Abstract
In passive monitoring, faults are detected while the System Under Test (SUT) is observed during its normal operation. Usually traces produced by SUT are recorded and compared with those of the specification. In certain contexts, such as network management and intrusion detection for security, passive monitoring is the most applicable methodology for assuring correctness of the systems behavior. This approach can provide valuable insights into systems behavior in actual environments of use. Key challenges of passive monitoring are: (a) the fault detection process cannot influence the execution of the system by providing particular inputs to the system; (b) observations are obtained mid-stream, from an unknown state in the middle of the execution of the system; (c) real-time behavioral properties should be considered during the process; (d) the monitoring is carrying out on the fly. In this paper, we present an approach to passively monitoring a network system with real-time properties. We represent timing information in the form of time-intervals between successive occurrence of events (i.e., packets/messages exchanged among peers).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Arnedo, J.A., Cavalli, A., Nunez, M.: Fast testing of critical properties through passive testing. In: Hogrefe, D., Wiles, A. (eds.) TestCom 2003. LNCS, vol. 2644, pp. 295–310. Springer, Heidelberg (2003)
Bayse, E., Cavalli, A., Nunez, M., Zaidi, F.: A passive testing approach based on invariants Application to the wap. In: Computer Networks and ISDN Systems, vol. 48, pp. 247–266 (2005)
Cavalli, A., Gervy, C., Prokopenko, S.: New approaches for passive testing using an extended finite state machine specification. Information and Software Technology 45, 837–852 (2003)
Cavalli, A., Vieira, D.: An enhanced passive testing approach for network protocols. In: International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICN/ICONS/MCL 2006), pp. 169–169 (2006)
Chen, D., Wu, J., Chu, T.: An enhanced passive testing tool for network protocols. In: International Conference on Computer Networks and Mobile Computing (ICCNMC 2003), pp. 513–516 (2003)
Lee, D., Chen, D., Hao, R., Miller, R.E., Wu, J., Yin, X.: A formal approach for passive testing of protocol data portions. In: IEEE International Conference on Network Protocols (ICNP 2002), pp. 122–131 (2002)
Lee, D., Chen, D., Hao, R., Miller, R.E., Wu, J., Yin, X.: Network protocol system monitoring - a formal approach with passive testing. IEEE/ACM Transactions on Networking 14, 424–437 (2006)
Lee, D., Netravali, A.N., Sabnani, K.K., Sugla, B., John, A.: Passive testing and applications to network management. In: IEEE International Conference on Network Protocols (ICNP 1997), pp. 113–122 (1997)
Wu, J., Zhao, Y., Yin, X.: From active to passive: Progress in testing of internet routing protocols. In: IFIP FORTE 2001, pp. 101–118 (2001)
Zhao, Y., Yin, X., Wu, J.: Online test system, an application of passive testing in routing protocols test. In: 9th IEEE International Conference on Networks, pp. 190–195 (2001)
Chen, D., Wu, J., Chu, T.: An enhanced passive testing tool for network protocols. In: International Conference on Computer Networks and Mobile Computing (ICCNMC 2003), pp. 513–516 (2003)
Miller, R.: Passive testing of networks using a cfsm specification. In: IEEE International Performance, Computing and Communications Conference (IPCCC 1998), pp. 111–116 (1998)
Miller, R., Arisha, K.: Fault identification in networks using a cfsm model by passive testing. Technical report, UMIACS (2001)
Miller, R., Arisha, K.: Fault coverage in networks by passive testing. In: International Conference on Internet Computing, pp. 413–419 (2001)
Jagadeesan, L.J., Viswanathan, R.: Passive mid-stream monitoring of real-time properties. In: Proceedings of the 5th ACM international conference on Embedded software (EMSOFT 2005), pp. 343–352 (2005)
Ural, H., Xu, Z.: An EFSM-Based Passive Fault Detection Approach. In: Petrenko, A., Veanes, M., Tretmans, J., Grieskamp, W. (eds.) TestCom/FATES 2007. LNCS, vol. 4581, pp. 335–350. Springer, Heidelberg (2007)
Rekhter, Y., Li, T.: A Border Gateway Protocol 4 (BGP-4) (March 1995), http://www.ietf.org/rfc/rfc1771.txt
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Vieira, D., Vieira, E.R. (2009). Network Monitoring with Real-Time Properties: A Step Forward. In: Lee, R., Ishii, N. (eds) Software Engineering Research, Management and Applications 2009. Studies in Computational Intelligence, vol 253. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05441-9_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-05441-9_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-05440-2
Online ISBN: 978-3-642-05441-9
eBook Packages: EngineeringEngineering (R0)