首页 > 最新文献

2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)最新文献

英文 中文
KS-TCP: An Efficient Test Case Prioritization Approach based on K-medoids and Similarity KS-TCP:一种基于k -介质和相似性的高效测试用例优先排序方法
Pub Date : 2021-10-01 DOI: 10.1109/ISSREW53611.2021.00051
Jinfu Chen, Yuechao Gu, Saihua Cai, Haibo Chen, Jingyi Chen
Test case prioritization (TCP) tries to find an optimal execution sequence by adjusting test cases that need to be executed. Traditional techniques rely on code coverage information to achieve effective results, but they need access to historical execution information. The string distance-based test case prioritization (SD-TCP) can avoid these limitations through only using the test cases themselves for sorting, but it is sensitive to extreme test cases and inefficient. To overcome these problems, we propose a test case prioritization method based on K-medoids and Similarity (KS-TCP). The proposed KS-TCP approach considers sorting a set of test cases rather than individual test case to effectively avoid the effect of extreme test cases, it uses cluster analysis and greedy strategy to divide the subsets and compose the final execution sequence by polling. Extensive experimental results show that the proposed KS-TCP approach has a higher APFD value compared to Random Prioritization (RP) and SD-TCP, and it also outperforms SD-TCP in terms of better time efficiency on test case prioritization.
测试用例优先级(TCP)试图通过调整需要执行的测试用例来找到最佳的执行顺序。传统技术依赖于代码覆盖信息来获得有效的结果,但是它们需要访问历史执行信息。基于字符串距离的测试用例优先级(SD-TCP)可以通过仅使用测试用例本身进行排序来避免这些限制,但它对极端测试用例很敏感并且效率低下。为了克服这些问题,我们提出了一种基于k -介质和相似性的测试用例优先级方法(KS-TCP)。提出的KS-TCP方法考虑对一组测试用例进行排序,而不是对单个测试用例进行排序,以有效避免极端测试用例的影响,采用聚类分析和贪婪策略对子集进行划分,并通过轮询组成最终的执行序列。大量的实验结果表明,所提出的KS-TCP方法与随机优先化(RP)和SD-TCP相比具有更高的APFD值,并且在测试用例优先级的时间效率方面也优于SD-TCP。
{"title":"KS-TCP: An Efficient Test Case Prioritization Approach based on K-medoids and Similarity","authors":"Jinfu Chen, Yuechao Gu, Saihua Cai, Haibo Chen, Jingyi Chen","doi":"10.1109/ISSREW53611.2021.00051","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00051","url":null,"abstract":"Test case prioritization (TCP) tries to find an optimal execution sequence by adjusting test cases that need to be executed. Traditional techniques rely on code coverage information to achieve effective results, but they need access to historical execution information. The string distance-based test case prioritization (SD-TCP) can avoid these limitations through only using the test cases themselves for sorting, but it is sensitive to extreme test cases and inefficient. To overcome these problems, we propose a test case prioritization method based on K-medoids and Similarity (KS-TCP). The proposed KS-TCP approach considers sorting a set of test cases rather than individual test case to effectively avoid the effect of extreme test cases, it uses cluster analysis and greedy strategy to divide the subsets and compose the final execution sequence by polling. Extensive experimental results show that the proposed KS-TCP approach has a higher APFD value compared to Random Prioritization (RP) and SD-TCP, and it also outperforms SD-TCP in terms of better time efficiency on test case prioritization.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132223215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of Testable and Valuable User Stories by using Supervised Machine Learning Classifiers 使用监督机器学习分类器对可测试和有价值的用户故事进行分类
Pub Date : 2021-10-01 DOI: 10.1109/ISSREW53611.2021.00111
Isha Subedi, Maninder Singh, Vijayalakshmi Ramasamy, G. Walia
Agile is one of the most widely used software development methodologies that include user stories, the smallest units semi-structured specifications to capture the requirements from a user's point of view. Despite being popular, only a little research has been done to automate the quality checking/analysis of a user story before assigning it to a sprint. In this study, we have chosen two metrics, i.e., Testable and Valuable criteria from INVEST checklist, and have applied supervised machine learning classifiers to automatically classify them. Since the industrial data collected for the research was unbalanced, we also applied data balancing techniques such as SMOTE, RUS, ROS, and Back translation (BT) to verify if they improved any classification metrics. Although we did not see any significant improvements in accuracy and precision for the classifiers after applying data balancing techniques, we noticed a significant improvement in recall values across all the classifiers. Our research provides some promising insights into how this research could be used in the software industry to automate the analysis of user stories and improve the quality of software produced.
敏捷是最广泛使用的软件开发方法之一,它包括用户故事,从用户的角度捕获需求的最小单元半结构化规范。尽管很流行,但在将用户故事分配到sprint之前,对其进行自动化质量检查/分析的研究很少。在本研究中,我们从INVEST检查表中选择了两个指标,即可测试和有价值的标准,并应用监督机器学习分类器对它们进行自动分类。由于为研究收集的工业数据是不平衡的,我们还应用了数据平衡技术,如SMOTE、RUS、ROS和Back translation (BT),以验证它们是否改进了任何分类指标。虽然在应用数据平衡技术后,我们没有看到分类器的准确度和精度有任何显著的提高,但我们注意到所有分类器的召回值都有显著的提高。我们的研究提供了一些有希望的见解,说明如何在软件行业中使用该研究来自动分析用户故事并提高所生成软件的质量。
{"title":"Classification of Testable and Valuable User Stories by using Supervised Machine Learning Classifiers","authors":"Isha Subedi, Maninder Singh, Vijayalakshmi Ramasamy, G. Walia","doi":"10.1109/ISSREW53611.2021.00111","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00111","url":null,"abstract":"Agile is one of the most widely used software development methodologies that include user stories, the smallest units semi-structured specifications to capture the requirements from a user's point of view. Despite being popular, only a little research has been done to automate the quality checking/analysis of a user story before assigning it to a sprint. In this study, we have chosen two metrics, i.e., Testable and Valuable criteria from INVEST checklist, and have applied supervised machine learning classifiers to automatically classify them. Since the industrial data collected for the research was unbalanced, we also applied data balancing techniques such as SMOTE, RUS, ROS, and Back translation (BT) to verify if they improved any classification metrics. Although we did not see any significant improvements in accuracy and precision for the classifiers after applying data balancing techniques, we noticed a significant improvement in recall values across all the classifiers. Our research provides some promising insights into how this research could be used in the software industry to automate the analysis of user stories and improve the quality of software produced.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124020717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Message from the WoSoCer 2021 Workshop Chairs 2021年世界足球锦标赛工作坊主席致辞
Pub Date : 2021-10-01 DOI: 10.1109/issrew53611.2021.00015
{"title":"Message from the WoSoCer 2021 Workshop Chairs","authors":"","doi":"10.1109/issrew53611.2021.00015","DOIUrl":"https://doi.org/10.1109/issrew53611.2021.00015","url":null,"abstract":"","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129077124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical Scheduling for Real-Time Containers in Mixed-Criticality Systems 混合临界系统中实时容器的分层调度
Pub Date : 2021-10-01 DOI: 10.1109/ISSREW53611.2021.00082
Marco Barletta, M. Cinque, Raffaele Della Corte
Real-time containers are a promising solution to implement mixed-criticality systems. In this paper we propose a novel solution to implement real-time containers in Linux environments with real-time co-kernels and hierarchical scheduling. Preliminary experimental results are presented, confirming that the solution is able to keep the worst-case latency of a task running within a real-time container within acceptable limits, despite the presence of non-real time load on the same machine.
实时容器是实现混合临界系统的一个很有前途的解决方案。本文提出了一种在Linux环境下利用实时协同内核和分层调度实现实时容器的新方案。初步的实验结果表明,尽管在同一台机器上存在非实时负载,但该解决方案能够将在实时容器中运行的任务的最坏情况延迟保持在可接受的范围内。
{"title":"Hierarchical Scheduling for Real-Time Containers in Mixed-Criticality Systems","authors":"Marco Barletta, M. Cinque, Raffaele Della Corte","doi":"10.1109/ISSREW53611.2021.00082","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00082","url":null,"abstract":"Real-time containers are a promising solution to implement mixed-criticality systems. In this paper we propose a novel solution to implement real-time containers in Linux environments with real-time co-kernels and hierarchical scheduling. Preliminary experimental results are presented, confirming that the solution is able to keep the worst-case latency of a task running within a real-time container within acceptable limits, despite the presence of non-real time load on the same machine.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129206952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Static Analysis Framework for Detecting Bugs in Introductory Programs 在介绍性程序中检测bug的静态分析框架
Pub Date : 2021-10-01 DOI: 10.1109/ISSREW53611.2021.00078
Wenchu Xu, Yanran Ma
Introductory programming courses are crucial to students who begin to learn programming languages. However, current introductory program judgment systems only give a pass or fail by the percentage of passed test cases. This limitation hinders the learning progress because students may unaware of potential bugs hidden in their programs. Detecting and reporting these bugs can help them avoid introducing the same kinds of bugs in other programs. However, state-of-the-art bug detection methods focus on precision and scalability, but are usually costly to develop detection methods for various kinds of bugs. To simplify the development of bug detection while keeping a reasonable precision, this paper presents a static detection framework to detect software bugs. Then, we apply the method to introductory programs and successfully detect all bugs with a false positive rate of 28.57 %.
编程入门课程对于开始学习编程语言的学生来说是至关重要的。然而,当前的介绍性程序判断系统仅根据通过测试用例的百分比给出合格或不合格。这种限制阻碍了学习进度,因为学生可能没有意识到程序中隐藏的潜在错误。检测和报告这些错误可以帮助他们避免在其他程序中引入相同类型的错误。然而,最先进的错误检测方法侧重于精度和可伸缩性,但通常开发用于各种错误的检测方法的成本很高。为了简化bug检测的开发,同时保持合理的精度,本文提出了一种静态的软件bug检测框架。然后,我们将该方法应用于介绍性程序,并成功检测出所有错误,假阳性率为28.57%。
{"title":"A Static Analysis Framework for Detecting Bugs in Introductory Programs","authors":"Wenchu Xu, Yanran Ma","doi":"10.1109/ISSREW53611.2021.00078","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00078","url":null,"abstract":"Introductory programming courses are crucial to students who begin to learn programming languages. However, current introductory program judgment systems only give a pass or fail by the percentage of passed test cases. This limitation hinders the learning progress because students may unaware of potential bugs hidden in their programs. Detecting and reporting these bugs can help them avoid introducing the same kinds of bugs in other programs. However, state-of-the-art bug detection methods focus on precision and scalability, but are usually costly to develop detection methods for various kinds of bugs. To simplify the development of bug detection while keeping a reasonable precision, this paper presents a static detection framework to detect software bugs. Then, we apply the method to introductory programs and successfully detect all bugs with a false positive rate of 28.57 %.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128494664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Input/Output Check Bugs Taxonomy: Injection Errors in Spotlight 输入/输出检查错误分类:聚光灯下的注入错误
Pub Date : 2021-10-01 DOI: 10.1109/ISSREW53611.2021.00052
Irena Bojanova, C. E. Galhardo, Sara Moshtari
In this work, we present an orthogonal classification of input/output check bugs, allowing precise structured descriptions of related software vulnerabilities. We utilize the Bugs Framework (BF) approach to define two language-independent classes that cover all possible kinds of data check bugs. We also identify all types of injection errors, as they are always directly caused by input/output data validation bugs. In BF each class is a taxonomic category of a weakness type defined by sets of operations, cause→consequence relations, and attributes. A BF description of a bug or a weakness is an instance of a taxonomic BF class with one operation, one cause, one consequence, and their attributes. Any vulnerability then can be described as a chain of such instances and their consequence-cause transitions. With our newly developed Data Validation Bugs and Data Verification Bugs classes, we confirm that BF is a classification system that extends the Common Weakness Enumeration (CWE). It allows clear communication about software bugs and weaknesses, providing a structured way to precisely describe real-world vulnerabilities.
在这项工作中,我们提出了输入/输出检查错误的正交分类,允许对相关软件漏洞进行精确的结构化描述。我们利用bug框架(Bugs Framework, BF)方法定义了两个独立于语言的类,它们涵盖了所有可能的数据检查bug。我们还识别所有类型的注入错误,因为它们总是由输入/输出数据验证错误直接引起的。在BF中,每个类都是一个弱点类型的分类范畴,由一组操作、因果关系和属性定义。错误或弱点的BF描述是一个分类BF类的实例,它具有一个操作、一个原因、一个结果及其属性。然后,任何漏洞都可以被描述为这样的实例链及其因果转换。通过我们新开发的数据验证错误和数据验证错误类,我们确认BF是一个扩展了共同弱点枚举(CWE)的分类系统。它允许对软件缺陷和弱点进行清晰的沟通,提供了一种结构化的方法来精确描述现实世界的漏洞。
{"title":"Input/Output Check Bugs Taxonomy: Injection Errors in Spotlight","authors":"Irena Bojanova, C. E. Galhardo, Sara Moshtari","doi":"10.1109/ISSREW53611.2021.00052","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00052","url":null,"abstract":"In this work, we present an orthogonal classification of input/output check bugs, allowing precise structured descriptions of related software vulnerabilities. We utilize the Bugs Framework (BF) approach to define two language-independent classes that cover all possible kinds of data check bugs. We also identify all types of injection errors, as they are always directly caused by input/output data validation bugs. In BF each class is a taxonomic category of a weakness type defined by sets of operations, cause→consequence relations, and attributes. A BF description of a bug or a weakness is an instance of a taxonomic BF class with one operation, one cause, one consequence, and their attributes. Any vulnerability then can be described as a chain of such instances and their consequence-cause transitions. With our newly developed Data Validation Bugs and Data Verification Bugs classes, we confirm that BF is a classification system that extends the Common Weakness Enumeration (CWE). It allows clear communication about software bugs and weaknesses, providing a structured way to precisely describe real-world vulnerabilities.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117286941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Evolution of the IEEE P7009 Standard: Towards Fail-Safe Design of Autonomous Systems IEEE P7009标准的演进:迈向自动系统的故障安全设计
Pub Date : 2021-10-01 DOI: 10.1109/ISSREW53611.2021.00109
M. Farrell, Matt Luckcuck, Laura Pullum, M. Fisher, A. Hessami, Danit Gal, Zvikomborero Murahwi, Ken Wallace
Autonomous systems are complex, diverse, and likely be used in environments that change unpredictably. We must develop mechanisms to cope with failures, potentially caused by both the natural stresses of the operating environment and the system's inadequate environmental models. Failures also arise from system component wear. In 2016, the IEEE launched the Global Initiative on Ethics of Autonomous and Intelligent Systems in response to the proliferation of increasingly-autonomous systems. A cornerstone of this initiative is the IEEE P7000 series of projects, which set the standards for the future of ethical intelligent and autonomous technologies. This paper describes the ongoing development of the IEEE P7009 standard on “Fail-Safe Design of Autonomous and Semi-Autonomous Systems”. We provide a collective perspective on the ongoing development of IEEE P7009, and outline the objectives, current approaches, issues under discussion, and two exemplar use cases from different sectors: one high-regulation, the other low-regulation.
自治系统是复杂的、多样的,并且可能在变化不可预测的环境中使用。我们必须建立机制来应对故障,这些故障可能是由操作环境的自然压力和系统不适当的环境模型造成的。故障也可由系统部件磨损引起。2016年,IEEE发起了自主和智能系统伦理全球倡议,以应对日益自治的系统的扩散。这一倡议的基石是IEEE P7000系列项目,它为未来的道德智能和自主技术设定了标准。本文描述了IEEE P7009“自主和半自主系统的故障安全设计”标准的持续发展。我们提供了关于IEEE P7009正在进行的开发的集体观点,并概述了目标、当前方法、讨论中的问题,以及来自不同部门的两个示例用例:一个是高监管,另一个是低监管。
{"title":"Evolution of the IEEE P7009 Standard: Towards Fail-Safe Design of Autonomous Systems","authors":"M. Farrell, Matt Luckcuck, Laura Pullum, M. Fisher, A. Hessami, Danit Gal, Zvikomborero Murahwi, Ken Wallace","doi":"10.1109/ISSREW53611.2021.00109","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00109","url":null,"abstract":"Autonomous systems are complex, diverse, and likely be used in environments that change unpredictably. We must develop mechanisms to cope with failures, potentially caused by both the natural stresses of the operating environment and the system's inadequate environmental models. Failures also arise from system component wear. In 2016, the IEEE launched the Global Initiative on Ethics of Autonomous and Intelligent Systems in response to the proliferation of increasingly-autonomous systems. A cornerstone of this initiative is the IEEE P7000 series of projects, which set the standards for the future of ethical intelligent and autonomous technologies. This paper describes the ongoing development of the IEEE P7009 standard on “Fail-Safe Design of Autonomous and Semi-Autonomous Systems”. We provide a collective perspective on the ongoing development of IEEE P7009, and outline the objectives, current approaches, issues under discussion, and two exemplar use cases from different sectors: one high-regulation, the other low-regulation.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114513188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Detection of IoT Devices That Mine Cryptocurrency 检测挖掘加密货币的物联网设备
Pub Date : 2021-10-01 DOI: 10.1109/ISSREW53611.2021.00074
Wei Zheng, Liangbo Hou, Junming Yu, Fei Chen
The continuous expansion of the Internet of Things(IoT) market has brought serious security problems. As cryptocurrency attracts more and more people's attention, the price of cryptocurrency has reached unprecedented heights, and now IoT devices are likely to become the target of cybercriminals for stealing computing resources to mine cryptocurrency. This paper proposes a method based on machine learning to detect the existence of malicious miners using IoT devices in a local area network. Compared with previous methods that leverage static signatures or dynamic analysis, this method has low overhead, is easy to maintain, and independent of specific IoT devices and manufacturers. We collected normal traffic from 4 different IoT devices and the traffic of an IoT device that mines the Monero cryptocurrency. Based on the collected data set, 5 machine learning models have been trained to classify normal traffic and mining traffic. Experimental results show that the proposed method effectively detects IoT device mining traffics.
物联网(IoT)市场的不断扩大带来了严重的安全问题。随着加密货币越来越受到人们的关注,加密货币的价格达到了前所未有的高度,现在物联网设备很可能成为网络犯罪分子窃取计算资源进行加密货币开采的目标。本文提出了一种基于机器学习的方法,利用局域网中的物联网设备检测恶意矿工的存在。与以往利用静态签名或动态分析的方法相比,该方法开销低,易于维护,并且不受特定物联网设备和制造商的影响。我们从4个不同的物联网设备和挖掘门罗加密货币的物联网设备收集了正常流量。基于收集到的数据集,训练了5个机器学习模型对正常流量和挖掘流量进行分类。实验结果表明,该方法能有效检测物联网设备挖掘流量。
{"title":"Detection of IoT Devices That Mine Cryptocurrency","authors":"Wei Zheng, Liangbo Hou, Junming Yu, Fei Chen","doi":"10.1109/ISSREW53611.2021.00074","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00074","url":null,"abstract":"The continuous expansion of the Internet of Things(IoT) market has brought serious security problems. As cryptocurrency attracts more and more people's attention, the price of cryptocurrency has reached unprecedented heights, and now IoT devices are likely to become the target of cybercriminals for stealing computing resources to mine cryptocurrency. This paper proposes a method based on machine learning to detect the existence of malicious miners using IoT devices in a local area network. Compared with previous methods that leverage static signatures or dynamic analysis, this method has low overhead, is easy to maintain, and independent of specific IoT devices and manufacturers. We collected normal traffic from 4 different IoT devices and the traffic of an IoT device that mines the Monero cryptocurrency. Based on the collected data set, 5 machine learning models have been trained to classify normal traffic and mining traffic. Experimental results show that the proposed method effectively detects IoT device mining traffics.