skip to main content
10.1145/1558607.1558680acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Introduction of first passage time (FPT) analysis for software reliability and network security

Published:13 April 2009Publication History

ABSTRACT

The study of the First Passage Time (FPT) problem (also known as first passage problem, FPP) started more than a century ago, but its diverse applications in science and engineering mostly emerged in the last two to three decades. Assuming that X(t) is a one-dimensional stochastic process, the First Passage Time is defined as the time (T) when X(t) first crosses a threshold. Engineering reliability is obviously a suitable application domain, and indeed applications such as optimal dam design in hydrology and analysis of structural failure in civil and mechanical engineering are typical examples. Although we envision that the FPT problem has great potential in network and software reliability, it should be more useful for network security and survivability because the approaches developed for the FPT problem are mostly analytical. The assumption for this inference is that in reliability analysis, experimental or historical data are often more readily available, which makes statistical approaches such as survival analysis more convenient and likely more realistic. In contrast, data is generally more difficult to obtain in security and survivability analyses, and analytical approaches can be leveraged to play more important roles. Furthermore, security and survivability often have to deal with malicious actions that may be driven by sophisticated cognition and behavioral processes, which are highly variable over time and very difficult to detect with short term data. If the behavior of an intruder can be characterized with some stochastic process such as Brownian motion, then the FPT approach may be applied to find the closed-form solution of the probability density function (PDF) of the first passage time, which can be the time when the system breaks down or when the hacker is successful in compromising a network. In addition, the solutions to FPT depend on boundary and initial conditions of the corresponding partial differential equations, and they also describe the evolution of PDF over time. This may suggest that it is possible to model the behavior changes of an intruder over time and circumstances. Another advantage of FPT analysis is that it may help solve some non-Markov stochastic process problems in reliability analysis and survival analysis. In this article, we first briefly introduce the FPT problem with Brownian motion as an example, and then suggest its potential applications in software reliability and network security.

References

  1. Argyrakisa, P.&G. H. Weiss. A first-passage time problem for many random walkers. Physica A 363 (2006) 343--347.Google ScholarGoogle Scholar
  2. Aytug H., G. J. Koehler. 2000. New stopping criterion for genetic algorithms. European Journal of Operational Research 126:662--674.Google ScholarGoogle ScholarCross RefCross Ref
  3. Bachelier, L. 1900. Annales des Sciences de l'Ecole Superieure 17, 21.Google ScholarGoogle Scholar
  4. Blanchet, J. H., J. Liu. 2007. Rare-event simulation for a multidimensional random walk with t-distributed increment. Proc. of the 2007 IEEE Winter Simulation Conference. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Ching, J., J. L. Beck. 2007. Real-time reliability estimation for serviceability limit states in structures with uncertain dynamic excitation and incomplete output data. Probabilistic Engineering Mechanics 22 (2007) 50--62Google ScholarGoogle ScholarCross RefCross Ref
  6. Ding, M.&G. Rangarajan. 2004. First Passage Time Problem: A Fokker-Planck Approach. in "New Directions in Statistical Physics". ed by L. T. Wille. Springer. pp31--46.Google ScholarGoogle Scholar
  7. Duan, H., D. Wang, X. Yu. 2006. Markov Chains and Martingale Theory Based Convergence Proof of Ant Colony Algorithm and Its Simulation Platform. Proc. of the 6th World Cong. on Intelligent Control and Automation, June 21--23, 2006, Dalian, ChinaGoogle ScholarGoogle Scholar
  8. Gardiner, C. W. 1997. Handbook of Stochastic Methods. Springer.Google ScholarGoogle Scholar
  9. Giorno, V. A. G. Nobile, L. M. Ricciardib. 1997. BioSystems 40: 65--74Google ScholarGoogle Scholar
  10. Grimmet, G. R.&D. R. Stirzaker. 1994. Probability and Random Process. Oxford University Press, Oxford.Google ScholarGoogle Scholar
  11. Hill, T. L. 1989. Free energy transduction and biological cycle kinetics. Springer, New York.Google ScholarGoogle Scholar
  12. Hiromoto, R. E. 2007. An Iterative Monte Carlo Scheme with Relaxation. IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications. 6--8 September 2007.Google ScholarGoogle Scholar
  13. Karamchandani, N., D. Manjunath, D. Yogeshwaran and S. K. Iyer. 2006. Evolving Random Geometric Graph Models for Mobile Wireless Networks. 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks.Google ScholarGoogle Scholar
  14. Kruzynski, M.&P. Chelminiak. 2002. Mean first-passage time in the stochastic theory of biochemical processes. Journal of Statistical Physics. 110:137--181.Google ScholarGoogle ScholarCross RefCross Ref
  15. Kulkarni, V. G. E. Tzenova. 2002. Mean first passage times in fluid queues. Operations Research Letters 30: 308--318. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Labou, M. 2003. Solution of the First Passage Problem by advanced Monte Carlo Simulation Technique. Strength of Materials, 35(6), 2003Google ScholarGoogle ScholarCross RefCross Ref
  17. Ma, Z., Z. Cao, W. Chen. 2008. A Fair Opportunistic Spectrum Access (FOSA) Scheme in Distributed Cognitive Radio Networks. 2008 IEEE Int. Conf. Comm.Google ScholarGoogle ScholarCross RefCross Ref
  18. Ma, Z. S. 2008. New approaches to reliability and survivability with survival analysis, dynamic hybrid fault models, and evolutionary game theory. PhD Dissertation, 177pp, University of Idaho, Moscow, ID, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Ma, Z. S.&A. W. Krings. 2008a Multivariate Survival Analysis (I): Shared Frailty Approaches to Reliability and Dependence Modeling, Proc. 29th IEEE--AIAA Aerospace Conference, March 1--8, 2008, Big Sky, MT. 21 Pages.Google ScholarGoogle ScholarCross RefCross Ref
  20. Ma, Z. S.&A. W. Krings. 2008b. Dynamic hybrid fault models and their applications to wireless sensor networks. The 11-th ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems. ACM MSWiM 2008. 9 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Madhavan P.&M. Prasad. 2008. Fatigue reliability analysis of fixed offshore structures: A first passage problem approach. Journal of Zhejiang University Science A. 7(11):1839--1845Google ScholarGoogle ScholarCross RefCross Ref
  22. Nwankpa, C. O. 1992. The Search for An On-Line Dynamic Security Index. IEEE International Conference on Systems, Man and Cybernetics. Digital Object Identifier: 10.1109/ICSMC.1992.271644.Google ScholarGoogle Scholar
  23. Pichler, L, Pradlwarter H. J. 2008. Evolution of probability densities in the phase space for reliability analysis of nonlinear structures. doi:10.1016/j.strusafe.2008.09.002Google ScholarGoogle Scholar
  24. Pieper, V., Domine, M., Kurth, P. 1997. Level crossing problems and drift reliability. Mathematical Methods of Operations Research. 45:347--354.Google ScholarGoogle ScholarCross RefCross Ref
  25. Pr'ugel-Bennett, A. 2004. When a genetic algorithm outperforms hill-climbing. Theoretical Computer Science 320:135--153 Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Rangarajan, G., M. Ding, M. Z. 2000. First passage time distribution for anomalous diffusion. Physics Letters A 273:322--330Google ScholarGoogle ScholarCross RefCross Ref
  27. Revelli, J. A. C. E. Budde, H. S. Wioa. 2006. Diffusion in fluctuating media: first passage time problem. Physics Letters A. 306 (2002) 104--109.Google ScholarGoogle Scholar
  28. Rinsaka, K and T. Dohi. 2004. Who Solved the Optimal Software Release Problems Based on Markovian Software Reliability Model? Proc. of the 47th IEEE International Midwest Symposium on Circuits and Systems.Google ScholarGoogle Scholar
  29. Rinsaka, K., K. Shibata, T. Dohi. 2006. Proportional Intensity-Based Software Reliability Modeling with Time-Dependent Metrics. Proceedings of the 30th Annual Int. Computer Software and Applications Conf. (COMPSAC'06). Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Risken, K. 1989. The Fokker-Planck Equation. Springer.Google ScholarGoogle Scholar
  31. Shibata, K. K. Rinsaka, T. Dohi. 2006. Metrics-Based Software Reliability Models Using Non-homogeneous Poisson Processes. 17th International Symposium on Software Reliability Engineering (ISSRE'06) Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Tuckwell, H. C. 1988. Introduction to theoretical neurobiology. Cambridge Univ. Press.Google ScholarGoogle Scholar
  33. Tuckwell, H. C. and F. Y. M. Wan. 2000. First Passage Time to Detection in Stochastic Population Dynamical Models for HIV-1. Applied Mathematics Letters 13 (2000) 79--83.Google ScholarGoogle ScholarCross RefCross Ref
  34. Wakuta, K. 2000. A First Passage Problem with multiple costs. Mathematical Methods of Operations Research. 51:419--32.Google ScholarGoogle ScholarCross RefCross Ref
  35. Wang, S. P., W. J. Pei, Z-Y. He. 2008. Random Walks On the Neural Network of C. elegans. IEEE Int. Conference Neural Networks&Signal Processing.Google ScholarGoogle Scholar
  36. Wang, S. P. W. J. Pei. 2008. First passage time of multiple Brownian particles on networks with applications. Physica A 387: 4699--4708Google ScholarGoogle ScholarCross RefCross Ref
  37. Wu, Y. and W. Fang. 2008. Stochastic averaging method for estimating first-passage statistics of stochastically excited Duffing--Rayleigh--Mathieu system. Acta Mech Sin. 24:575--582Google ScholarGoogle ScholarCross RefCross Ref
  38. Yuen, S. Y. and B. K. S. Cheung. 2006. Bounds for Probability of Success of Classical Genetic Algorithm Based on Hamming Distance. IEEE Trans. Evol. Comp. 10(1):1--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Zhao, W.&E. A. Elsayed. 2004. An Accelerated Life Testing Model Involving Performance Degradation. IEEE RAMS 2004.Google ScholarGoogle Scholar
  40. Zhua, W. Q. Z. L. Huang, M. L. Deng. 2003. First-passage failure and its feedback minimization of quasi-partially integrable Hamiltonian systems. International Journal of Non-Linear Mechanics 38:1133--1148Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Introduction of first passage time (FPT) analysis for software reliability and network security

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        CSIIRW '09: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
        April 2009
        952 pages
        ISBN:9781605585185
        DOI:10.1145/1558607

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 April 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader