首页 > 最新文献

The 18th IEEE International Symposium on Software Reliability (ISSRE '07)最新文献

英文 中文
Generating Trace-Sets for Model-based Testing 为基于模型的测试生成跟踪集
Pub Date : 2007-11-05 DOI: 10.1109/ISSRE.2007.15
B. Lindström, P. Pettersson, A. Offutt
Model-checkers are powerful tools that can find individual traces through models to satisfy desired properties. These traces provide solutions to a number of problems. Instead of individual traces, software testing needs sets of traces that satisfy coverage criteria. Finding a trace set in a large model is difficult because model checkers generate single traces and use a lot of memory. Space and time requirements of modelchecking algorithms grow exponentially with respect to the number of variables and parallel automata of the model being analyzed. We present a method that generates a set of traces by iteratively invoking a model checker. The method mitigates the memory consumption problem by dynamically building partitions along the traces. This method was applied to a testability case study, and it generated the complete trace set, while ordinary model-checking could only generate 26%.
模型检查器是功能强大的工具,可以通过模型找到单个的跟踪,以满足所需的属性。这些跟踪为许多问题提供了解决方案。软件测试需要满足覆盖标准的跟踪集,而不是单个的跟踪集。在大型模型中查找跟踪集是困难的,因为模型检查器生成单个跟踪并使用大量内存。模型检查算法的空间和时间要求随着被分析模型的变量和并行自动机的数量呈指数增长。我们提出了一种通过迭代调用模型检查器来生成一组跟踪的方法。该方法通过沿着路径动态构建分区来缓解内存消耗问题。将该方法应用于可测试性案例研究,生成了完整的跟踪集,而普通的模型检查只能生成26%的跟踪集。
{"title":"Generating Trace-Sets for Model-based Testing","authors":"B. Lindström, P. Pettersson, A. Offutt","doi":"10.1109/ISSRE.2007.15","DOIUrl":"https://doi.org/10.1109/ISSRE.2007.15","url":null,"abstract":"Model-checkers are powerful tools that can find individual traces through models to satisfy desired properties. These traces provide solutions to a number of problems. Instead of individual traces, software testing needs sets of traces that satisfy coverage criteria. Finding a trace set in a large model is difficult because model checkers generate single traces and use a lot of memory. Space and time requirements of modelchecking algorithms grow exponentially with respect to the number of variables and parallel automata of the model being analyzed. We present a method that generates a set of traces by iteratively invoking a model checker. The method mitigates the memory consumption problem by dynamically building partitions along the traces. This method was applied to a testability case study, and it generated the complete trace set, while ordinary model-checking could only generate 26%.","PeriodicalId":193805,"journal":{"name":"The 18th IEEE International Symposium on Software Reliability (ISSRE '07)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133824252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Prioritization of Regression Tests using Singular Value Decomposition with Empirical Change Records 基于经验变化记录的奇异值分解回归测试的优先排序
Pub Date : 2007-11-05 DOI: 10.1109/ISSRE.2007.25
Mark Sherriff, Mike Lake, L. Williams
During development and testing, changes made to a system to repair a detected fault can often inject a new fault into the code base. These injected faults may not be in the same files that were just changed, since the effects of a change in the code base can have ramifications in other parts of the system. We propose a methodology for determining the effect of a change and then prioritizing regression test cases by gathering software change records and analyzing them through singular value decomposition. This methodology generates clusters of files that historically tend to change together. Combining these clusters with test case information yields a matrix that can be multiplied by a vector representing a new system modification to create a prioritized list of test cases. We performed a post hoc case study using this technique with three minor releases of a software product at IBM. We found that our methodology suggested additional regression tests in 50% of test runs and that the highest-priority suggested test found an additional fault 60% of the time.
在开发和测试期间,为修复检测到的错误而对系统进行的更改通常会将新的错误注入代码库。这些注入的错误可能不在刚刚更改的相同文件中,因为代码库中更改的影响可能会对系统的其他部分产生影响。我们提出了一种方法,用于确定变更的影响,然后通过收集软件变更记录并通过奇异值分解分析它们来确定回归测试用例的优先级。这种方法生成的文件簇在历史上倾向于一起更改。将这些集群与测试用例信息相结合产生一个矩阵,这个矩阵可以乘以一个表示新系统修改的向量,从而创建一个测试用例的优先级列表。我们使用该技术对IBM软件产品的三个次要版本进行了一个事后案例研究。我们发现,我们的方法在50%的测试运行中建议了额外的回归测试,而最高优先级的建议测试在60%的时间里发现了额外的错误。
{"title":"Prioritization of Regression Tests using Singular Value Decomposition with Empirical Change Records","authors":"Mark Sherriff, Mike Lake, L. Williams","doi":"10.1109/ISSRE.2007.25","DOIUrl":"https://doi.org/10.1109/ISSRE.2007.25","url":null,"abstract":"During development and testing, changes made to a system to repair a detected fault can often inject a new fault into the code base. These injected faults may not be in the same files that were just changed, since the effects of a change in the code base can have ramifications in other parts of the system. We propose a methodology for determining the effect of a change and then prioritizing regression test cases by gathering software change records and analyzing them through singular value decomposition. This methodology generates clusters of files that historically tend to change together. Combining these clusters with test case information yields a matrix that can be multiplied by a vector representing a new system modification to create a prioritized list of test cases. We performed a post hoc case study using this technique with three minor releases of a software product at IBM. We found that our methodology suggested additional regression tests in 50% of test runs and that the highest-priority suggested test found an additional fault 60% of the time.","PeriodicalId":193805,"journal":{"name":"The 18th IEEE International Symposium on Software Reliability (ISSRE '07)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126645031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Non-parametric Predictive Inference of Preventive Rejuvenation Schedule in Operational Software Systems 操作性软件系统预防性年轻化计划的非参数预测推理
Pub Date : 2007-11-05 DOI: 10.1109/ISSRE.2007.13
K. Rinsaka, T. Dohi
In this paper we develop a novel approach to estimate the optimal preventive rejuvenation schedule which maximizes the steady-state system availability. In the case with unknown system failure time distribution, the preventive rejuvenation is triggered for the purpose of preventive maintenance of software system. We formulate the upper and lower bounds of the predictive system availability using the one-look ahead predictive survivor function, and derive the pessimistic and optimistic rejuvenation policies. In the real data analysis we focus on a real Web server system and show the usefulness of the non-parametric predictive inference approach proposed in this paper.
本文提出了一种新的方法来估计使稳态系统可用性最大化的最优预防性恢复计划。在系统故障时间分布未知的情况下,触发预防性年轻化,对软件系统进行预防性维护。利用一展望预测存活函数,给出了预测系统可用性的上界和下界,并推导出了悲观和乐观的恢复策略。在实际的数据分析中,我们以一个真实的Web服务器系统为例,展示了本文提出的非参数预测推理方法的有效性。
{"title":"Non-parametric Predictive Inference of Preventive Rejuvenation Schedule in Operational Software Systems","authors":"K. Rinsaka, T. Dohi","doi":"10.1109/ISSRE.2007.13","DOIUrl":"https://doi.org/10.1109/ISSRE.2007.13","url":null,"abstract":"In this paper we develop a novel approach to estimate the optimal preventive rejuvenation schedule which maximizes the steady-state system availability. In the case with unknown system failure time distribution, the preventive rejuvenation is triggered for the purpose of preventive maintenance of software system. We formulate the upper and lower bounds of the predictive system availability using the one-look ahead predictive survivor function, and derive the pessimistic and optimistic rejuvenation policies. In the real data analysis we focus on a real Web server system and show the usefulness of the non-parametric predictive inference approach proposed in this paper.","PeriodicalId":193805,"journal":{"name":"The 18th IEEE International Symposium on Software Reliability (ISSRE '07)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115647442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Using In-Process Testing Metrics to Estimate Post-Release Field Quality 使用过程中测试度量来评估发布后的领域质量
Pub Date : 2007-11-05 DOI: 10.1109/ISSRE.2007.18
Nachiappan Nagappan, L. Williams, M. Vouk, J. Osborne
In industrial practice, information on the software field quality of a product is available too late in the software lifecycle to guide affordable corrective action. An important step towards remediation of this problem lies in the ability to provide an early estimation of post-release field quality. This paper evaluates the Software Testing and Reliability Early Warning for Java (STREW-J) metric suite leveraging the software testing effort to predict post-release field quality early in the software development phases. The metric suite is applicable for software products implemented in Java for which an extensive suite of automated unit test cases are incrementally created as development proceeds. We validated the prediction model using the STREW-J metrics via a two-phase case study approach which involved 27 medium-sized open source projects, and five industrial projects. The error in estimation and the sensitivity of the predictions indicate the STREW-J metric suite can be used effectively to predict post-release software field quality.
在工业实践中,关于产品的软件领域质量的信息在软件生命周期中太迟了,无法指导可负担的纠正措施。修复这个问题的一个重要步骤在于能够提供发布后现场质量的早期估计。本文评估了Java的软件测试和可靠性早期预警(STREW-J)度量套件,利用软件测试工作来预测软件开发阶段早期发布后的领域质量。度量套件适用于在Java中实现的软件产品,随着开发的进行,大量的自动化单元测试用例被逐步创建。我们使用STREW-J指标通过两阶段案例研究方法验证了预测模型,该方法涉及27个中型开源项目和5个工业项目。估计误差和预测灵敏度表明STREW-J度量套件可以有效地用于预测发布后软件领域的质量。
{"title":"Using In-Process Testing Metrics to Estimate Post-Release Field Quality","authors":"Nachiappan Nagappan, L. Williams, M. Vouk, J. Osborne","doi":"10.1109/ISSRE.2007.18","DOIUrl":"https://doi.org/10.1109/ISSRE.2007.18","url":null,"abstract":"In industrial practice, information on the software field quality of a product is available too late in the software lifecycle to guide affordable corrective action. An important step towards remediation of this problem lies in the ability to provide an early estimation of post-release field quality. This paper evaluates the Software Testing and Reliability Early Warning for Java (STREW-J) metric suite leveraging the software testing effort to predict post-release field quality early in the software development phases. The metric suite is applicable for software products implemented in Java for which an extensive suite of automated unit test cases are incrementally created as development proceeds. We validated the prediction model using the STREW-J metrics via a two-phase case study approach which involved 27 medium-sized open source projects, and five industrial projects. The error in estimation and the sensitivity of the predictions indicate the STREW-J metric suite can be used effectively to predict post-release software field quality.","PeriodicalId":193805,"journal":{"name":"The 18th IEEE International Symposium on Software Reliability (ISSRE '07)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123759832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Automated Oracle Comparators for TestingWeb Applications 用于测试web应用程序的自动化Oracle比较器
Pub Date : 2007-11-05 DOI: 10.1109/ISSRE.2007.26
Sara Sprenkle, L. Pollock, H. Esquivel, Barbara Hazelwood, Stacey Ecott
Software developers need automated techniques to maintain the correctness of complex, evolving Web applications. While there has been success in automating some of the testing process for this domain, there exists little automated support for verifying that the executed test cases produce expected results. We assist in this tedious task by presenting a suite of automated oracle comparators for testing Web applications. To effectively identify failures, each comparator is specialized to particular characteristics of the possibly nondeterministic Web applications' output in the form of HTML responses. We also describe combinations of comparators designed to achieve both high precision and recall in failure detection and a tool for helping testers to analyze the output of multiple oracles in detail. We present results from an evaluation of the effectiveness and costs of the oracle comparators. We also provide recommendations to testers on applying effective oracle comparators based on their application's characteristics.
软件开发人员需要自动化技术来维护复杂的、不断发展的Web应用程序的正确性。虽然在这个领域的自动化测试过程中已经取得了一些成功,但是对于验证执行的测试用例是否产生预期的结果,仍然存在很少的自动化支持。我们通过提供一套用于测试Web应用程序的自动化oracle比较器来帮助完成这项繁琐的任务。为了有效地识别故障,每个比较器都专门针对可能不确定的Web应用程序以HTML响应的形式输出的特定特征。我们还描述了在故障检测中实现高精度和召回的比较器的组合,以及帮助测试人员详细分析多个oracle输出的工具。我们给出了对oracle比较器的有效性和成本的评估结果。我们还根据应用程序的特点,为测试人员提供了应用有效的oracle比较器的建议。
{"title":"Automated Oracle Comparators for TestingWeb Applications","authors":"Sara Sprenkle, L. Pollock, H. Esquivel, Barbara Hazelwood, Stacey Ecott","doi":"10.1109/ISSRE.2007.26","DOIUrl":"https://doi.org/10.1109/ISSRE.2007.26","url":null,"abstract":"Software developers need automated techniques to maintain the correctness of complex, evolving Web applications. While there has been success in automating some of the testing process for this domain, there exists little automated support for verifying that the executed test cases produce expected results. We assist in this tedious task by presenting a suite of automated oracle comparators for testing Web applications. To effectively identify failures, each comparator is specialized to particular characteristics of the possibly nondeterministic Web applications' output in the form of HTML responses. We also describe combinations of comparators designed to achieve both high precision and recall in failure detection and a tool for helping testers to analyze the output of multiple oracles in detail. We present results from an evaluation of the effectiveness and costs of the oracle comparators. We also provide recommendations to testers on applying effective oracle comparators based on their application's characteristics.","PeriodicalId":193805,"journal":{"name":"The 18th IEEE International Symposium on Software Reliability (ISSRE '07)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127376091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Coordinated Atomic Actions for Dependable Distributed Systems: the Current State in Concepts, Semantics and Verification Means 可靠分布式系统的协调原子动作:概念、语义和验证方法的现状
Pub Date : 2007-11-05 DOI: 10.1109/ISSRE.2007.10
B. Gallina, N. Guelfi, A. Romanovsky
Coordinated Atomic Actions (CAAs) have been introduced about ten years ago as a conceptual framework for developing fault-tolerant concurrent systems. All the work done since then extended the CAA framework with the capabilities to model, verify, and implement concurrent distributed systems following pre-defined development methodologies. As a result, CAAs, compared to other approaches available, offer a rich set of means for engineering dependable systems. Nevertheless, it is sometimes difficult to have a global and analytical view of all the features available as this concept provides a number of features which need to be applied in combination. The main contribution of this paper is in presenting a complete state-of-the-art overview of the work done around CAAs from the three perspectives: the definitions of the fundamental concepts, their various semantics and the means supporting formal verification. This paper is useful for the potential CAAs users in helping them to avoid misinterpretation when employing all the available features. Finally, our paper should contribute in better understanding of the likely directions in which the CAA framework may evolve in the near future.
协调原子动作(CAAs)作为开发容错并发系统的概念框架在大约十年前被引入。从那时起完成的所有工作都扩展了CAA框架,使其具备建模、验证和实现遵循预定义开发方法的并发分布式系统的能力。因此,与其他可用的方法相比,CAAs为设计可靠的系统提供了一套丰富的方法。然而,有时很难对所有可用的特性有一个全局和分析性的看法,因为这个概念提供了许多需要组合应用的特性。本文的主要贡献是从三个角度对围绕CAAs所做的工作进行了全面的概述:基本概念的定义,它们的各种语义和支持形式化验证的方法。本文对潜在的CAAs用户很有用,可以帮助他们在使用所有可用特性时避免误解。最后,我们的论文应该有助于更好地理解CAA框架在不久的将来可能发展的方向。
{"title":"Coordinated Atomic Actions for Dependable Distributed Systems: the Current State in Concepts, Semantics and Verification Means","authors":"B. Gallina, N. Guelfi, A. Romanovsky","doi":"10.1109/ISSRE.2007.10","DOIUrl":"https://doi.org/10.1109/ISSRE.2007.10","url":null,"abstract":"Coordinated Atomic Actions (CAAs) have been introduced about ten years ago as a conceptual framework for developing fault-tolerant concurrent systems. All the work done since then extended the CAA framework with the capabilities to model, verify, and implement concurrent distributed systems following pre-defined development methodologies. As a result, CAAs, compared to other approaches available, offer a rich set of means for engineering dependable systems. Nevertheless, it is sometimes difficult to have a global and analytical view of all the features available as this concept provides a number of features which need to be applied in combination. The main contribution of this paper is in presenting a complete state-of-the-art overview of the work done around CAAs from the three perspectives: the definitions of the fundamental concepts, their various semantics and the means supporting formal verification. This paper is useful for the potential CAAs users in helping them to avoid misinterpretation when employing all the available features. Finally, our paper should contribute in better understanding of the likely directions in which the CAA framework may evolve in the near future.","PeriodicalId":193805,"journal":{"name":"The 18th IEEE International Symposium on Software Reliability (ISSRE '07)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124223075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Requirement Error Abstraction and Classification: A Control Group Replicated Study 需求错误的提取与分类:一项对照组重复研究
Pub Date : 2007-11-05 DOI: 10.1109/ISSRE.2007.14
G. Walia, Jeffrey C. Carver, T. Philip
This paper is the second in a series of empirical studies about requirement error abstraction and classification as a quality improvement approach. The Requirement error abstraction and classification method supports the developers' effort in efficiently identifying the root cause of requirements faults. By uncovering the source of faults, the developers can locate and remove additional related faults that may have been overlooked, thereby improving the quality and reliability of the resulting system. This study is a replication of an earlier study that adds a control group to address a major validity threat. The approach studied includes a process for abstracting errors from faults and provides a requirement error taxonomy for organizing those errors. A unique aspect of this work is the use of research from human cognition to improve the process. The results of the replication are presented and compared with the results from the original study. Overall, the results from this study indicate that the error abstraction and classification approach improves the effectiveness and efficiency of inspectors. The requirement error taxonomy is viewed favorably and provides useful insights into the source of faults. In addition, human cognition research is shown to be an important factor that affects the performance of the inspectors. This study also provides additional evidence to motivate further research.
本文是将需求错误抽象和分类作为质量改进方法的一系列实证研究中的第二篇。需求错误抽象和分类方法支持开发人员有效地识别需求错误的根本原因。通过发现故障的来源,开发人员可以定位并移除可能被忽略的额外相关故障,从而提高最终系统的质量和可靠性。这项研究是早期研究的复制,该研究增加了一个对照组来解决主要的有效性威胁。所研究的方法包括一个从错误中抽象错误的过程,并提供了一个用于组织这些错误的需求错误分类。这项工作的一个独特方面是利用人类认知的研究来改进这一过程。给出了复制的结果,并与原始研究的结果进行了比较。总体而言,本研究的结果表明,错误抽象和分类方法提高了检查员的有效性和效率。需求错误分类法被认为是有利的,并提供了对错误来源的有用见解。此外,人的认知研究被证明是影响检查员绩效的重要因素。本研究也为进一步的研究提供了额外的证据。
{"title":"Requirement Error Abstraction and Classification: A Control Group Replicated Study","authors":"G. Walia, Jeffrey C. Carver, T. Philip","doi":"10.1109/ISSRE.2007.14","DOIUrl":"https://doi.org/10.1109/ISSRE.2007.14","url":null,"abstract":"This paper is the second in a series of empirical studies about requirement error abstraction and classification as a quality improvement approach. The Requirement error abstraction and classification method supports the developers' effort in efficiently identifying the root cause of requirements faults. By uncovering the source of faults, the developers can locate and remove additional related faults that may have been overlooked, thereby improving the quality and reliability of the resulting system. This study is a replication of an earlier study that adds a control group to address a major validity threat. The approach studied includes a process for abstracting errors from faults and provides a requirement error taxonomy for organizing those errors. A unique aspect of this work is the use of research from human cognition to improve the process. The results of the replication are presented and compared with the results from the original study. Overall, the results from this study indicate that the error abstraction and classification approach improves the effectiveness and efficiency of inspectors. The requirement error taxonomy is viewed favorably and provides useful insights into the source of faults. In addition, human cognition research is shown to be an important factor that affects the performance of the inspectors. This study also provides additional evidence to motivate further research.","PeriodicalId":193805,"journal":{"name":"The 18th IEEE International Symposium on Software Reliability (ISSRE '07)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123541785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Comparison between Internal and External Malicious Traffic 内部和外部恶意流量的比较
Pub Date : 2007-11-05 DOI: 10.1109/ISSRE.2007.32
M. Cukier, S. Panjwani
This paper empirically compares malicious traffic originating inside an organization (i.e., internal traffic) with malicious traffic originating outside an organization (i.e., external traffic). Two honeypot target computers were deployed to collect malicious traffic data over a period of fifteen weeks. In the first study we showed that there was a weak correlation between internal and external traffic based on the number of malicious connections. Since the type of malicious activity is linked to the port that was targeted, we focused on the most frequently targeted ports. We observed that internal malicious traffic often contained different malicious content compared to that of external traffic. In the third study, we discovered that the volume of malicious traffic was linked to the day of the week. We showed that internal and external malicious activities differ: where the external malicious activity is quite stable over the week, the internal traffic varied as a function of the users' activity profile.
本文对来自组织内部的恶意流量(即内部流量)和来自组织外部的恶意流量(即外部流量)进行了实证比较。在15周的时间里,部署了两台蜜罐目标计算机来收集恶意流量数据。在第一项研究中,我们发现基于恶意连接的数量,内部和外部流量之间存在弱相关性。由于恶意活动的类型与目标端口相关联,因此我们将重点放在最常见的目标端口上。我们观察到,内部恶意流量通常包含与外部流量不同的恶意内容。在第三项研究中,我们发现恶意流量的数量与一周中的某一天有关。我们展示了内部和外部恶意活动的不同:外部恶意活动在一周内相当稳定,内部流量随着用户活动概况的变化而变化。
{"title":"A Comparison between Internal and External Malicious Traffic","authors":"M. Cukier, S. Panjwani","doi":"10.1109/ISSRE.2007.32","DOIUrl":"https://doi.org/10.1109/ISSRE.2007.32","url":null,"abstract":"This paper empirically compares malicious traffic originating inside an organization (i.e., internal traffic) with malicious traffic originating outside an organization (i.e., external traffic). Two honeypot target computers were deployed to collect malicious traffic data over a period of fifteen weeks. In the first study we showed that there was a weak correlation between internal and external traffic based on the number of malicious connections. Since the type of malicious activity is linked to the port that was targeted, we focused on the most frequently targeted ports. We observed that internal malicious traffic often contained different malicious content compared to that of external traffic. In the third study, we discovered that the volume of malicious traffic was linked to the day of the week. We showed that internal and external malicious activities differ: where the external malicious activity is quite stable over the week, the internal traffic varied as a function of the users' activity profile.","PeriodicalId":193805,"journal":{"name":"The 18th IEEE International Symposium on Software Reliability (ISSRE '07)","volume":"14 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131879967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Measuring Software Reliability in Practice: An Industry Case Study 在实践中测量软件可靠性:一个行业案例研究
Pub Date : 2007-11-05 DOI: 10.1109/ISSRE.2007.33
S. Benlarbi, David Stortz
Software reliability modeling techniques have been touted as way of measuring and tracking software systems reliability. However a number of issues make it difficult to use and apply these models in practice. In this paper we show some of the challenges and issues that we have encountered in applying these techniques to track and predict a networking software system reliability behavior at two different stages of its life cycle. Through our case study we show some of the practical solutions we have adopted to overcome these challenges. We also try to establish a relationship between the software testing phase based reliability prediction and field software reliability measurement in order to derive a systematic tracking approach.
