In this paper one type of the security problem of DoS (Denial of Service) is studied and transformed to check the robustness of a multiple components system. The network components like attackers, normal clients and the network devices are modeled as implementations of the testing system. And by evaluating the system’s robustness, the potential design defects can be detected. The methods on robustness testing of multiple components are studied, and a new model of Glued-IOLTS (Labelled Transition System) is given for defining this kind of multiple and networked system. Then a new approach and algorithm are given for generating the robustness test cases automatically.


Network Security Robustness Test Network Component Label Transition System Testing Architecture 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ansay, T.: Compositional testing of communication systems-tools and case studies. Master’s thesis, Concordia University (2008)Google Scholar
  2. 2.
    Boulares, O., Kone, O.: A security control architecture for soap based services. In: International Conference on Emerging Security Information, Systems and Technologies, SECURWARE (2010)Google Scholar
  3. 3.
    Castanet, R., Kone, O., and Zarkouna. Test de robustesse. In: Proc. of SETIT 2003 (Mars 2003)Google Scholar
  4. 4.
    Desmoulin, A., Viho, C.: Interoperability test generation: Formal definitions and algorithm. In: ARIMA-Numero Special CARI 2006, pp. 49–63 (2006)Google Scholar
  5. 5.
    Gotzhein, R., Khendek, F.: Compositional testing of communication systems. IFIP International Federation for Information Processing (2006)Google Scholar
  6. 6.
    Khorchef, S. Un Cardre Formel pour le Test de Robustesse des Protocols de Communication. PhD thesis, University of Bordeaux 1 (2007)Google Scholar
  7. 7.
    Lai, R. A survey of communication protocol testing. Systems and Software 62 (2002)Google Scholar
  8. 8.
    Lei, B., Li, X., and Liu, Z. Robustness testing for software components. Science of Computer Programming, 879–897 (2010)Google Scholar
  9. 9.
    Malek, M., and Dibuz, S. Pragmatic method for interoperability test suite derivation. In: The 24th Euromicro Conference, vol. 2, pp. 838–844. IEEEGoogle Scholar
  10. 10.
    Offutt, J., Liu, S., and Abdurazik, A. Genearting test data from state-based specification. The Journal of Software Testing,Verification and Reliability, 25–53 (2003)Google Scholar
  11. 11.
    Rigney, C., Willens, S., and Rubens, A. Remote authentication dial in user service (radius). Tech. rep., The Internet Society (2000)Google Scholar
  12. 12.
    Tretmans, J. Conformance testing with labelled transition system: Implementation relations and test generation. Computer Networks and ISDN Systems, 49–76 (1996)Google Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2012

Authors and Affiliations

  1. 1.University of Pau and Academy of BordeauxFrance

Personalised recommendations