Security and Robustness by Protocol Testing

被引:9
作者
Fu, Yulong [1 ]
Kone, Ousmane [1 ,2 ]
机构
[1] Univ PAU, F-4004 Mt De Marsan, France
[2] Acad Bordeaux, F-4004 Mt De Marsan, France
来源
IEEE SYSTEMS JOURNAL | 2014年 / 8卷 / 03期
关键词
Protocol implementation verification; protocol testing; robustness; security;
D O I
10.1109/JSYST.2012.2223532
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network protocols are the basis of network communication, and security concerns about protocol aspects are always important and useful in network systems. For the past two decades, the methods of protocol testing have been used to verify the functional conformance between the network specifications and the implementations. In this paper, we extend protocol testing methods by considering the robustness of the network protocols. We suggest a method for modeling network systems with concurrent components and propose a robustness testing approach to evaluate the system security. A new definition of Glued IOLTS is used to define this kind of system, and an algorithm for robustness test case generation is given. A case study with the RADIUS protocol is presented.
引用
收藏
页码:699 / 707
页数:9
相关论文
共 16 条
[1]  
[Anonymous], P ARIMA NUM SPEC CAR
[2]  
[Anonymous], THESIS U BORDEAUX 1
[3]  
[Anonymous], P SETIT MAR
[4]  
[Anonymous], P INT C EM SEC INF S
[5]  
[Anonymous], LECT NOTES I COMPUT
[6]  
[Anonymous], LNCS
[7]  
[Anonymous], RFC2865 INT SOC
[8]  
Bliudze S, 2008, LECT NOTES COMPUT SC, V5201, P508, DOI 10.1007/978-3-540-85361-9_39
[9]   Test development for communication protocols: towards automation [J].
Dssouli, R ;
Saleh, K ;
Aboulhamid, E ;
En-Nouaary, A ;
Bourhfir, C .
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (17) :1835-1872
[10]  
Gotzhein R, 2006, LECT NOTES COMPUT SC, V3964, P227