软件可靠性建模技术被吹捧为测量和跟踪软件系统可靠性的一种方法。然而,许多问题使得这些模型在实践中难以使用和应用。在本文中,我们展示了我们在应用这些技术来跟踪和预测网络软件系统在其生命周期的两个不同阶段的可靠性行为时遇到的一些挑战和问题。通过我们的案例研究,我们展示了我们为克服这些挑战而采用的一些实际解决方案。我们还试图建立基于软件测试阶段的可靠性预测与现场软件可靠性测量之间的关系,从而得出一种系统的跟踪方法。
{"title":"Measuring Software Reliability in Practice: An Industry Case Study","authors":"S. Benlarbi, David Stortz","doi":"10.1109/ISSRE.2007.33","DOIUrl":"https://doi.org/10.1109/ISSRE.2007.33","url":null,"abstract":"Software reliability modeling techniques have been touted as way of measuring and tracking software systems reliability. However a number of issues make it difficult to use and apply these models in practice. In this paper we show some of the challenges and issues that we have encountered in applying these techniques to track and predict a networking software system reliability behavior at two different stages of its life cycle. Through our case study we show some of the practical solutions we have adopted to overcome these challenges. We also try to establish a relationship between the software testing phase based reliability prediction and field software reliability measurement in order to derive a systematic tracking approach.","PeriodicalId":193805,"journal":{"name":"The 18th IEEE International Symposium on Software Reliability (ISSRE '07)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120991389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Applying Software Reliability Models on Security Incidents 软件可靠性模型在安全事件中的应用
Pub Date : 2007-11-05 DOI: 10.1109/ISSRE.2007.29
Edward M. Condon, M. Cukier, T. He
Computer and network security incidents have increasing financial consequences as demand for network accessibility and connectivity to resources continues to rise. These security incidents can lead to direct financial losses either through data theft of personal and/or proprietary information as well as a reputational damage which may negatively impact stock prices or consumer confidence in a company. This paper examines a large set of security incident data using tools from the software reliability community. We look at applying Non-Homogenous Poisson Process (NHPP) models as a method for describing the reliability growth process. We examine the full set of incidents as well as subsets of the data based on incident types. We look at using the Laplace test to guide selection of the appropriate models. Then, based on the trend results, we apply various NHPP models (i.e., Goel-Okumutu, S-Shaped, Duane, and K-Stage Curve) to illustrate the relevance of using these models to fit the incident data and to predict future incidents.
随着对网络可访问性和资源连接性的需求不断上升,计算机和网络安全事件造成的经济后果越来越严重。这些安全事件可能通过个人和/或专有信息的数据盗窃导致直接的经济损失,以及可能对股票价格或消费者对公司信心产生负面影响的声誉损害。本文使用来自软件可靠性社区的工具检查了大量的安全事件数据。我们着眼于应用非齐次泊松过程(NHPP)模型作为描述可靠性增长过程的方法。我们根据事件类型检查完整的事件集以及数据子集。我们着眼于使用拉普拉斯检验来指导选择合适的模型。然后,基于趋势结果,我们应用了各种NHPP模型(即Goel-Okumutu, s形,Duane和k阶段曲线)来说明使用这些模型拟合事件数据和预测未来事件的相关性。
{"title":"Applying Software Reliability Models on Security Incidents","authors":"Edward M. Condon, M. Cukier, T. He","doi":"10.1109/ISSRE.2007.29","DOIUrl":"https://doi.org/10.1109/ISSRE.2007.29","url":null,"abstract":"Computer and network security incidents have increasing financial consequences as demand for network accessibility and connectivity to resources continues to rise. These security incidents can lead to direct financial losses either through data theft of personal and/or proprietary information as well as a reputational damage which may negatively impact stock prices or consumer confidence in a company. This paper examines a large set of security incident data using tools from the software reliability community. We look at applying Non-Homogenous Poisson Process (NHPP) models as a method for describing the reliability growth process. We examine the full set of incidents as well as subsets of the data based on incident types. We look at using the Laplace test to guide selection of the appropriate models. Then, based on the trend results, we apply various NHPP models (i.e., Goel-Okumutu, S-Shaped, Duane, and K-Stage Curve) to illustrate the relevance of using these models to fit the incident data and to predict future incidents.","PeriodicalId":193805,"journal":{"name":"The 18th IEEE International Symposium on Software Reliability (ISSRE '07)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116868717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
期刊
The 18th IEEE International Symposium on Software Reliability (ISSRE '07)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1