Skip to main content

A Robustness Testing Method for Network Security

  • Conference paper
Global Security, Safety and Sustainability & e-Democracy (e-Democracy 2011, ICGS3 2011)

Abstract

In this paper one type of the security problem of DoS (Denial of Service) is studied and transformed to check the robustness of a multiple components system. The network components like attackers, normal clients and the network devices are modeled as implementations of the testing system. And by evaluating the system’s robustness, the potential design defects can be detected. The methods on robustness testing of multiple components are studied, and a new model of Glued-IOLTS (Labelled Transition System) is given for defining this kind of multiple and networked system. Then a new approach and algorithm are given for generating the robustness test cases automatically.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ansay, T.: Compositional testing of communication systems-tools and case studies. Master’s thesis, Concordia University (2008)

    Google Scholar 

  2. Boulares, O., Kone, O.: A security control architecture for soap based services. In: International Conference on Emerging Security Information, Systems and Technologies, SECURWARE (2010)

    Google Scholar 

  3. Castanet, R., Kone, O., and Zarkouna. Test de robustesse. In: Proc. of SETIT 2003 (Mars 2003)

    Google Scholar 

  4. Desmoulin, A., Viho, C.: Interoperability test generation: Formal definitions and algorithm. In: ARIMA-Numero Special CARI 2006, pp. 49–63 (2006)

    Google Scholar 

  5. Gotzhein, R., Khendek, F.: Compositional testing of communication systems. IFIP International Federation for Information Processing (2006)

    Google Scholar 

  6. Khorchef, S. Un Cardre Formel pour le Test de Robustesse des Protocols de Communication. PhD thesis, University of Bordeaux 1 (2007)

    Google Scholar 

  7. Lai, R. A survey of communication protocol testing. Systems and Software 62 (2002)

    Google Scholar 

  8. Lei, B., Li, X., and Liu, Z. Robustness testing for software components. Science of Computer Programming, 879–897 (2010)

    Google Scholar 

  9. Malek, M., and Dibuz, S. Pragmatic method for interoperability test suite derivation. In: The 24th Euromicro Conference, vol. 2, pp. 838–844. IEEE

    Google Scholar 

  10. Offutt, J., Liu, S., and Abdurazik, A. Genearting test data from state-based specification. The Journal of Software Testing,Verification and Reliability, 25–53 (2003)

    Google Scholar 

  11. Rigney, C., Willens, S., and Rubens, A. Remote authentication dial in user service (radius). Tech. rep., The Internet Society (2000)

    Google Scholar 

  12. Tretmans, J. Conformance testing with labelled transition system: Implementation relations and test generation. Computer Networks and ISDN Systems, 49–76 (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Fu, Y., Kone, O. (2012). A Robustness Testing Method for Network Security. In: Georgiadis, C.K., Jahankhani, H., Pimenidis, E., Bashroush, R., Al-Nemrat, A. (eds) Global Security, Safety and Sustainability & e-Democracy. e-Democracy ICGS3 2011 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 99. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33448-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33448-1_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33447-4

  • Online ISBN: 978-3-642-33448-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics