server's facilities. Since the selection of a server among candidates while m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 51 publications
0
11
0
Order By: Relevance
“…The authors in [69] argues that considering that web systems are complex, there is need for a larger scope of knowledge for appropriate industry practices to be defined regarding security. Similarly, the authors in [112] argue that considering the empirical nature of security, there are system vulnerabilities that may be undiscoverable unless the system is actually attacked. In this case therefore, the supposition presented in [112] is that implementing technologies and standards that are underdeveloped presents considerable risk to system security.…”
Section: Security Challenges In Web-based Systemsmentioning
confidence: 99%
“…The authors in [69] argues that considering that web systems are complex, there is need for a larger scope of knowledge for appropriate industry practices to be defined regarding security. Similarly, the authors in [112] argue that considering the empirical nature of security, there are system vulnerabilities that may be undiscoverable unless the system is actually attacked. In this case therefore, the supposition presented in [112] is that implementing technologies and standards that are underdeveloped presents considerable risk to system security.…”
Section: Security Challenges In Web-based Systemsmentioning
confidence: 99%
“…The function of this method is acceptable in simple software; however, it needs to be improved in complex software. Kalantari et al [9] studied dynamic software rejuvenation based on a combination of ant colony optimization (ACO) and gravitational emulation local search (GELS). Despite its efficiency, the ACOGELS-based approach is not good for dealing with largescale combinatorial problems because of its time complexity.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Their functionality on the elements of sets is peer-to-peer (P2P). The general structure of these fuzzy argumentation methods is based on Equations (6) to (9).…”
Section: Simulations and Tests 41 Data Sets And Neural Fuzzy Systemsmentioning
confidence: 99%
“…They further clarified the effective criteria for evaluation of fault tolerance in each web service mentioned earlier. In [39,40], fault-tolerance techniques were proposed based on meta-heuristics in an effort to fight software aging in continuously running applications such as web service-based systems. However, the methods are limited due to impossible application in systems requiring short response times.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the tests conducted for evaluation, we first considered different fuzzy systems in the proposed method, and then simulated this method for a non-fuzzy system. We also compared our method with the rejuvenation of web services based on multiple linear regression approach which was proposed in [47], combination of Ant Colony Optimization and Gravitational Emulation Local Search based approach in [40], and the two-granularity inspection-based software rejuvenation policy based on the Markov regenerative process in [6]. In all the methods, the comparison criteria were runtime and the number of failed web services.…”
Section: Simulationmentioning
confidence: 99%