Traffic diversity and code coverage: a preliminary analysis

نویسندگان

  • Ying-Dar Lin
  • Yuan-Cheng Lai
  • Chun-Nan Lu
  • Jui-Tsun Hung
  • Chun-Pin Shao
چکیده

It is generally assumed that using more diverse traffic to test network devices could achieve larger code coverage. However, how to describe the diversity of traffic traces and the relationship between the traffic diversity and code coverage is still an issue. In this paper, the traffic diversity is defined using the number of packets and the size of the subnets involved, and traces having various diversity are used to evaluate the corresponding code coverage for the programs in a network device. Experiment results show that more number of packets or larger size of network segments can generate larger diversity indices and thus larger code coverage. For Snort, as the number of packets increases from 1 to 10,000,000, representative diversity index and the code coverage can increase from 0 to 0.95 on the basis of Simpson’s index and from 19.1% to 32.2%, respectively. As the size of network segments increases, representative diversity index and the code coverage can increase from 0.41 to 0.82 and from 28.2% to 32.2%, respectively. Similar results can be obtained in the case of Linux kernel. If the mappings among different diversity indices and the corresponding code coverage can be built beforehand, the quality of the tests can improved. Copyright © 2014 John Wiley & Sons, Ltd.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Correlation of air pollutants with land use and traffic measures in Tehran, Iran: A preliminary statistical analysis for land use regression modeling

Land use regression (LUR) models have been globally used to estimate long-term air pollution exposures. The present study aimed to analyze the association of different land use types and traffic measures with air pollutants in Tehran, Iran, as part of the future development of LUR models. Data of the particulate matter (PM10), sulfur dioxide (SO2), and nitrogen dioxide (NO2) were extracted from...

متن کامل

Assessment of genetic diversity in Pythium aphanidermatum isolates using ISSR and rep-CR methods

Sixty isolates of Pythium aphanidermatum as the causal agent of sugar beet root rot were selected on the basis of their geographical origins, morphological and genetic diversity studies. Pathogenicity test using the Kruskal-Wallis analysis showed significant differences between the pathogenic potential of isolates. Based on the growth rate, isolates were categorized in two groups with low and h...

متن کامل

Analysis of genetic diversity between and within Iranian accessions of spinach (Spinacia oleraceae) by SRAP markers

Spinach (Spinacia oleracea L.) is an economically important leafy vegetable crop in many countries. This is the first case study of using SRAP markers to analyze genetic diversity of Iranian spinach accessions. Eight SRAP primer combinations generated 88 scorable bands ranging from 50 to 1000 bp, among which 73 were polymorphic, with an average of 82.9 polymorphic bands per primer combination a...

متن کامل

Urban traffic-related determinants of health questionnaire (UTDHQ): an instrument developed for health impact assessments

  Background :Traffic and transport is a substantial part of a range of economic, social and environmental factors distinguished to have impact on human health. This paper is a report on a preliminary section of a Health Impact Assessment (HIA) on urban traffic and transport initiatives, being conducted in Sanandaj, Iran. In this preliminary study, the psychometric properties of Urban Traffic r...

متن کامل

Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic

The Early Detection, Alert and Response (eDare) system is aimed at purifying Web traffic propagating via the premises of Network Service Providers (NSP) from malicious code. To achieve this goal, the system employs powerful network traffic scanners capable of cleaning traffic from known malicious code. The remaining traffic is monitored and Machine Learning (ML) algorithms are invoked in an att...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Int. J. Communication Systems

دوره 29  شماره 

صفحات  -

تاریخ انتشار 2016