MisconfDoctor: Diagnosing Misconfiguration via Log-based Configuration Testing

被引:22
作者
Wang, Teng [1 ]
Liu, Xiaodong [1 ]
Li, Shanshan [1 ]
Liao, Xiangke [1 ]
Li, Wang [1 ]
Liao, Qing [2 ]
机构
[1] Natl Univ Def Technol, Coll Comp Sci, Changsha, Peoples R China
[2] Harbin Inst Technol, Dept Comp Sci & Technol, Shenzhen, Peoples R China
来源
2018 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2018) | 2018年
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Misconfguration; Exception log; Configuration testing;
D O I
10.1109/QRS.2018.00014
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As software configurations continue to grow in complexity, misconfiguration has become one of major causes of software failure. Software configuration errors can have catastrophic consequences, seriously affecting the normal use of software and quality of service. And misconfiguration diagnosis faces many challenges, such as path-explosion problems and incomplete statistical data. Our study of the log that is generated in response to misconfigurations by six widely used pieces of software highlights some interesting characteristics. These observations have influenced the design of MisconfDoctor, a misconfiguration diagnosis tool via log-based configuration testing. Through comprehensive misconfiguration testing, MisconfDoctor first extracts log features for every misconfiguration and builds a feature database. When a system misconfiguration occurs, MisconfDoctor suggests potential misconfigurations by calculating the similarity of the new exception log to the feature database. We use manual and real-world error cases from Httpd, MySQL and PostgreSQL in order to evaluate the effectiveness of the tool. Experimental results demonstrate that the tool's accuracy reaches 85% when applied to manual-error cases, and 78% for real-world cases.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 32 条
  • [1] [Anonymous], 2004, P 6 USENIX C OP SYST
  • [2] [Anonymous], 2004, P 2004 INT S COD GEN
  • [3] [Anonymous], 2007, 2 WORKSH TACKL COMP
  • [4] ATTARIYAN M., 2008, USENIX 2008 ANN TECH, P281, DOI DOI 10.5555/1404014.1404037
  • [5] Attariyan Mona., 2010, OSDI, pages, P237
  • [6] Barroso L. J., 2009, DATACENTER COMPUTER, P154
  • [7] Detecting and Resolving Policy Misconfigurations in Access-Control Systems
    Bauer, Lujo
    Garriss, Scott
    Reiter, Michael K.
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
  • [8] Chun Yuan, 2006, Operating Systems Review, V40, P375, DOI 10.1145/1218063.1217972
  • [9] Dan G., 1997, Algorithms on Strings, Trees, and Sequences: Computer Science and Computational Biology
  • [10] Diagnostic of field aged cables and accessories by time-domain dielectric spectroscopy
    David, E
    Amyot, N
    Drapeau, JF
    [J]. 2003 ANNUAL REPORT CONFERENCE ON ELECTRICAL INSULATION AND DIELECTRIC PHENOMENA, 2003, : 165 - 170