Abstract
We present an extension to learning-based testing of systems for adversary-induced weaknesses that addresses the problem of repeated generation of known weaknesses. Our approach adds to the normally used fitness measure a component that computes the similarity of a test to known tests that revealed a weakness and uses this similarity to penalize new tests. We instantiated this idea to the testing of ad-hoc wireless networks using the IACL approach, more precisely to applications in precision agriculture, and our experiments show that our modification results in finding substantially different tests from the test(s) that we want to avoid.
Notes
- 1.
These kinds of events could also be applied to attack agents which would create a third group of events. As our experiments show, concentrating on environment and customer agents is enough for our application, but other applications and other testing methods might require this third group.
References
McMinn, P.: Search-based software test data generation: a survey. Softw. Test. Verif. Reliab. 14, 105–156 (2004)
Baars, A.I., Lakhotia, K., Vos, T.E.J., Wegener, J.: Search-based testing, the underlying engine of future internet testing. In: Proceedings of FedCSIS 2011, pp. 917–923. IEEE Press (2011)
Blackadar, M., Denzinger, J.: Behavior learning-based testing of starcraft competition entries. In: Proceedings of AIIDE 2011, pp. 116–121. AAAI Press (2011)
Hudson, J., Denzinger, J., Kasinger, H., Bauer, B.: Efficiency testing of self-adapting systems by learning of event sequences. In: Proceedings of ADAPTIVE 2010, pp. 200–205 (2010)
Bergmann, K.P., Denzinger, J.: Testing of precision agricultural networks for adversary-induced problems. In: Proceedings of GECCO 2013, pp. 1421–1428. IEEE Press (2013)
Bergmann, K.P., Denzinger, J.: Automated testing for cyber threats to ad-hoc wireless networks. In: Proceedings of CICS 2014, pp. 34–41. IEEE Press (2014)
Bergmann, K.P.: Vulnerability testing in wireless ad-hoc networks using incremental adaptive corrective learning. Ph.D. thesis, Department of Computer Science, University of Calgary (2014). http://theses.ucalgary.ca/bitstream/11023/1504/4/ucalgary_2014_bergmann_karel.pdf
Postel, J.: Internet Protocol, RFC 791 (Standard) (1981)
Postel, J.: User Datagram Protocol, RFC 768 (Standard) (1980)
Perkins, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing, RFC 3561 (Experimental) (2003)
Denzinger, J., Kidney, J.: Improving migration by diversity. In: Proceedings of CEC 2003, pp. 700–707 (2003)
de Jong, E.D., Watson, R.A., Pollack, J.B.: Reducing bloat and promoting diversity using multi-objective methods. In: Proceedings of GECCO 2001, pp. 11–18 (2001)
Maturana, J., Saubion, F.: A compass to guide genetic algorithms. In: Rudolph, G., Jansen, T., Beume, N., Lucas, S., Poloni, C. (eds.) PPSN 2008. LNCS, vol. 5199, pp. 256–265. Springer, Heidelberg (2008). doi:10.1007/978-3-540-87700-4_26
Bueno, P.M.S., Jino, M., Wong, W.E.: Diversity oriented test data generation using metaheuristic search techniques. Inf. Sci. 259, 490–509 (2014)
Yoo, S., Harman, M.: Test data regeneration: generating new test data from existing test data. J. Softw. Test. Verif. Reliab. 22(3), 171–201 (2012)
Kayacik, H.G., Zincir-Heywood, A.N., Heywood, M.I.: Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race. Soft Comput. 11(7), 4366–4383 (2011)
Sasnauskas, R., Landsiedel, O., Alizai, M.H., Weise, C., Kowalewski, S., Wehrle, K.: Kleenet: discovering insidious interaction bugs in wireless sensor networks before deployment. In: Proceedings of IPSN 2010, pp. 186–196 (2010)
Woehrle, M.: Search-based stress testing of wireless network protocol stacks. In: Proceedings of ICST 2012, pp. 794–803 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Fleischer, C., Denzinger, J. (2017). Focusing Learning-Based Testing Away from Known Weaknesses. In: Squillero, G., Sim, K. (eds) Applications of Evolutionary Computation. EvoApplications 2017. Lecture Notes in Computer Science(), vol 10200. Springer, Cham. https://doi.org/10.1007/978-3-319-55792-2_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-55792-2_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-55791-5
Online ISBN: 978-3-319-55792-2
eBook Packages: Computer ScienceComputer Science (R0)