Skip to main content

A Formal Monitoring Technique for SIP Conformance Testing

  • Conference paper
Evaluation of Novel Approaches to Software Engineering (ENASE 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 410))

  • 308 Accesses

Abstract

Formal approaches provide many keys to efficiently test the conformance of communicating protocols. Active and passive testing techniques are two main sets of these approaches. Compare to active testing, passive testing techniques are used whenever the system cannot be interrupted, or its interfaces are unavailable to access. Under such conditions, communication traces are extracted from points of observation and compared with the expected conformance requirements formally specified as properties. This paper presents a novel monitoring approach, aiming at formally specifying protocol properties in order to check them on real execution traces. A prototype is developed and experienced based on the algorithms defined in a previous paper. Experiments are presented through a set of IMS/SIP properties and numerous execution traces in order to evaluate and assess our technique. The relevant verdicts and discussions are provided at the end.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lee, D., Chen, D., Hao, R., Miller, R.E., Wu, J., Yin, X.: Network protocol system monitoring-a formal approach with passive testing. IEEE/ACM Transactions on Networking 14(2), 424–437 (2006)

    Article  Google Scholar 

  2. Bayse, E., Cavalli, A., Nunez, M., Zaidi, F.: A passive testing approach based on invariants: application to the wap. Computer Networks 48(2), 247–266 (2005)

    Article  MATH  Google Scholar 

  3. Hierons, R.M., Krause, P., Luttgen, G., Simons, A.J.H.: Using formal specifications to support testing. ACM Computing Surveys 41(2), 176 (2009)

    Article  Google Scholar 

  4. Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J.: Sip: Session initiation protocol (2002)

    Google Scholar 

  5. Maag, S., Lalanne, F.: A formal data-centric approach for passive conformance testing of communication protocols. Technical report, Telecom Sud-Paris - 110003-LOR, ISSN 1968-505X (2011)

    Google Scholar 

  6. Ural, H., Xu, Z.: An EFSM-based passive fault detection approach. In: Petrenko, A., Veanes, M., Tretmans, J., Grieskamp, W. (eds.) TestCom/FATES 2007. LNCS, vol. 4581, pp. 335–350. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  7. Leucker, M., Schallhart, C.: A brief account of runtime verification. Journal of Logic and Algebraic Programming 78(5), 293–303 (2009)

    Article  MATH  Google Scholar 

  8. Morales, G., Maag, S., Cavalli, A., Mallouli, W., Oca, E.D.: Timed extended invariants for the passive testing of web services. In: IEEE International Conference of Web Services (2010)

    Google Scholar 

  9. Cao, T.-D., Phan-Quang, T.-T., Felix, P., Castanet, R.: Automated runtime verification for web services. In: IEEE International Conference on Web Services, pp. 76–82 (2010)

    Google Scholar 

  10. Cuppens, F., Cuppens-Boulahia, N., Nomad, T.S.: A security model with non atomic actions and deadlines. IEEE (2005)

    Google Scholar 

  11. Barringer, H., Goldberg, A., Havelund, K., Sen, K.: Rule-based runtime verification. In: Steffen, B., Levi, G. (eds.) VMCAI 2004. LNCS, vol. 2937, pp. 44–57. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  12. Abiteboul, S., Hull, R., Vianu, V.: Datalog and Recursion, 2nd edn. Addison-Wesley (1995)

    Google Scholar 

  13. Emden, M.V., Kowalski, R.: The semantics of predicate logic as a programming language. Journal of the ACM 23(4), 733–742 (1976)

    Article  MATH  Google Scholar 

  14. Nilsson, U., Maluszynski, J.: Logic, programming and Prolog, 2nd edn. Wiley (1990)

    Google Scholar 

  15. Bauer, A., Leucker, M.: Runtime verification for ltl and tltl. ACM Transactions on Software Engineering and Methodology, 1–68 (2007)

    Google Scholar 

  16. Apt, K., Van Emden, M.: Contributions to the theory of logic programming. Journal of the ACM (JACM) 29(3), 841–862 (1982)

    Article  MathSciNet  MATH  Google Scholar 

  17. Hewlett-Packard: SIPp (2004), http://sipp.sourceforge.net/

  18. ETSI: Methods for testing and specification (mts); conformance test specification for sip. (2004)

    Google Scholar 

  19. Rosenberg, J., Schulzrinne, H., Levin, O.: A session initiation protocol (sip) event package for conference state (2006)

    Google Scholar 

  20. Bradner, S.: Benchmarking terminology for network interconnection devices (1991)

    Google Scholar 

  21. Bradner, S., McQuaid, J.: Benchmarking methodology for network interconnect devices (1991)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Che, X., Lalanne, F., Maag, S. (2013). A Formal Monitoring Technique for SIP Conformance Testing. In: Maciaszek, L.A., Filipe, J. (eds) Evaluation of Novel Approaches to Software Engineering. ENASE 2012. Communications in Computer and Information Science, vol 410. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-45422-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-45422-6_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-45421-9

  • Online ISBN: 978-3-642-45422-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics