Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Junjun Zheng is active.

Publication


Featured researches published by Junjun Zheng.


autonomic and trusted computing | 2012

Component Importance Analysis of Virtualized System

Junjun Zheng; Hiroyuki Okamura; Tadashi Dohi

This paper presents component importance analysis of virtualized system design. The component importance analysis is significant to develop a trusted system in its design phase. This paper discusses the importance of components from the viewpoint of availability. Specifically, based on the fault tree and continuous-time Markov chain models for virtualized system in Kim et al. (2009), we present a new method to evaluate component importance. In numerical examples, we illustrate quantitative importance analysis and compare the availabilities of non-virtualized and virtualized system designs.


IEEE Transactions on Reliability | 2017

A Comprehensive Evaluation of Software Rejuvenation Policies for Transaction Systems With Markovian Arrivals

Junjun Zheng; Hiroyuki Okamura; Lin Li; Tadashi Dohi

Software rejuvenation is one of the proactive fault management techniques to prevent system performance degradation, which may lead to the system failure caused by software aging. In the design of software rejuvenation, it is important to determine the optimal timing of triggering the rejuvenation in terms of the system overhead. In this paper, we consider six software rejuvenation policies, which are categorized into time-based and workload-based policies, under the environment where the arrival stream of system follows a Markovian arrival process (MAP). After building the stochastic models with respective rejuvenation policies, we formulate the loss probability of transaction and the upper bound of mean response time as the system performance indices. In the numerical illustrations, we exhibit a comprehensive study to compare six software rejuvenation policies numerically and show that the proposed rejuvenation policies called wait-time policies are superior to the others under the MAP arrival stream.


symposium on reliable distributed systems | 2017

A Statistical Framework on Software Aging Modeling with Continuous-Time Hidden Markov Model

Hiroyuki Okamura; Junjun Zheng; Tadashi Dohi

This paper considers the statistical approach to model software degradation process from time series data of system attributes. We first develop the continuous-time Markov chain (CTMC) model to represent the degradation level of system. By combining the CTMC with system attributes distributions, a continuous-time hidden Markov model (CT-HMM) is proposed as the basic model to represent the degradation level of system. To estimate model parameters, we develop the EM algorithm for CT-HMM. The advantage of this modeling is that the estimated model is directly applied to existing CTMC-based software aging and rejuvenation models. In numerical experiments, we exhibit the performance of our method by simulated data and also demonstrate estimating the software degradation process with experimental data in MySQL database system.


international conference on distributed computing systems workshops | 2016

Mean Time to Security Failure of VM-Based Intrusion Tolerant Systems

Junjun Zheng; Hiroyuki Okamura; Tadashi Dohi

Computer systems face the threat of deliberate security intrusions due to malicious attacks that exploit security holes or vulnerabilities. In practice, these security holes or vulnerabilities still remain in the system and applications even if developers carefully execute system testing. Thus it is necessary and important to develop the mechanism to prevent and/or tolerate security intrusions. As a result, the computer systems are often evaluated with confidentiality, integrity and availability (CIA) criteria from the viewpoint of security, and security is treated as a QoS (Quality of Service) attribute at par with other QoS attributes such as capacity and performance. In this paper, we present the method for quantifying a security attribute called mean time to security failure (MTTSF) of a VM-based intrusion tolerant system based on queueing theory.


pacific rim international symposium on dependable computing | 2015

Component Importance Measures for Real-Time Computing Systems in the Presence of Common-Cause Failures

Junjun Zheng; Hiroyuki Okamura; Tadashi Dohi

Component importance analysis is to measure the effect on system reliability of component reliabilities, and it can be used to the design of system from the reliability point of view. In this paper, we consider the component importance analysis of real-time computing systems in the presence of common-cause failures (CCFs) (i.e., failure dependencies). Although the CCFs are known as a risk factor of degradation of system reliability, it is difficult to evaluate the component importance measures in the presence of CCFs analytically. This paper introduces a continuous-time Markov chain (CTMC) model for real-time computing system, and applies the CTMC-based component-wise sensitivity analysis which can evaluate the component importance measures without any structure function of system. Also, in numerical experiments, we evaluate the effect of CCFs by the comparison of system performance measures and component importance in the case of system with CCFs with those in the case that there is no CCF in the system.


Reliability Engineering & System Safety | 2018

Optimal periodic software rejuvenation policies based on interval reliability criteria

Tadashi Dohi; Junjun Zheng; Hiroyuki Okamura; Kishor S. Trivedi

Abstract Software aging often affects the performance of software systems and may eventually cause them to fail. A complementary approach to handle transient software failures due to the software aging is called software rejuvenation. It is a preventive and proactive solution that is particularly useful for counteracting the phenomenon of software aging. In this paper, we consider the optimal software rejuvenation policies maximizing the interval reliability using the Markov regenerative process formalism. We derive analytically the optimal software rejuvenation timing that maximizes the limiting interval reliability or the interval reliability with exponentially distributed operation time. Further, we examine numerically the transient behavior of the interval reliability at an arbitrary operation time. Our results under the interval reliability criteria are extensions of some earlier papers, since the interval reliability is a comprehensive measure that specializes to pointwise system availability and to system reliability.


international symposium on computing and networking | 2016

Performance Evaluation of VM-based Intrusion Tolerant Systems with Poisson Arrivals

Junjun Zheng; Hiroyuki Okamura; Tadashi Dohi

Computer security has become an increasingly important hot topic in computer and communication industry, since it is important to support critical business process and to protect personal and sensitive information. Computer security is to keep security attributes (confidentiality, integrity and availability) of computer systems, which face the threats such as deny-of-service (DoS), virus and intrusion. To ensure high computer security, the intrusion tolerance technique based on fault-tolerant scheme has been widely applied. This paper presents the quantitative performance evaluation of a virtual machine (VM) based intrusion tolerant system. Concretely, two security measures are derived; MTTSF (mean time to security failure) and the effective traffic intensity. The mathematical analysis is achieved by using Laplace-Stieltjes transforms according to the analysis of M/G/1 queueing system.


IEICE Transactions on Information and Systems | 2015

Survivability Analysis of VM-Based Intrusion Tolerant Systems

Junjun Zheng; Hiroyuki Okamura; Tadashi Dohi


Applied Mathematics-a Journal of Chinese Universities Series B | 2015

Availability Importance Measures for Virtualized System with Live Migration

Junjun Zheng; Hiroyuki Okamura; Tadashi Dohi


computer software and applications conference | 2018

A Pull-Type Security Patch Management of an Intrusion Tolerant System Under a Periodic Vulnerability Checking Strategy

Junjun Zheng; Hiroyuki Okamura; Tadashi Dohi

Collaboration


Dive into the Junjun Zheng's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Tadashi Dohi

Hiroshima Shudo University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dharmendra Singh

Rajendra Memorial Research Institute of Medical Sciences

View shared research outputs
Top Co-Authors

Avatar

Hemant Kumar Verma

Indian Institute of Technology Gandhinagar

View shared research outputs
Researchain Logo
Decentralizing Knowledge