Skip to main content

Focusing Learning-Based Testing Away from Known Weaknesses

  • Conference paper
  • First Online:
Applications of Evolutionary Computation (EvoApplications 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10200))

Included in the following conference series:

Abstract

We present an extension to learning-based testing of systems for adversary-induced weaknesses that addresses the problem of repeated generation of known weaknesses. Our approach adds to the normally used fitness measure a component that computes the similarity of a test to known tests that revealed a weakness and uses this similarity to penalize new tests. We instantiated this idea to the testing of ad-hoc wireless networks using the IACL approach, more precisely to applications in precision agriculture, and our experiments show that our modification results in finding substantially different tests from the test(s) that we want to avoid.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Notes

  1. 1.

    These kinds of events could also be applied to attack agents which would create a third group of events. As our experiments show, concentrating on environment and customer agents is enough for our application, but other applications and other testing methods might require this third group.

References

  1. McMinn, P.: Search-based software test data generation: a survey. Softw. Test. Verif. Reliab. 14, 105–156 (2004)

    Article  Google Scholar 

  2. Baars, A.I., Lakhotia, K., Vos, T.E.J., Wegener, J.: Search-based testing, the underlying engine of future internet testing. In: Proceedings of FedCSIS 2011, pp. 917–923. IEEE Press (2011)

    Google Scholar 

  3. Blackadar, M., Denzinger, J.: Behavior learning-based testing of starcraft competition entries. In: Proceedings of AIIDE 2011, pp. 116–121. AAAI Press (2011)

    Google Scholar 

  4. Hudson, J., Denzinger, J., Kasinger, H., Bauer, B.: Efficiency testing of self-adapting systems by learning of event sequences. In: Proceedings of ADAPTIVE 2010, pp. 200–205 (2010)

    Google Scholar 

  5. Bergmann, K.P., Denzinger, J.: Testing of precision agricultural networks for adversary-induced problems. In: Proceedings of GECCO 2013, pp. 1421–1428. IEEE Press (2013)

    Google Scholar 

  6. Bergmann, K.P., Denzinger, J.: Automated testing for cyber threats to ad-hoc wireless networks. In: Proceedings of CICS 2014, pp. 34–41. IEEE Press (2014)

    Google Scholar 

  7. Bergmann, K.P.: Vulnerability testing in wireless ad-hoc networks using incremental adaptive corrective learning. Ph.D. thesis, Department of Computer Science, University of Calgary (2014). http://theses.ucalgary.ca/bitstream/11023/1504/4/ucalgary_2014_bergmann_karel.pdf

  8. Postel, J.: Internet Protocol, RFC 791 (Standard) (1981)

    Google Scholar 

  9. Postel, J.: User Datagram Protocol, RFC 768 (Standard) (1980)

    Google Scholar 

  10. Perkins, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing, RFC 3561 (Experimental) (2003)

    Google Scholar 

  11. Denzinger, J., Kidney, J.: Improving migration by diversity. In: Proceedings of CEC 2003, pp. 700–707 (2003)

    Google Scholar 

  12. de Jong, E.D., Watson, R.A., Pollack, J.B.: Reducing bloat and promoting diversity using multi-objective methods. In: Proceedings of GECCO 2001, pp. 11–18 (2001)

    Google Scholar 

  13. Maturana, J., Saubion, F.: A compass to guide genetic algorithms. In: Rudolph, G., Jansen, T., Beume, N., Lucas, S., Poloni, C. (eds.) PPSN 2008. LNCS, vol. 5199, pp. 256–265. Springer, Heidelberg (2008). doi:10.1007/978-3-540-87700-4_26

    Chapter  Google Scholar 

  14. Bueno, P.M.S., Jino, M., Wong, W.E.: Diversity oriented test data generation using metaheuristic search techniques. Inf. Sci. 259, 490–509 (2014)

    Article  Google Scholar 

  15. Yoo, S., Harman, M.: Test data regeneration: generating new test data from existing test data. J. Softw. Test. Verif. Reliab. 22(3), 171–201 (2012)

    Article  Google Scholar 

  16. Kayacik, H.G., Zincir-Heywood, A.N., Heywood, M.I.: Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race. Soft Comput. 11(7), 4366–4383 (2011)

    Article  Google Scholar 

  17. Sasnauskas, R., Landsiedel, O., Alizai, M.H., Weise, C., Kowalewski, S., Wehrle, K.: Kleenet: discovering insidious interaction bugs in wireless sensor networks before deployment. In: Proceedings of IPSN 2010, pp. 186–196 (2010)

    Google Scholar 

  18. Woehrle, M.: Search-based stress testing of wireless network protocol stacks. In: Proceedings of ICST 2012, pp. 794–803 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jörg Denzinger .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Fleischer, C., Denzinger, J. (2017). Focusing Learning-Based Testing Away from Known Weaknesses. In: Squillero, G., Sim, K. (eds) Applications of Evolutionary Computation. EvoApplications 2017. Lecture Notes in Computer Science(), vol 10200. Springer, Cham. https://doi.org/10.1007/978-3-319-55792-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-55792-2_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-55791-5

  • Online ISBN: 978-3-319-55792-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics