Abstract
Networked systems mainly consists of autonomous components conforming to the network protocols. Those concurrent and networked components are potentially to be attacked by malicious users. They have to implement some mechanisms to avoid the possible threatening requests aimed at disrupting or crashing the system, and then provoke some denial of service attack. In this paper, we address this problem. We suggest a method to model this kind of components and we propose a robustness testing approach to evaluate the system security. A new definition of Glued_IOLTS is used to define this kind of system and an algorithm for robustness testing cases generation is given. A case study with the RADIUS protocol is presented.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Bliudze, S., Sifakis, J.: A Notion of Glue Expressiveness for Component-Based Systems. In: van Breugel, F., Chechik, M. (eds.) CONCUR 2008. LNCS, vol. 5201, pp. 508–522. Springer, Heidelberg (2008)
Kone, O., Castanet, R.: Test generation for interworking systems. Computer Communications, 642–652 (1999)
Gotzhein, R., Khendek, F.: Compositional Testing of Communication Systems. In: Uyar, M.Ü., Duale, A.Y., Fecko, M.A. (eds.) TestCom 2006. LNCS, vol. 3964, pp. 227–244. Springer, Heidelberg (2006)
Ansay, T.: Compositional testing of communication systems-tools and case studies. Master’s thesis, Concordia University (2008)
Lei, B., Li, X., Liu, Z.: Robustness testing for software components. Science of Computer Programming, 879–897 (2010)
Khorchef, S.: Un Cardre Formel pour le Test de Robustesse des Protocols de Communication. PhD thesis, University of Bordeaux 1 (2007)
Offutt, A.J., Liu, S., Abdurazik, A.: Geneartion testing data from state-based specification. Software Testing, Verification and Reliability, 25–53 (2003)
Lai, R.: A survey of communication protocol testing. The Journal of Systems and Software, 21–46 (2001)
Desmoulin, A., Viho, C.: Interoperability test generation: Formal definitions and algorithm. In: ARIMA-Numero Special CARI 2006, pp. 49–63 (2006)
Castanet, R., Kone, O., Zarkouna, K.B.: Tests de robustesse. tech. rep., LaBRI, IRIT (2003)
Tretmans, J.: Conformance testing with labelled transition system: Implementation relations and test generation. In: Computer Networks and ISDN Systems, pp. 49–76 (1996)
Rigney, C., Willens, S., Rubens, A.: Remote authentication dial in user service (radius). tech. rep., The Internet Society (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fu, Y., Kone, O. (2012). Network Securing against Threatening Requests. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds) Data Privacy Management and Autonomous Spontaneus Security. DPM SETOP 2011 2011. Lecture Notes in Computer Science, vol 7122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28879-1_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-28879-1_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28878-4
Online ISBN: 978-3-642-28879-1
eBook Packages: Computer ScienceComputer Science (R0)