CN103729296B - Network-based Motif software stability assessment method - Google Patents

Network-based Motif software stability assessment method Download PDF

Info

Publication number
CN103729296B
CN103729296B CN201310750657.5A CN201310750657A CN103729296B CN 103729296 B CN103729296 B CN 103729296B CN 201310750657 A CN201310750657 A CN 201310750657A CN 103729296 B CN103729296 B CN 103729296B
Authority
CN
China
Prior art keywords
software
value
motif
node
destruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310750657.5A
Other languages
Chinese (zh)
Other versions
CN103729296A (en
Inventor
胡昌振
单纯
黄龙
赵小林
胡晶晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Technology BIT
Original Assignee
Beijing Institute of Technology BIT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Technology BIT filed Critical Beijing Institute of Technology BIT
Priority to CN201310750657.5A priority Critical patent/CN103729296B/en
Publication of CN103729296A publication Critical patent/CN103729296A/en
Application granted granted Critical
Publication of CN103729296B publication Critical patent/CN103729296B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention provides a network-based Motif software stability assessment method. The method is used for analyzing the stability of a software system and finding influences of network Motif segments on the software stability. The network-based Motif software stability assessment method includes the steps of extracting a source code of software, abstracting the source code to obtain a class graph, abstracting the class graph to obtain a directed graph, analyzing the directed graph according to the basic network Motif segments, measuring an original index value of the software, destroying the basic network Motif segments in the directed graph, measuring the value of the destroyed basic network Motif segments, and judging the functional and structural stability of the software under different types of attacks and destroys by analyzing and comparing the value before destroy with the value after destroy.

Description

A kind of software stability appraisal procedure based on network Motif
Technical field
The present invention relates to a kind of software stability appraisal procedure based on network Motif, belong to complex network and software is steady Qualitative field.
Background technology
In prior art, more software stability assessment modes have not focused on the difference on software system structure, mostly It is analyzed only with points such as the larger point of removal Centroid, in-degree out-degree and isolated nodes.Assessment software is stable During property, software configuration is not more paid close attention to, the change that have ignored on software configuration has very big shadow to software stability Ring;It is analyzed measuring only with choosing specific node, have ignored to exist between node and node and more contact, more Impact, and the relation in this structure exactly has influence on the stability of software.
Content of the invention
The present invention is a kind of software stability appraisal procedure based on network Motif, and the stability of software system is carried out Analysis, finds the impact to software stability for the network Motif fragment.
Realize technical scheme as follows:
A kind of software stability appraisal procedure based on network Motif, extracts the source code of software first, source code is taken out As going out class figure, then class figure is abstracted as directed graph, then according to basic network Motif fragment, directed graph is analyzed, survey The original index numerical value of this software fixed, secondly destroys to basic network Motif fragment in directed graph, finally measures after destroying Numerical value;According to destroy before with destroy after numerical value be analyzed comparing, judge this software stand different types of strike break Stability under bad, in software function, in structure.
Compared with existing best technique, it is an advantage of the current invention that:
(1)Present invention achieves the assessment to software stability, and to the connection between software configuration and software stability System is studied.
(2)Using complex network thought, in structure node is incorporated into as Motif fragments different one by one, pass through Motif fragment point changes to assess the change of stability.
(3)By way of to Motif fragment collapses, the change of analysis software stability, thus know that software is standing Which kind of destruction stability inferior is more preferable.
Brief description
Fig. 1 is a kind of flow chart of the software stability appraisal procedure based on network Motif of the present invention.
Specific embodiment
The present invention is described in detail further below in conjunction with the accompanying drawings.
As shown in figure 1, the present invention passes through to extract the source code of software, source code is taken out class figure, then will be abstract for class figure Become directed graph, then according to basic network Motif fragment, directed graph is analyzed, measure the original index numerical value of this software (Average shortest path length, convergence factor, degree distribution etc.);Then to basic network Motif fragment in directed graph(Difference can be chosen Kind, different types of network Motif)Destroyed, using two methods of random or purposive destruction, finally measure and destroy Numerical value afterwards;It is analyzed comparing with the numerical value after destruction according to before destroying, judge that this software is standing different types of strike Under destruction, the stability in software function, in structure how.
It specifically includes following steps:
1st, source code is taken out class figure
Using software Elipse UML software, the source code of test is converted to system class figure, possible portion classification chart exists Some problems, need manual correction.
2nd, class is attempted to change and be changed to directed graph
Using Matlab code, class figure is input in pajek software with connecting sheet form, using pajek by system class figure It is converted into directed graph.Directed graph midpoint represents class, and line represents the call relation between class and class.
Matlab code is as follows:
3rd, select basic network Motif fragment, be measured software raw value;
Choose network Motif fragment and take following two methods:
A. choose the MOTIF of 3 nodes:While number be less than or equal to 1, while number be more than or equal to 2, there is isolated node, there is ring Shape structure etc.;
B. choose the MOTIF of 4 nodes:While number be less than or equal to 3, while number be more than or equal to 5, there is circulus etc..
Measure software raw value(Average shortest path length, convergence factor, degree distribution etc.), surveyed respectively using pajek software Three basic numerical value of amount.
4th, the Motif of in figure is destroyed, numerical value after measurement destruction:The network Motif fragment chosen is destroyed, Failure mode adopts random and purposive two ways.Random disruptions mode:Will be good for all for directed graph click-through rowers, give birth at random Sequence number is become to be destroyed.Purposive destruction:Destroy in-degree highest node in band Motif fragment, destroying has two-way UNICOM Minimum node of in-degree etc. in Motif fragment.
5th, change in value after destroying before analysis destroys, analysis software stability:Entered according to measured value after destroying before destroying Row analysis, is analyzed using two methods of average shortest path length relative method, aggregate index and degree distribution synthetic method.
Average shortest path length relative method:The change of average shortest path length value L is divided into two kinds, and after the first destruction, L-value rises, After second is destroyed, L-value declines.L-value is risen and represents that destruction node is less for the impact of whole directed graph, L-value is declined Represent that destroying node is in figure more important node.
Aggregate index and degree distribution synthetic method:The change of aggregate index value C is divided into two kinds, and after the first destruction, C value rises, After second is destroyed, C value declines.C value is risen and represents that destruction node is less for the impact of whole directed graph, C value is declined Represent that destroying node is in figure more important node.Then divided according to the in-degree out-degree that the size that C value declines carries out breakdown point again Analysis.
Analyzed according to both the above method, the impact journey of statistic change and the basic fragment of network Motif chosen Degree, according to the tolerance principle of complex network, analyzes the impact for stability for the Motif.

Claims (2)

1. a kind of software stability appraisal procedure based on network Motif it is characterised in that:Extract the source code of software first, Source code is taken out class figure, then class figure is abstracted as directed graph, then choose basic network Motif fragment and directed graph is entered Row analysis, measures the original index numerical value of this software, secondly basic network Motif fragment in directed graph is destroyed, finally Measure the numerical value after destroying;It is analyzed comparing with the numerical value after destruction according to before destroying, judge that this software is standing inhomogeneity Stability under the strike of type destroys, in software function, in structure;
The described mode destroyed according to basic network Motif fragment is using random and purposive two ways;Wherein with Machine failure mode:Will be good for all for directed graph click-through rowers, the random sequence number that generates is destroyed;Purposive destruction:Destroy band In-degree highest node in Motif fragment, destroying has the minimum node of in-degree in two-way UNICOM Motif fragment;
, under standing different types of strike destruction, the stability in software function, in structure is using flat for described this software of judgement All two methods of shortest path relative method, aggregate index and degree distribution synthetic method are analyzed;Wherein:
Average shortest path length relative method:The change of average shortest path length value L is divided into two kinds, and after the first destruction, L-value rises, and second Plant L-value after destroying to decline, L-value rising is represented that destruction node affects for whole directed graph less, expression is declined for L-value Destruction node is in figure important node;
Aggregate index and degree distribution synthetic method:The change of aggregate index value C is divided into two kinds, and after the first destruction, C value rises, and second Plant C value after destroying to decline, the rising of C value is represented that destruction node affects for whole directed graph little, expression is declined for C value broken Bad node is important node in figure, then carries out the in-degree out-degree analysis of breakdown point again according to the size that C value declines.
2. as claimed in claim 1 a kind of software stability appraisal procedure based on network Motif it is characterised in that:Described Selection basic network Motif fragment take following two methods:
A. choose the MOTIF of 3 nodes:While number be less than or equal to 1, while number be more than or equal to 2, exist isolated node, exist ring-type knot Structure;
B. choose the MOTIF of 4 nodes:While number be less than or equal to 3, while number be more than or equal to 5, there is circulus.
CN201310750657.5A 2013-12-31 2013-12-31 Network-based Motif software stability assessment method Active CN103729296B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310750657.5A CN103729296B (en) 2013-12-31 2013-12-31 Network-based Motif software stability assessment method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310750657.5A CN103729296B (en) 2013-12-31 2013-12-31 Network-based Motif software stability assessment method

Publications (2)

Publication Number Publication Date
CN103729296A CN103729296A (en) 2014-04-16
CN103729296B true CN103729296B (en) 2017-02-15

Family

ID=50453377

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310750657.5A Active CN103729296B (en) 2013-12-31 2013-12-31 Network-based Motif software stability assessment method

Country Status (1)

Country Link
CN (1) CN103729296B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106775695B (en) * 2016-12-08 2020-11-10 北京航空航天大学 Software function change prediction system and method based on edge instability

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102033806A (en) * 2010-12-14 2011-04-27 北京航空航天大学 Method for generating reliability test data of real time embedded software
CN102360332A (en) * 2011-09-28 2012-02-22 北京航空航天大学 Software reliability accelerated test and evaluation method and computer-aided tool used in same

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1483725A4 (en) * 2002-01-22 2008-10-29 Yeda Res & Dev Method for analyzing data to identify network motifs
KR101255744B1 (en) * 2011-01-06 2013-04-17 나종화 System and the method for measuring dependability of embedded systems using hybrid fault injection

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102033806A (en) * 2010-12-14 2011-04-27 北京航空航天大学 Method for generating reliability test data of real time embedded software
CN102360332A (en) * 2011-09-28 2012-02-22 北京航空航天大学 Software reliability accelerated test and evaluation method and computer-aided tool used in same

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于复杂网络的大型软件系统度量;王树森等;《计算机科学》;20090228;第36卷(第2期);参见摘要,第4.1-4.2节 *
软件系统网络模体及显著性趋势分析;张林等;《系统工程理论与实践》;20100228;第30卷(第2期);参见摘要,第3.1节,第5.1节,图2,图5 *

Also Published As

Publication number Publication date
CN103729296A (en) 2014-04-16

Similar Documents

Publication Publication Date Title
CN104764869B (en) Transformer gas fault diagnosis and alarm method based on multidimensional characteristics
CN104316822A (en) Method for rapidly and accurately judging false wiring of metering device
WO2012115912A3 (en) Design based device risk assessment
CN101902470A (en) Form feature-based Web security vulnerability dynamic testing method
US20170053031A1 (en) Information forecast and acquisition method based on webpage link parameter analysis
US20120159621A1 (en) Detection system and method of suspicious malicious website using analysis of javascript obfuscation strength
CN104268883A (en) Time-frequency spectrum curve extracting method based on edge detection
CN106646043B (en) Power distribution network ferromagnetic resonance on-line monitoring system and ferromagnetic resonance classifying identification method
CN103902451A (en) Intelligent electricity meter software quality evaluation method
US10451764B2 (en) Capacitivity and frequency effect index detection device and method, and explorative substance identification method
CN106330611A (en) Anonymous protocol classification method based on statistical feature classification
CN104267019A (en) Gas concentration calibrating and detecting method for laser Raman gas analyzer
CN103049596A (en) Method for improving reverse engineering accuracy of impeller part
CN109635031A (en) A kind of data quality checking method, apparatus, system and storage medium
CN103729296B (en) Network-based Motif software stability assessment method
CN104635146B (en) Analog circuit fault diagnosis method based on random sinusoidal signal test and HMM (Hidden Markov Model)
CN105099804B (en) Detection method, server and the terminal of unit failure
CN105425182B (en) A kind of current precision calibration method for fault detector production link
CN105027088B (en) Network analysis equipment and systematic analytic method
CN107862472A (en) Quality data collection system and its collecting method based on terminal profile
CN110543730A (en) Transformer winding deformation fault determination method
CN104715160B (en) Soft sensor modeling data exception point detecting method based on KMDB
CN105722129A (en) Wireless sensing network event detection method and system based on FSAX-MARKOV model
CN104994109A (en) Self-organizing network protocol security analysis method based on vulnerability attack
CN103093078A (en) Data inspection method for improved 53H algorithm

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant