CN103729296B - Network-based Motif software stability assessment method - Google Patents
Network-based Motif software stability assessment method Download PDFInfo
- Publication number
- CN103729296B CN103729296B CN201310750657.5A CN201310750657A CN103729296B CN 103729296 B CN103729296 B CN 103729296B CN 201310750657 A CN201310750657 A CN 201310750657A CN 103729296 B CN103729296 B CN 103729296B
- Authority
- CN
- China
- Prior art keywords
- software
- value
- motif
- node
- destruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The invention provides a network-based Motif software stability assessment method. The method is used for analyzing the stability of a software system and finding influences of network Motif segments on the software stability. The network-based Motif software stability assessment method includes the steps of extracting a source code of software, abstracting the source code to obtain a class graph, abstracting the class graph to obtain a directed graph, analyzing the directed graph according to the basic network Motif segments, measuring an original index value of the software, destroying the basic network Motif segments in the directed graph, measuring the value of the destroyed basic network Motif segments, and judging the functional and structural stability of the software under different types of attacks and destroys by analyzing and comparing the value before destroy with the value after destroy.
Description
Technical field
The present invention relates to a kind of software stability appraisal procedure based on network Motif, belong to complex network and software is steady
Qualitative field.
Background technology
In prior art, more software stability assessment modes have not focused on the difference on software system structure, mostly
It is analyzed only with points such as the larger point of removal Centroid, in-degree out-degree and isolated nodes.Assessment software is stable
During property, software configuration is not more paid close attention to, the change that have ignored on software configuration has very big shadow to software stability
Ring;It is analyzed measuring only with choosing specific node, have ignored to exist between node and node and more contact, more
Impact, and the relation in this structure exactly has influence on the stability of software.
Content of the invention
The present invention is a kind of software stability appraisal procedure based on network Motif, and the stability of software system is carried out
Analysis, finds the impact to software stability for the network Motif fragment.
Realize technical scheme as follows:
A kind of software stability appraisal procedure based on network Motif, extracts the source code of software first, source code is taken out
As going out class figure, then class figure is abstracted as directed graph, then according to basic network Motif fragment, directed graph is analyzed, survey
The original index numerical value of this software fixed, secondly destroys to basic network Motif fragment in directed graph, finally measures after destroying
Numerical value;According to destroy before with destroy after numerical value be analyzed comparing, judge this software stand different types of strike break
Stability under bad, in software function, in structure.
Compared with existing best technique, it is an advantage of the current invention that:
(1)Present invention achieves the assessment to software stability, and to the connection between software configuration and software stability
System is studied.
(2)Using complex network thought, in structure node is incorporated into as Motif fragments different one by one, pass through
Motif fragment point changes to assess the change of stability.
(3)By way of to Motif fragment collapses, the change of analysis software stability, thus know that software is standing
Which kind of destruction stability inferior is more preferable.
Brief description
Fig. 1 is a kind of flow chart of the software stability appraisal procedure based on network Motif of the present invention.
Specific embodiment
The present invention is described in detail further below in conjunction with the accompanying drawings.
As shown in figure 1, the present invention passes through to extract the source code of software, source code is taken out class figure, then will be abstract for class figure
Become directed graph, then according to basic network Motif fragment, directed graph is analyzed, measure the original index numerical value of this software
(Average shortest path length, convergence factor, degree distribution etc.);Then to basic network Motif fragment in directed graph(Difference can be chosen
Kind, different types of network Motif)Destroyed, using two methods of random or purposive destruction, finally measure and destroy
Numerical value afterwards;It is analyzed comparing with the numerical value after destruction according to before destroying, judge that this software is standing different types of strike
Under destruction, the stability in software function, in structure how.
It specifically includes following steps:
1st, source code is taken out class figure
Using software Elipse UML software, the source code of test is converted to system class figure, possible portion classification chart exists
Some problems, need manual correction.
2nd, class is attempted to change and be changed to directed graph
Using Matlab code, class figure is input in pajek software with connecting sheet form, using pajek by system class figure
It is converted into directed graph.Directed graph midpoint represents class, and line represents the call relation between class and class.
Matlab code is as follows:
3rd, select basic network Motif fragment, be measured software raw value;
Choose network Motif fragment and take following two methods:
A. choose the MOTIF of 3 nodes:While number be less than or equal to 1, while number be more than or equal to 2, there is isolated node, there is ring
Shape structure etc.;
B. choose the MOTIF of 4 nodes:While number be less than or equal to 3, while number be more than or equal to 5, there is circulus etc..
Measure software raw value(Average shortest path length, convergence factor, degree distribution etc.), surveyed respectively using pajek software
Three basic numerical value of amount.
4th, the Motif of in figure is destroyed, numerical value after measurement destruction:The network Motif fragment chosen is destroyed,
Failure mode adopts random and purposive two ways.Random disruptions mode:Will be good for all for directed graph click-through rowers, give birth at random
Sequence number is become to be destroyed.Purposive destruction:Destroy in-degree highest node in band Motif fragment, destroying has two-way UNICOM
Minimum node of in-degree etc. in Motif fragment.
5th, change in value after destroying before analysis destroys, analysis software stability:Entered according to measured value after destroying before destroying
Row analysis, is analyzed using two methods of average shortest path length relative method, aggregate index and degree distribution synthetic method.
Average shortest path length relative method:The change of average shortest path length value L is divided into two kinds, and after the first destruction, L-value rises,
After second is destroyed, L-value declines.L-value is risen and represents that destruction node is less for the impact of whole directed graph, L-value is declined
Represent that destroying node is in figure more important node.
Aggregate index and degree distribution synthetic method:The change of aggregate index value C is divided into two kinds, and after the first destruction, C value rises,
After second is destroyed, C value declines.C value is risen and represents that destruction node is less for the impact of whole directed graph, C value is declined
Represent that destroying node is in figure more important node.Then divided according to the in-degree out-degree that the size that C value declines carries out breakdown point again
Analysis.
Analyzed according to both the above method, the impact journey of statistic change and the basic fragment of network Motif chosen
Degree, according to the tolerance principle of complex network, analyzes the impact for stability for the Motif.
Claims (2)
1. a kind of software stability appraisal procedure based on network Motif it is characterised in that:Extract the source code of software first,
Source code is taken out class figure, then class figure is abstracted as directed graph, then choose basic network Motif fragment and directed graph is entered
Row analysis, measures the original index numerical value of this software, secondly basic network Motif fragment in directed graph is destroyed, finally
Measure the numerical value after destroying;It is analyzed comparing with the numerical value after destruction according to before destroying, judge that this software is standing inhomogeneity
Stability under the strike of type destroys, in software function, in structure;
The described mode destroyed according to basic network Motif fragment is using random and purposive two ways;Wherein with
Machine failure mode:Will be good for all for directed graph click-through rowers, the random sequence number that generates is destroyed;Purposive destruction:Destroy band
In-degree highest node in Motif fragment, destroying has the minimum node of in-degree in two-way UNICOM Motif fragment;
, under standing different types of strike destruction, the stability in software function, in structure is using flat for described this software of judgement
All two methods of shortest path relative method, aggregate index and degree distribution synthetic method are analyzed;Wherein:
Average shortest path length relative method:The change of average shortest path length value L is divided into two kinds, and after the first destruction, L-value rises, and second
Plant L-value after destroying to decline, L-value rising is represented that destruction node affects for whole directed graph less, expression is declined for L-value
Destruction node is in figure important node;
Aggregate index and degree distribution synthetic method:The change of aggregate index value C is divided into two kinds, and after the first destruction, C value rises, and second
Plant C value after destroying to decline, the rising of C value is represented that destruction node affects for whole directed graph little, expression is declined for C value broken
Bad node is important node in figure, then carries out the in-degree out-degree analysis of breakdown point again according to the size that C value declines.
2. as claimed in claim 1 a kind of software stability appraisal procedure based on network Motif it is characterised in that:Described
Selection basic network Motif fragment take following two methods:
A. choose the MOTIF of 3 nodes:While number be less than or equal to 1, while number be more than or equal to 2, exist isolated node, exist ring-type knot
Structure;
B. choose the MOTIF of 4 nodes:While number be less than or equal to 3, while number be more than or equal to 5, there is circulus.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310750657.5A CN103729296B (en) | 2013-12-31 | 2013-12-31 | Network-based Motif software stability assessment method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310750657.5A CN103729296B (en) | 2013-12-31 | 2013-12-31 | Network-based Motif software stability assessment method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103729296A CN103729296A (en) | 2014-04-16 |
CN103729296B true CN103729296B (en) | 2017-02-15 |
Family
ID=50453377
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310750657.5A Active CN103729296B (en) | 2013-12-31 | 2013-12-31 | Network-based Motif software stability assessment method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103729296B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106775695B (en) * | 2016-12-08 | 2020-11-10 | 北京航空航天大学 | Software function change prediction system and method based on edge instability |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102033806A (en) * | 2010-12-14 | 2011-04-27 | 北京航空航天大学 | Method for generating reliability test data of real time embedded software |
CN102360332A (en) * | 2011-09-28 | 2012-02-22 | 北京航空航天大学 | Software reliability accelerated test and evaluation method and computer-aided tool used in same |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1483725A4 (en) * | 2002-01-22 | 2008-10-29 | Yeda Res & Dev | Method for analyzing data to identify network motifs |
KR101255744B1 (en) * | 2011-01-06 | 2013-04-17 | 나종화 | System and the method for measuring dependability of embedded systems using hybrid fault injection |
-
2013
- 2013-12-31 CN CN201310750657.5A patent/CN103729296B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102033806A (en) * | 2010-12-14 | 2011-04-27 | 北京航空航天大学 | Method for generating reliability test data of real time embedded software |
CN102360332A (en) * | 2011-09-28 | 2012-02-22 | 北京航空航天大学 | Software reliability accelerated test and evaluation method and computer-aided tool used in same |
Non-Patent Citations (2)
Title |
---|
基于复杂网络的大型软件系统度量;王树森等;《计算机科学》;20090228;第36卷(第2期);参见摘要,第4.1-4.2节 * |
软件系统网络模体及显著性趋势分析;张林等;《系统工程理论与实践》;20100228;第30卷(第2期);参见摘要,第3.1节,第5.1节,图2,图5 * |
Also Published As
Publication number | Publication date |
---|---|
CN103729296A (en) | 2014-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104764869B (en) | Transformer gas fault diagnosis and alarm method based on multidimensional characteristics | |
CN104316822A (en) | Method for rapidly and accurately judging false wiring of metering device | |
WO2012115912A3 (en) | Design based device risk assessment | |
CN101902470A (en) | Form feature-based Web security vulnerability dynamic testing method | |
US20170053031A1 (en) | Information forecast and acquisition method based on webpage link parameter analysis | |
US20120159621A1 (en) | Detection system and method of suspicious malicious website using analysis of javascript obfuscation strength | |
CN104268883A (en) | Time-frequency spectrum curve extracting method based on edge detection | |
CN106646043B (en) | Power distribution network ferromagnetic resonance on-line monitoring system and ferromagnetic resonance classifying identification method | |
CN103902451A (en) | Intelligent electricity meter software quality evaluation method | |
US10451764B2 (en) | Capacitivity and frequency effect index detection device and method, and explorative substance identification method | |
CN106330611A (en) | Anonymous protocol classification method based on statistical feature classification | |
CN104267019A (en) | Gas concentration calibrating and detecting method for laser Raman gas analyzer | |
CN103049596A (en) | Method for improving reverse engineering accuracy of impeller part | |
CN109635031A (en) | A kind of data quality checking method, apparatus, system and storage medium | |
CN103729296B (en) | Network-based Motif software stability assessment method | |
CN104635146B (en) | Analog circuit fault diagnosis method based on random sinusoidal signal test and HMM (Hidden Markov Model) | |
CN105099804B (en) | Detection method, server and the terminal of unit failure | |
CN105425182B (en) | A kind of current precision calibration method for fault detector production link | |
CN105027088B (en) | Network analysis equipment and systematic analytic method | |
CN107862472A (en) | Quality data collection system and its collecting method based on terminal profile | |
CN110543730A (en) | Transformer winding deformation fault determination method | |
CN104715160B (en) | Soft sensor modeling data exception point detecting method based on KMDB | |
CN105722129A (en) | Wireless sensing network event detection method and system based on FSAX-MARKOV model | |
CN104994109A (en) | Self-organizing network protocol security analysis method based on vulnerability attack | |
CN103093078A (en) | Data inspection method for improved 53H algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |