On the estimation of buffer overflow probabilities from measurements

被引:13
|
作者
Paschalidis, IC [1 ]
Vassilaras, S
机构
[1] Boston Univ, Dept Mfg Engn, Boston, MA 02215 USA
[2] Boston Univ, Coll Engn, Boston, MA 02215 USA
基金
美国国家科学基金会;
关键词
empirical measure; estimation; large deviations; Markov-modulated processes; Sanov's theorem;
D O I
10.1109/18.904521
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose estimators of the buffer overflow probability in queues fed by a Markov-modulated input process and serviced by an autocorrelated service process. These estimators are based on large-deviations asymptotics for the overflow probability. We demonstrate that the proposed estimators are less likely to underestimate the overflow probability than the estimator obtained by certainty equivalence, As such, they are appropriate in situations where the overflow probability is associated with quality of service (QoS) and we need to provide firm QoS guarantees. We also show that as the number of observations increases to infinity the proposed estimators converge with probability one to the appropriate target, and thus, do not lead to underutilization of the system in this limit.
引用
收藏
页码:178 / 191
页数:14
相关论文
共 50 条
  • [21] Survey of Protections from Buffer-Overflow Attacks
    Piromsopa, Krerk
    Enbody, Richard J.
    ENGINEERING JOURNAL-THAILAND, 2011, 15 (02): : 31 - 52
  • [22] PointGuard™:: Protecting pointers from buffer overflow vulnerabilities
    Cowan, C
    Beattie, S
    Johansen, J
    Wagle, P
    USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, 2003, : 91 - 104
  • [23] A dynamic mechanism for recovering from buffer overflow attacks
    Sidiroglou, S
    Giovanidis, G
    Keromytis, AD
    INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 1 - 15
  • [24] Method of integer overflow detection to avoid buffer overflow
    School of Computer Science and Engineering, Southeast University, Nanjing 211189, China
    不详
    J. Southeast Univ. Engl. Ed., 2009, 2 (219-223):
  • [25] A Taxonomy of Buffer Overflow Characteristics
    Bishop, Matt
    Engle, Sophie
    Howard, Damien
    Whalen, Sean
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (03) : 305 - 317
  • [26] The Cost of Preventing a Buffer Overflow
    Gordonov, Anatoliy S.
    2014 ZONE 1 CONFERENCE OF THE AMERICAN SOCIETY FOR ENGINEERING EDUCATION (ASEE ZONE 1), 2014,
  • [27] Vulnerability scanning for buffer overflow
    Iyer, A
    Liebrock, LM
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 116 - 117
  • [29] Protecting global and static variables from buffer overflow attacks
    Younan, Yves
    Piessens, Frank
    Joosen, Wouter
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 798 - 803
  • [30] Defending Code from the Internet of Things against Buffer Overflow
    Teixeira, Fernando A.
    Machado, Gustavo V.
    Fonseca, Pablo M.
    Pereira, Fernando M. Q.
    Wong, Hao Chi
    Nogueira, Jose M. S.
    Oliveira, Leonardo B.
    2014 BRAZILIAN SYMPOSIUM ON COMPUTER NETWORKS AND DISTRIBUTED SYSTEMS (SBRC), 2014, : 293 - 301