{"title":"特征拒绝服务识别","authors":"R. G. Crespo","doi":"10.1109/NGMAST.2008.14","DOIUrl":null,"url":null,"abstract":"Internet applications, such as Email, VoIP and WWW, have been enhanced with many features. However, the introduction and modification of features may result in undesired behaviors, and this effect is known as feature interaction-FI. FI resolution may be implemented by a Feature Manager, which is directed by a set of interdiction formulas. On the other hand, the approach by interdiction may eliminate all features candidate for execution, and this result on a feature denial of service. In this paper we analyze how feature denial of service can be detected, with a design stage algorithm. The detection algorithm has a time complexity of the quadratic of interdiction formulas.","PeriodicalId":247507,"journal":{"name":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Identification of Feature Denial of Services\",\"authors\":\"R. G. Crespo\",\"doi\":\"10.1109/NGMAST.2008.14\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet applications, such as Email, VoIP and WWW, have been enhanced with many features. However, the introduction and modification of features may result in undesired behaviors, and this effect is known as feature interaction-FI. FI resolution may be implemented by a Feature Manager, which is directed by a set of interdiction formulas. On the other hand, the approach by interdiction may eliminate all features candidate for execution, and this result on a feature denial of service. In this paper we analyze how feature denial of service can be detected, with a design stage algorithm. The detection algorithm has a time complexity of the quadratic of interdiction formulas.\",\"PeriodicalId\":247507,\"journal\":{\"name\":\"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-09-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NGMAST.2008.14\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NGMAST.2008.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Internet applications, such as Email, VoIP and WWW, have been enhanced with many features. However, the introduction and modification of features may result in undesired behaviors, and this effect is known as feature interaction-FI. FI resolution may be implemented by a Feature Manager, which is directed by a set of interdiction formulas. On the other hand, the approach by interdiction may eliminate all features candidate for execution, and this result on a feature denial of service. In this paper we analyze how feature denial of service can be detected, with a design stage algorithm. The detection algorithm has a time complexity of the quadratic of interdiction formulas.