Analysis of Linux kernel as a complex network

被引:19
|
作者
Gao, Yichao [1 ]
Zheng, Zheng [1 ]
Qin, Fangyun [1 ]
机构
[1] Beihang Univ, Sch Automat Sci & Elect Engn, Beijing 100191, Peoples R China
关键词
POWER-LAWS; EVOLUTION;
D O I
10.1016/j.chaos.2014.10.008
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Operating system (OS) acts as an intermediary between software and hardware in computer-based systems. In this paper, we analyze the core of the typical Linux OS, Linux kernel, as a complex network to investigate its underlying design principles. It is found that the Linux Kernel Network (LKN) is a directed network and its out-degree follows an exponential distribution while the in-degree follows a power-law distribution. The correlation between topology and functions is also explored, by which we find that LKN is a highly modularized network with 12 key communities. Moreover, we investigate the robustness of LKN under random failures and intentional attacks. The result shows that the failure of the large in-degree nodes providing basic services will do more damage on the whole system. Our work may shed some light on the design of complex software systems. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:246 / 252
页数:7
相关论文
共 50 条
  • [41] LKL: The Linux Kernel Library
    Purdila, Octavian
    Grijincu, Lucian Adrian
    Tapus, Nicolae
    9TH ROEDUNET IEEE INTERNATIONAL CONFERENCE, 2010, : 328 - 333
  • [42] Deadline scheduling in the Linux kernel
    Lelli, Juri
    Scordino, Claudio
    Abeni, Luca
    Faggioli, Dario
    SOFTWARE-PRACTICE & EXPERIENCE, 2016, 46 (06): : 821 - 839
  • [43] Identifying clones in the Linux kernel
    Casazza, G
    Antoniol, G
    Villano, U
    Merlo, E
    Di Penta, M
    FIRST IEEE INTERNATIONAL WORKSHOP ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2001, : 90 - 97
  • [44] RCU Usage in the Linux Kernel
    McKenney P.E.
    Fernandes J.
    Boyd-Wickizer S.
    Walpole J.
    Operating Systems Review (ACM), 2020, 54 (01): : 47 - 63
  • [45] Linux Security Modules: General security support for the Linux kernel
    Wright, C
    Cowan, C
    Smalley, S
    Morris, J
    Kroah-Hartman, G
    USENIX ASSOCIATION PROCEEDINGS OF THE 11TH USENIX SECURITY SYMPOSIUM, 2002, : 17 - 31
  • [46] EXPLORING THE KNOWLEDGE CREATING COMMUNITIES: AN ANALYSIS OF THE LINUX KERNEL DEVELOPER COMMUNITY
    Xia, Haoxiang
    Luo, Shuangling
    Yoshida, Taketoshi
    MANAGING KNOWLEDGE FOR GLOBAL AND COLLABORATIVE INNOVATIONS, 2010, 8 : 385 - +
  • [47] AMCheX: Accurate Analysis of Missing-Check Bugs for Linux Kernel
    Wang, Ying-Jie
    Yin, Liang-Ze
    Dong, Wei
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2021, 36 (06) : 1325 - 1341
  • [48] Survey and Analysis of Kernel and Userspace Tracers on Linux: Design, Implementation, and Overhead
    Gebai, Mohamad
    Dagenais, Michel R.
    ACM COMPUTING SURVEYS, 2018, 51 (02)
  • [49] AMCheX: Accurate Analysis of Missing-Check Bugs for Linux Kernel
    Ying-Jie Wang
    Liang-Ze Yin
    Wei Dong
    Journal of Computer Science and Technology, 2021, 36 : 1325 - 1341
  • [50] An adaptive approach for Linux memory analysis based on kernel code reconstruction
    Zhang S.
    Meng X.
    Wang L.
    EURASIP Journal on Information Security, 2016 (1):