首页> 外文会议>Integrated formal methods >Process Algebra for Event-Driven Runtime Verification: A Case Study of Wireless Network Management
【24h】

Process Algebra for Event-Driven Runtime Verification: A Case Study of Wireless Network Management

机译:事件驱动的运行时验证的过程代数:以无线网络管理为例

获取原文
获取原文并翻译 | 示例

摘要

Runtime verification is analysis based on information extracted from a running system. Traditionally this involves reasoning about system states, for example using trace predicates. We have been investigating runtime verification for event-driven systems and in that context we propose a higher level of abstraction can be useful, namely reasoning at the level of user-perceived system events. And when considering events, then the natural formalism for verification is a form of process algebra. We employ a universal process algebra that encapsulates both dynamic and spatial behaviour, based on Robin Milner's bigraphs [1]. Our models are an extension of his bigraphical reactive systems. These consist of a set of bigraphs that describe spatial and communication relationships, and a set of bigraphical reaction rules that define how bigraphs can evolve over time. We have extended the basic formalism to bigraphical reactive systems with sharing [2], to allow for spatial locations that can overlap. In this talk we present a case study involving wireless home network management and the automatic generation of bigraphical models, and their analysis, in real-time. Wireless home networking is chosen as our case study because it is notoriously difficult to install and manage, especially for non-expert users. The Homework network management system [4] has been designed to provide user-oriented support in home wireless local area network (WLAN) environments. The Homework user interface includes drag and drop, comic-strip style interaction for users, and the information plane uses a stream database to record (raw and derived) events. Events include network behaviours such as detecting that a new machine has joined the network, resulting in new links and granting a DCHP lease, and user-intiated behaviours such as enforcing or dropping a policy. Policies forbid or allow access control; for example, a policy might block UDP and TCP traffic from a given site. All network and policy events (simple and derived) are recorded as a stream of tuples in the stream database. This part of the management system is illustrated in the left hand side of Figure 1. On the right hand side of Figure 1 we depict our addtion to the Homework system: additional runtime verification components, and feedback from the verification to the network and users. In this talk we focus first on the bigraphical representations of networks topologies, the encodings of events that modify topologies as bigraph reaction rules, and the encodings of access control policy enforcements and revokations as bigraph reaction rules, and second on how the two components are deployed at run-time and their interplay. Both components are part of a larger bigraph evaluation and rewriting toolkit [3]. Briefly, the Bigraph encoder component encodes events (network topology or policy) as bigraphical reaction rules, in real-time, as they are stored in the stream database. The Bigraph analysis component has two roles. First, it generates the bigraphical representation of the current configuration of the WLAN, according to the sequences of reaction rules received from the Bigraph encoder. Namely, a sequence of bigraphs is generated. A simple example bigraph of a WLAN with one router (R), one machine (Ml), and their respective wireless signals (S), is given in Figure 2. Second, it analyses the current configuration by checking predicates encoded as instances of bigraph matching. These predicates encapsulate properties required for correct encoding of topology or policy events, as well as system properties, including detecting configurations that violate user-invoked access control policies. Example predicates include: "Machine 01:23:45:67:89:ab is in the range of the router's signal", "Host Laptop has access to the Internet", and "TCP traffic is blocked for machine with IP address 192.168.0.3". The results are logged and fed back to the system, or to the user, when a verification fails. An explanation of the failure, or a counter-example can be displayed to a user, using the graphical bigraph notation. An indication of failure is also sent to the network, if appropriate, e.g. to deny activation of a policy, and/or simply stored in a logfile. The encoding and analysis components have been implemented on the router itself, and we give some empirical evidence of runtime verification from experiments using actual and synthetic network data.
机译:运行时验证是基于从正在运行的系统中提取的信息进行的分析。传统上,这涉及对系统状态的推理,例如使用跟踪谓词。我们一直在研究事件驱动系统的运行时验证,在这种情况下,我们提出了更高级别的抽象是有用的,即在用户感知的系统事件级别进行推理。当考虑事件时,用于验证的自然形式主义是过程代数的一种形式。我们基于罗宾·米尔纳(Robin Milner)的传记[1],采用了封装动态和空间行为的通用过程代数。我们的模型是他的传记式反应系统的扩展。这些包括一组描述空间和通信关系的二元图,以及一组定义二元图随时间变化的传记反应规则。我们已经将基本形式主义扩展到具有共享性的传记式反应系统[2],以允许可以重叠的空间位置。在本次演讲中,我们将提供一个案例研究,其中涉及无线家庭网络管理和传记模型的自动生成以及它们的实时分析。选择无线家庭网络作为我们的案例研究是因为众所周知,它很难安装和管理,特别是对于非专业用户而言。家庭网络管理系统[4]被设计为在家庭无线局域网(WLAN)环境中提供面向用户的支持。家庭作业用户界面包括拖放,漫画风格的用户交互,并且信息平面使用流数据库来记录(原始和派生)事件。事件包括网络行为,例如检测到新计算机已加入网络,导致新链接并授予DCHP租约,以及用户要求的行为(例如实施或删除策略)。策略禁止或允许访问控制;例如,策略可能会阻止来自给定站点的UDP和TCP通信。所有网络和策略事件(简单事件和派生事件)都作为元组流记录在流数据库中。管理系统的这一部分显示在图1的左侧。在图1的右侧,我们描述了对家庭作业系统的添加:附加的运行时验证组件,以及从验证到网络和用户的反馈。在本次演讲中,我们首先关注网络拓扑的履历表示,将拓扑修改为事件的编码作为Bigraph反应规则,以及将访问控制策略实施和撤消的编码作为Bigraph反应规则,其次关注如何部署这两个组件在运行时及其相互作用。这两个组件都是较大的Bigraph评估和重写工具包的一部分[3]。简而言之,由于Bigraph编码器组件将事件(网络拓扑或策略)存储在流数据库中,因此它们会将事件(网络拓扑或策略)实时编码为传记式反应规则。 Bigraph分析组件具有两个作用。首先,它根据从Bigraph编码器接收到的反应规则序列,生成WLAN当前配置的二进制表示。即,生成一系列图。图2中给出了带有一个路由器(R),一台机器(M1)以及它们各自的无线信号(S)的WLAN的简单示例图。其次,它通过检查编码为bigraph实例的谓词来分析当前配置。匹配。这些谓词封装了正确编码拓扑或策略事件所需的属性以及系统属性,包括检测违反用户调用的访问控制策略的配置。谓词示例包括:“机器01:23:45:67:89:ab在路由器的信号范围内”,“主机便携式计算机可以访问Internet”和“ IP地址为192.168。的计算机的TCP通信被阻止” 0.3英寸。验证失败后,结果将被记录并反馈给系统或用户。使用图形二元符号可以向用户显示故障说明或反例。如果适当的话,例如,还将故障指示发送到网络。拒绝激活策略,和/或仅将其存储在日志文件中。编码和分析组件已在路由器本身上实现,我们通过使用实际和合成网络数据进行的实验提供了运行时验证的一些经验证据。

著录项

  • 来源
    《Integrated formal methods》|2012年|21-23|共3页
  • 会议地点 Pisa(IT)
  • 作者单位

    School of Computing Science, University of Glasgow, UK;

    School of Computing Science, University of Glasgow, UK;

  • 会议组织
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号