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126527836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ColocationSim: Simulate Colocation Datacenter with Microservices and Performance Interference ColocationSim:模拟带有微服务和性能干扰的托管数据中心
Pub Date : 2021-10-01 DOI: 10.1109/ISSREW53611.2021.00087
Kangjin Wang, Ying Li
Colocating Latency-Critical (LC) jobs and Best-Effort (BE) jobs on one host is the best practice to improve datacenter resource efficiency and the Colocated Job Scheduling algorithms play a key role in this scenario. But validating a new Colocated Job Scheduling algorithm at scale is usually resource-, energy- and time-consuming in the real-datacenter, therefore simulation is the first choice. Unfortunately, existing simulators are not suitable for colocation simulation because: 1) they cannot simulate microservices, which is widely adopted in LC/BE jobs; 2) they cannot simulate performance interference of colocated jobs. In this paper, we present a new simulator, ColocationSim, which 1) uses REG(Request Execution Graph) model and queue theory to simulate the behavior of microservices; 2) uses pre-trained models to simulate performance interference. Experiments show that ColocationSim can simulate performance interference of both sequential and fan-out structure microservices with high accuracy and it can also simulate more than 8,000 colocated hosts in a short time.
在一台主机上并置延迟关键型(LC)作业和最佳努力型(BE)作业是提高数据中心资源效率的最佳实践,并置作业调度算法在此场景中发挥关键作用。但是,在实际数据中心中,大规模验证一种新的并行作业调度算法通常需要耗费大量的资源、能源和时间,因此仿真是首选方法。不幸的是,现有的模拟器不适合主机托管模拟,因为:1)它们不能模拟微服务,这在LC/BE工作中被广泛采用;2)它们不能模拟并行作业的性能干扰。在本文中,我们提出了一个新的模拟器ColocationSim,它1)使用REG(请求执行图)模型和队列理论来模拟微服务的行为;2)使用预训练模型模拟性能干扰。实验表明,ColocationSim可以高精度地模拟顺序微服务和扇形结构微服务的性能干扰,并且可以在短时间内模拟8000多台主机。
{"title":"ColocationSim: Simulate Colocation Datacenter with Microservices and Performance Interference","authors":"Kangjin Wang, Ying Li","doi":"10.1109/ISSREW53611.2021.00087","DOIUrl":"https://doi.org/10.1109/ISSREW53611.2021.00087","url":null,"abstract":"Colocating Latency-Critical (LC) jobs and Best-Effort (BE) jobs on one host is the best practice to improve datacenter resource efficiency and the Colocated Job Scheduling algorithms play a key role in this scenario. But validating a new Colocated Job Scheduling algorithm at scale is usually resource-, energy- and time-consuming in the real-datacenter, therefore simulation is the first choice. Unfortunately, existing simulators are not suitable for colocation simulation because: 1) they cannot simulate microservices, which is widely adopted in LC/BE jobs; 2) they cannot simulate performance interference of colocated jobs. In this paper, we present a new simulator, ColocationSim, which 1) uses REG(Request Execution Graph) model and queue theory to simulate the behavior of microservices; 2) uses pre-trained models to simulate performance interference. Experiments show that ColocationSim can simulate performance interference of both sequential and fan-out structure microservices with high accuracy and it can also simulate more than 8,000 colocated hosts in a short time.","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133977370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GAUSS 2021 Workshop Committees GAUSS 2021车间委员会
Pub Date : 2021-10-01 DOI: 10.1109/issrew53611.2021.00024
{"title":"GAUSS 2021 Workshop Committees","authors":"","doi":"10.1109/issrew53611.2021.00024","DOIUrl":"https://doi.org/10.1109/issrew53611.2021.00024","url":null,"abstract":"","PeriodicalId":385392,"journal":{"name":"2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134238571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1