WEKO3
アイテム
{"_buckets": {"deposit": "23feaf83-2550-4342-a3ec-d4e42b30b6c7"}, "_deposit": {"created_by": 15, "id": "10289", "owners": [15], "pid": {"revision_id": 0, "type": "depid", "value": "10289"}, "status": "published"}, "_oai": {"id": "oai:sucra.repo.nii.ac.jp:00010289", "sets": ["503"]}, "author_link": [], "item_113_alternative_title_1": {"attribute_name": "タイトル(別言語)", "attribute_value_mlt": [{"subitem_alternative_title": "現存反応的システムへの先行予測機能追加 : 方法論と事例研究"}]}, "item_113_biblio_info_9": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2013", "bibliographicIssueDateType": "Issued"}}]}, "item_113_date_35": {"attribute_name": "作成日", "attribute_value_mlt": [{"subitem_date_issued_datetime": "2014-07-16", "subitem_date_issued_type": "Created"}]}, "item_113_date_granted_20": {"attribute_name": "学位授与年月日", "attribute_value_mlt": [{"subitem_dategranted": "2013-09-20"}]}, "item_113_degree_grantor_22": {"attribute_name": "学位授与機関", "attribute_value_mlt": [{"subitem_degreegrantor": [{"subitem_degreegrantor_name": "埼玉大学"}], "subitem_degreegrantor_identifier": [{"subitem_degreegrantor_identifier_name": "12401", "subitem_degreegrantor_identifier_scheme": "kakenhi"}]}]}, "item_113_degree_name_21": {"attribute_name": "学位名", "attribute_value_mlt": [{"subitem_degreename": "博士(工学)"}]}, "item_113_description_13": {"attribute_name": "形態", "attribute_value_mlt": [{"subitem_description": "viii, 91 p.", "subitem_description_type": "Other"}]}, "item_113_description_23": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "A reactive system is a system that maintains an ongoing interaction with its environment, as opposed to obtain a nal result. Various reactive systems play very important roles in modern society, such as bank transfer systems, web servers, operating systems, computer networks, air/railway traffic control systems, elevator systems, and nuclear power plant control systems. Since an accident or an attack of a critical reactive system may cause nancial loss and even casualties, the biggest challenge for reactive systems is not only to ensure the system functionality, but to prevent these accidents and attacks.\nA traditional reactive system is usually passive, i.e., the system can only perform those operations in response to instructions explicitly issued by users or application programs, but have no ability to do something actively and anticipatorily by themselves. From the viewpoint of safety engineering and security engineering, a traditional passive reactive system only has some quite weak capability to defend accidents and attacks from its external computing environment. In order to prevent accidents/attacks beforehand, it is desired that a reactive system is anticipatory, i.e., the system can detect and predict omens of accidents/attacks anticipatorily and then take some actions to inform its users and perform some operations to defend accidents/attacks by itself. Therefore, from the viewpoints of high safety and high security, any critical reactive system should be anticipatory.\nIn order to build practically useful reactive systems with the ability of anticipation, Cheng proposed anticipatory reasoning-reacting system as a certain class of computing anticipatory systems, which is a computing system can predict based on the predictive model then take anticipatory actions according to the predictions as well as take reactive actions to the current situation based on the behavioral model. The most important features of proposed anticipatory reasoning-reacting systems are: (1) both the prediction and decision making are base on logic-based forward reasoning, and (2) an anticipatory reasoning-reacting system is a simple extension of a reactive system.\nHowever, there are many critical existing systems which perform routine operations well but do not have the ability of anticipation to handle accidents and attacks. These systems no longer satisfy the requirements of high safety and high security. Furthermore, it is impractical, if not impossible, to rebuild the whole system to be anticipatory, because reimplementation of the whole of a system results in high cost. On the other hand, it is not necessary and economic to rebuild the whole of an existing reactive system with anticipatory ability, if it is possible to extend certain types of existing systems with anticipatory ability without aecting its original functions. However, by now, there is no study about which kind of reactive systems can be extend to be anticipatory, and no study about how to add anticipatory ability without aecting or with minor aecting the original system.\nTherefore, we argued it is possible to extend an existing reactive system (called legacy system) to be an anticipatory reasoning-reacting system (called target system) without reimplementing the whole of the system, and proposed a general methodology to realize such an extension. In this research, we first investigated and analyzed current reactive systems, in order to find out how the current reactive systems ensure the safety/security, and to find out which kind of existing reactive systems can be made anticipatory. Based on the analysis, we specified some requirements for the legacy systems which can be extend to be anticipatory. Then we discussed why it is possible to extend a reactive system anticipatory without aecting its original function. Based on the above work, we proposed a general architecture of anticipatory reasoning-reacting system for the extension, and a general process to extend an existing reactive system to be anticipatory. The main phases of the process include: (1) to analyze the target domain, aiming to find out possible accidents/attacks in the target, as well as their causation, formation process, and the consequence, (2) to analysis the legacy system, aiming to ensure the original function of the system, find out how to get information used for detection and prediction from the system, and nd out which function of the system can be used as anticipatory actions, (3) to define requirements of the target system, (4) to construct the anticipatory models, which underline both predicting and choosing anticipatory actions, and (5) to prepare the anticipatory components, especially to design and implement the special components for the certain target domain, and to integrate all anticipatory components with the legacy system. The novelty of the methodology is that it does not affect the system\u0027s original function, and it can deal with various reactive systems by using the same process.\nIn order to show the eectiveness and usefulness of our methodology, we chose three typical reactive systems as case studies: emergency elevator evacuation systems, runway incursion prevention systems, and computing application servers, then applied the methodology to extend these systems to be anticipatory. For each case study, we elaborated its motivation, system design, system implementation, and evaluation, as well as showed how to apply the methodology and the advantage of the certain anticipatory reasoning-reacting system in that case study. After presented the case studies, we evaluated the methodology from viewpoint of generality and particularity.\nThis work has following contributions. First, we conceived a new approach to improve existing reactive systems safety and/or security by extending the system with anticipatory ability. Second, we proposed a general methodology, which can extend various reactive systems with anticipatory ability, and we showed the eectiveness of the methodology by applying the methodology to dierent case studies. Third, we built three practical ARRSs in the case studies, thus showed the practical usefulness of anticipation and ARRSs for safety and security. Previous studies of ARRSs are mainly theoretical, such as formal definition, architecture design, mechanism of prediction and decision-making, and prototype implementation, thus, there was a gap between those theoretical work and practical ARRSs. Whereas, in this work, we built practical ARRSs, as well as solve several practical problems when building practical ARRSs.\nThis thesis is organized as follows. Chapter 1 presents the background, motivation, and purpose of this work. Chapter 2 surveys reactive systems, and analyzes the feasibility to extend an existing reactive system to be anticipatory. Chapter 3 gives a review of anticipatory reasoning-reacting systems. Chapter 4 presents the methodology to extend the existing reactive systems to be anticipatory. Chapter 5 shows a case study of emergency elevator evacuation systems. Chapter 6 shows a case study of runway incursion prevention systems. Chapter 7 shows a case study of computing application servers. Chapter 8 discusses the generality and particularity of the methodology. Concluding remarks are given in chapter 9.", "subitem_description_type": "Abstract"}]}, "item_113_description_24": {"attribute_name": "目次", "attribute_value_mlt": [{"subitem_description": "Abstract i\nAcknowledgments iii\nList of gures vii\nList of tables viii\n1 Introduction 1\n1.1 Background and motivation . . . . . . . . . . . . . . . . . . . . . . 1\n1.2 Purposes and objectives . . . . . . . . . . . . . . . . . . . . . . . . 2\n1.3 Structure of this thesis . . . . . . . . . . . . . . . . . . . . . . . . . 2\n2 Reactive systems and feasibility analysis of extension 3\n2.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3\n2.2 Functions and classication . . . . . . . . . . . . . . . . . . . . . . 4\n2.3 Safety and information security . . . . . . . . . . . . . . . . . . . . 5\n2.4 Approaches to develop reactive systems . . . . . . . . . . . . . . . . 5\n2.4.1 Statecharts . . . . . . . . . . . . . . . . . . . . . . . . . . . 6\n2.4.2 Temporal logic . . . . . . . . . . . . . . . . . . . . . . . . . 6\n2.4.3 Bigraphical reactive systems . . . . . . . . . . . . . . . . . . 7\n2.4.4 Synchronous programming of reactive systems . . . . . . . . 7\n2.4.5 Fault tree analysis . . . . . . . . . . . . . . . . . . . . . . . 7\n2.4.6 Object-oriented approaches . . . . . . . . . . . . . . . . . . 7\n2.4.7 Secure reactive systems . . . . . . . . . . . . . . . . . . . . . 8\n2.5 Need of extension with anticipation . . . . . . . . . . . . . . . . . . 8\n2.6 Feasibility analysis of extension . . . . . . . . . . . . . . . . . . . . 9\n3 Anticipatory reasoning-reacting systems 10\n3.1 Logic-based forward reasoning on ARRS . . . . . . . . . . . . . . . 10\n3.2 Overview of ARRS . . . . . . . . . . . . . . . . . . . . . . . . . . . 13\n3.3 Safety and information security . . . . . . . . . . . . . . . . . . . . 15\n3.4 ARRS: The candidate of target system for extension . . . . . . . . 15\n4 A methodology to make existing reactive systems anticipatory 17\n4.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17\n4.2 Requirements of legacy systems . . . . . . . . . . . . . . . . . . . . 17\n4.3 Target system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17\n4.4 Phases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18\n5 Case study: Emergency elevator evacuation systems 23\n5.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23\n5.2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23\n5.3 Ideal emergency elevator evacuation systems . . . . . . . . . . . . . 24\n5.4 Current emergency elevator evacuation systems . . . . . . . . . . . 25\n5.5 Anticipatory emergency elevator evacuation systems . . . . . . . . . 26\n5.6 Simulation program of the legacy system . . . . . . . . . . . . . . . 27\n5.7 Applying the methodology . . . . . . . . . . . . . . . . . . . . . . . 28\n5.8 Simulation experiments . . . . . . . . . . . . . . . . . . . . . . . . . 31\n5.9 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33\n6 Case study: Runway incursion prevention systems 34\n6.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34\n6.2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34\n6.3 Problems of current runway incursion prevention systems . . . . . . 36\n6.4 Anticipatory runway incursion prevention systems . . . . . . . . . . 37\n6.5 Applying the methodology . . . . . . . . . . . . . . . . . . . . . . . 38\n6.6 The implemented ARIPS . . . . . . . . . . . . . . . . . . . . . . . . 40\n6.6.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40\n6.6.2 System architecture . . . . . . . . . . . . . . . . . . . . . . . 41\n6.6.3 Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41\n6.6.4 Predicting . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42\n6.6.5 Decision making . . . . . . . . . . . . . . . . . . . . . . . . . 45\n6.6.6 Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47\n6.6.7 Ad hoc methods for efficiency . . . . . . . . . . . . . . . . . 48\n6.7 System mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . 48\n6.8 Simulation experiments . . . . . . . . . . . . . . . . . . . . . . . . . 50\n6.9 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55\n6.10 Comparison with related work . . . . . . . . . . . . . . . . . . . . . 56\n6.11 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57\n7 Case study: Information security of computing services 58\n7.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58\n7.2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58\n7.3 Ideal malice defense systems . . . . . . . . . . . . . . . . . . . . . . 59\n7.4 Current intrusion detection systems . . . . . . . . . . . . . . . . . . 62\n7.5 Advantages of ARRSs for malice defense . . . . . . . . . . . . . . . 62\n7.5.1 Logical reasoning method . . . . . . . . . . . . . . . . . . . 62\n7.5.2 Persistent computing . . . . . . . . . . . . . . . . . . . . . . 63\n7.6 Applying the methodology . . . . . . . . . . . . . . . . . . . . . . . 63\n7.7 The implemented system . . . . . . . . . . . . . . . . . . . . . . . . 64\n7.7.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64\n7.7.2 Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . 65\n7.7.3 Mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . 66\n7.8 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68\n7.8.1 KDD99 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68\n7.8.2 A case study of web server . . . . . . . . . . . . . . . . . . . 68\n7.9 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69\n8 Discussion 71\n9 Conclusions 72\n9.1 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72\n9.2 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72\n9.3 Future works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73\nPublications 74", "subitem_description_type": "Other"}]}, "item_113_description_25": {"attribute_name": "注記", "attribute_value_mlt": [{"subitem_description": "主指導教員 : 程京德", "subitem_description_type": "Other"}]}, "item_113_description_33": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"subitem_description": "text", "subitem_description_type": "Other"}]}, "item_113_description_34": {"attribute_name": "フォーマット", "attribute_value_mlt": [{"subitem_description": "application/pdf", "subitem_description_type": "Other"}]}, "item_113_dissertation_number_19": {"attribute_name": "学位授与番号", "attribute_value_mlt": [{"subitem_dissertationnumber": "甲第921号"}]}, "item_113_identifier_registration": {"attribute_name": "ID登録", "attribute_value_mlt": [{"subitem_identifier_reg_text": "10.24561/00010283", "subitem_identifier_reg_type": "JaLC"}]}, "item_113_publisher_11": {"attribute_name": "出版者名", "attribute_value_mlt": [{"subitem_publisher": "埼玉大学大学院理工学研究科"}]}, "item_113_publisher_12": {"attribute_name": "出版者名(別言語)", "attribute_value_mlt": [{"subitem_publisher": "Graduate School of Science and Engineering, Saitama University"}]}, "item_113_record_name_8": {"attribute_name": "書誌", "attribute_value_mlt": [{"subitem_record_name": "博士論文(埼玉大学大学院理工学研究科(博士後期課程))"}]}, "item_113_text_31": {"attribute_name": "版", "attribute_value_mlt": [{"subitem_text_value": "[出版社版]"}]}, "item_113_text_36": {"attribute_name": "アイテムID", "attribute_value_mlt": [{"subitem_text_value": "GD0000496"}]}, "item_113_text_4": {"attribute_name": "著者 所属", "attribute_value_mlt": [{"subitem_text_value": "埼玉大学大学院理工学研究科"}]}, "item_113_text_5": {"attribute_name": "著者 所属(別言語)", "attribute_value_mlt": [{"subitem_text_value": "Graduate School of Science and Engineering, Saitama University"}]}, "item_113_version_type_32": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_970fb48d4fbd8a85", "subitem_version_type": "VoR"}]}, "item_access_right": {"attribute_name": "アクセス権", "attribute_value_mlt": [{"subitem_access_right": "open access", "subitem_access_right_uri": "http://purl.org/coar/access_right/c_abf2"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "石, 凱", "creatorNameLang": "ja"}, {"creatorName": "セキ, カイ", "creatorNameLang": "ja-Kana"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2018-01-23"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "GD0000496.pdf", "filesize": [{"value": "1.5 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_note", "mimetype": "application/pdf", "size": 1500000.0, "url": {"label": "GD0000496.pdf", "objectType": "fulltext", "url": "https://sucra.repo.nii.ac.jp/record/10289/files/GD0000496.pdf"}, "version_id": "0322ab58-bbe2-46b7-8382-e140d7de1085"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "doctoral thesis", "resourceuri": "http://purl.org/coar/resource_type/c_db06"}]}, "item_title": "Making Existing Reactive Systems Anticipatory : Methodology and Case Studies", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Making Existing Reactive Systems Anticipatory : Methodology and Case Studies", "subitem_title_language": "en"}]}, "item_type_id": "113", "owner": "15", "path": ["503"], "permalink_uri": "https://doi.org/10.24561/00010283", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2014-07-17"}, "publish_date": "2014-07-17", "publish_status": "0", "recid": "10289", "relation": {}, "relation_version_is_last": true, "title": ["Making Existing Reactive Systems Anticipatory : Methodology and Case Studies"], "weko_shared_id": -1}
Making Existing Reactive Systems Anticipatory : Methodology and Case Studies
https://doi.org/10.24561/00010283
https://doi.org/10.24561/00010283dc3be782-9421-454a-85c6-ae55ed08fde5
名前 / ファイル | ライセンス | アクション |
---|---|---|
GD0000496.pdf (1.5 MB)
|
|
Item type | 学位論文 / Thesis or Dissertation(1) | |||||||||
---|---|---|---|---|---|---|---|---|---|---|
公開日 | 2014-07-17 | |||||||||
タイトル | ||||||||||
言語 | en | |||||||||
タイトル | Making Existing Reactive Systems Anticipatory : Methodology and Case Studies | |||||||||
言語 | ||||||||||
言語 | eng | |||||||||
資源タイプ | ||||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_db06 | |||||||||
資源タイプ | doctoral thesis | |||||||||
ID登録 | ||||||||||
ID登録 | 10.24561/00010283 | |||||||||
ID登録タイプ | JaLC | |||||||||
アクセス権 | ||||||||||
アクセス権 | open access | |||||||||
アクセス権URI | http://purl.org/coar/access_right/c_abf2 | |||||||||
タイトル(別言語) | ||||||||||
その他のタイトル | 現存反応的システムへの先行予測機能追加 : 方法論と事例研究 | |||||||||
著者 |
石, 凱
× 石, 凱
|
|||||||||
著者 所属 | ||||||||||
埼玉大学大学院理工学研究科 | ||||||||||
著者 所属(別言語) | ||||||||||
Graduate School of Science and Engineering, Saitama University | ||||||||||
書誌 | ||||||||||
収録物名 | 博士論文(埼玉大学大学院理工学研究科(博士後期課程)) | |||||||||
書誌情報 |
発行日 2013 |
|||||||||
出版者名 | ||||||||||
出版者 | 埼玉大学大学院理工学研究科 | |||||||||
出版者名(別言語) | ||||||||||
出版者 | Graduate School of Science and Engineering, Saitama University | |||||||||
形態 | ||||||||||
内容記述タイプ | Other | |||||||||
内容記述 | viii, 91 p. | |||||||||
学位授与番号 | ||||||||||
学位授与番号 | 甲第921号 | |||||||||
学位授与年月日 | ||||||||||
学位授与年月日 | 2013-09-20 | |||||||||
学位名 | ||||||||||
学位名 | 博士(工学) | |||||||||
学位授与機関 | ||||||||||
学位授与機関識別子Scheme | kakenhi | |||||||||
学位授与機関識別子 | 12401 | |||||||||
学位授与機関名 | 埼玉大学 | |||||||||
抄録 | ||||||||||
内容記述タイプ | Abstract | |||||||||
内容記述 | A reactive system is a system that maintains an ongoing interaction with its environment, as opposed to obtain a nal result. Various reactive systems play very important roles in modern society, such as bank transfer systems, web servers, operating systems, computer networks, air/railway traffic control systems, elevator systems, and nuclear power plant control systems. Since an accident or an attack of a critical reactive system may cause nancial loss and even casualties, the biggest challenge for reactive systems is not only to ensure the system functionality, but to prevent these accidents and attacks. A traditional reactive system is usually passive, i.e., the system can only perform those operations in response to instructions explicitly issued by users or application programs, but have no ability to do something actively and anticipatorily by themselves. From the viewpoint of safety engineering and security engineering, a traditional passive reactive system only has some quite weak capability to defend accidents and attacks from its external computing environment. In order to prevent accidents/attacks beforehand, it is desired that a reactive system is anticipatory, i.e., the system can detect and predict omens of accidents/attacks anticipatorily and then take some actions to inform its users and perform some operations to defend accidents/attacks by itself. Therefore, from the viewpoints of high safety and high security, any critical reactive system should be anticipatory. In order to build practically useful reactive systems with the ability of anticipation, Cheng proposed anticipatory reasoning-reacting system as a certain class of computing anticipatory systems, which is a computing system can predict based on the predictive model then take anticipatory actions according to the predictions as well as take reactive actions to the current situation based on the behavioral model. The most important features of proposed anticipatory reasoning-reacting systems are: (1) both the prediction and decision making are base on logic-based forward reasoning, and (2) an anticipatory reasoning-reacting system is a simple extension of a reactive system. However, there are many critical existing systems which perform routine operations well but do not have the ability of anticipation to handle accidents and attacks. These systems no longer satisfy the requirements of high safety and high security. Furthermore, it is impractical, if not impossible, to rebuild the whole system to be anticipatory, because reimplementation of the whole of a system results in high cost. On the other hand, it is not necessary and economic to rebuild the whole of an existing reactive system with anticipatory ability, if it is possible to extend certain types of existing systems with anticipatory ability without aecting its original functions. However, by now, there is no study about which kind of reactive systems can be extend to be anticipatory, and no study about how to add anticipatory ability without aecting or with minor aecting the original system. Therefore, we argued it is possible to extend an existing reactive system (called legacy system) to be an anticipatory reasoning-reacting system (called target system) without reimplementing the whole of the system, and proposed a general methodology to realize such an extension. In this research, we first investigated and analyzed current reactive systems, in order to find out how the current reactive systems ensure the safety/security, and to find out which kind of existing reactive systems can be made anticipatory. Based on the analysis, we specified some requirements for the legacy systems which can be extend to be anticipatory. Then we discussed why it is possible to extend a reactive system anticipatory without aecting its original function. Based on the above work, we proposed a general architecture of anticipatory reasoning-reacting system for the extension, and a general process to extend an existing reactive system to be anticipatory. The main phases of the process include: (1) to analyze the target domain, aiming to find out possible accidents/attacks in the target, as well as their causation, formation process, and the consequence, (2) to analysis the legacy system, aiming to ensure the original function of the system, find out how to get information used for detection and prediction from the system, and nd out which function of the system can be used as anticipatory actions, (3) to define requirements of the target system, (4) to construct the anticipatory models, which underline both predicting and choosing anticipatory actions, and (5) to prepare the anticipatory components, especially to design and implement the special components for the certain target domain, and to integrate all anticipatory components with the legacy system. The novelty of the methodology is that it does not affect the system's original function, and it can deal with various reactive systems by using the same process. In order to show the eectiveness and usefulness of our methodology, we chose three typical reactive systems as case studies: emergency elevator evacuation systems, runway incursion prevention systems, and computing application servers, then applied the methodology to extend these systems to be anticipatory. For each case study, we elaborated its motivation, system design, system implementation, and evaluation, as well as showed how to apply the methodology and the advantage of the certain anticipatory reasoning-reacting system in that case study. After presented the case studies, we evaluated the methodology from viewpoint of generality and particularity. This work has following contributions. First, we conceived a new approach to improve existing reactive systems safety and/or security by extending the system with anticipatory ability. Second, we proposed a general methodology, which can extend various reactive systems with anticipatory ability, and we showed the eectiveness of the methodology by applying the methodology to dierent case studies. Third, we built three practical ARRSs in the case studies, thus showed the practical usefulness of anticipation and ARRSs for safety and security. Previous studies of ARRSs are mainly theoretical, such as formal definition, architecture design, mechanism of prediction and decision-making, and prototype implementation, thus, there was a gap between those theoretical work and practical ARRSs. Whereas, in this work, we built practical ARRSs, as well as solve several practical problems when building practical ARRSs. This thesis is organized as follows. Chapter 1 presents the background, motivation, and purpose of this work. Chapter 2 surveys reactive systems, and analyzes the feasibility to extend an existing reactive system to be anticipatory. Chapter 3 gives a review of anticipatory reasoning-reacting systems. Chapter 4 presents the methodology to extend the existing reactive systems to be anticipatory. Chapter 5 shows a case study of emergency elevator evacuation systems. Chapter 6 shows a case study of runway incursion prevention systems. Chapter 7 shows a case study of computing application servers. Chapter 8 discusses the generality and particularity of the methodology. Concluding remarks are given in chapter 9. |
|||||||||
目次 | ||||||||||
内容記述タイプ | Other | |||||||||
内容記述 | Abstract i Acknowledgments iii List of gures vii List of tables viii 1 Introduction 1 1.1 Background and motivation . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Purposes and objectives . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Structure of this thesis . . . . . . . . . . . . . . . . . . . . . . . . . 2 2 Reactive systems and feasibility analysis of extension 3 2.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.2 Functions and classication . . . . . . . . . . . . . . . . . . . . . . 4 2.3 Safety and information security . . . . . . . . . . . . . . . . . . . . 5 2.4 Approaches to develop reactive systems . . . . . . . . . . . . . . . . 5 2.4.1 Statecharts . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.4.2 Temporal logic . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.4.3 Bigraphical reactive systems . . . . . . . . . . . . . . . . . . 7 2.4.4 Synchronous programming of reactive systems . . . . . . . . 7 2.4.5 Fault tree analysis . . . . . . . . . . . . . . . . . . . . . . . 7 2.4.6 Object-oriented approaches . . . . . . . . . . . . . . . . . . 7 2.4.7 Secure reactive systems . . . . . . . . . . . . . . . . . . . . . 8 2.5 Need of extension with anticipation . . . . . . . . . . . . . . . . . . 8 2.6 Feasibility analysis of extension . . . . . . . . . . . . . . . . . . . . 9 3 Anticipatory reasoning-reacting systems 10 3.1 Logic-based forward reasoning on ARRS . . . . . . . . . . . . . . . 10 3.2 Overview of ARRS . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3.3 Safety and information security . . . . . . . . . . . . . . . . . . . . 15 3.4 ARRS: The candidate of target system for extension . . . . . . . . 15 4 A methodology to make existing reactive systems anticipatory 17 4.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 4.2 Requirements of legacy systems . . . . . . . . . . . . . . . . . . . . 17 4.3 Target system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 4.4 Phases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 5 Case study: Emergency elevator evacuation systems 23 5.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 5.2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 5.3 Ideal emergency elevator evacuation systems . . . . . . . . . . . . . 24 5.4 Current emergency elevator evacuation systems . . . . . . . . . . . 25 5.5 Anticipatory emergency elevator evacuation systems . . . . . . . . . 26 5.6 Simulation program of the legacy system . . . . . . . . . . . . . . . 27 5.7 Applying the methodology . . . . . . . . . . . . . . . . . . . . . . . 28 5.8 Simulation experiments . . . . . . . . . . . . . . . . . . . . . . . . . 31 5.9 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 6 Case study: Runway incursion prevention systems 34 6.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 6.2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 6.3 Problems of current runway incursion prevention systems . . . . . . 36 6.4 Anticipatory runway incursion prevention systems . . . . . . . . . . 37 6.5 Applying the methodology . . . . . . . . . . . . . . . . . . . . . . . 38 6.6 The implemented ARIPS . . . . . . . . . . . . . . . . . . . . . . . . 40 6.6.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 6.6.2 System architecture . . . . . . . . . . . . . . . . . . . . . . . 41 6.6.3 Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 6.6.4 Predicting . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 6.6.5 Decision making . . . . . . . . . . . . . . . . . . . . . . . . . 45 6.6.6 Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47 6.6.7 Ad hoc methods for efficiency . . . . . . . . . . . . . . . . . 48 6.7 System mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . . 48 6.8 Simulation experiments . . . . . . . . . . . . . . . . . . . . . . . . . 50 6.9 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 6.10 Comparison with related work . . . . . . . . . . . . . . . . . . . . . 56 6.11 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 7 Case study: Information security of computing services 58 7.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 7.2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 7.3 Ideal malice defense systems . . . . . . . . . . . . . . . . . . . . . . 59 7.4 Current intrusion detection systems . . . . . . . . . . . . . . . . . . 62 7.5 Advantages of ARRSs for malice defense . . . . . . . . . . . . . . . 62 7.5.1 Logical reasoning method . . . . . . . . . . . . . . . . . . . 62 7.5.2 Persistent computing . . . . . . . . . . . . . . . . . . . . . . 63 7.6 Applying the methodology . . . . . . . . . . . . . . . . . . . . . . . 63 7.7 The implemented system . . . . . . . . . . . . . . . . . . . . . . . . 64 7.7.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 7.7.2 Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 7.7.3 Mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 7.8 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 7.8.1 KDD99 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 7.8.2 A case study of web server . . . . . . . . . . . . . . . . . . . 68 7.9 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 8 Discussion 71 9 Conclusions 72 9.1 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 9.2 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 9.3 Future works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Publications 74 |
|||||||||
注記 | ||||||||||
内容記述タイプ | Other | |||||||||
内容記述 | 主指導教員 : 程京德 | |||||||||
版 | ||||||||||
[出版社版] | ||||||||||
著者版フラグ | ||||||||||
出版タイプ | VoR | |||||||||
出版タイプResource | http://purl.org/coar/version/c_970fb48d4fbd8a85 | |||||||||
資源タイプ | ||||||||||
内容記述タイプ | Other | |||||||||
内容記述 | text | |||||||||
フォーマット | ||||||||||
内容記述タイプ | Other | |||||||||
内容記述 | application/pdf | |||||||||
作成日 | ||||||||||
日付 | 2014-07-16 | |||||||||
日付タイプ | Created | |||||||||
アイテムID | ||||||||||
GD0000496 |