核心期刊网首页> 外文会议> 计算机 & 自动化

Process Algebra for Event-Driven Runtime Verification: A Case Study of Wireless Network Management


Runtime verification is analysis based on information extracted from a running system. Traditionally this involves reasoning about system states, for example using trace predicates. We have been investigating runtime verification for event-driven systems and in that context we propose a higher level of abstraction can be useful, namely reasoning at the level of user-perceived system events. And when considering events, then the natural formalism for verification is a form of process algebra. We employ a universal process algebra that encapsulates both dynamic and spatial behaviour, based on Robin Milner's bigraphs [1]. Our models are an extension of his bigraphical reactive systems. These consist of a set of bigraphs that describe spatial and communication relationships, and a set of bigraphical reaction rules that define how bigraphs can evolve over time. We have extended the basic formalism to bigraphical reactive systems with sharing [2], to allow for spatial locations that can overlap. In this talk we present a case study involving wireless home network management and the automatic generation of bigraphical models, and their analysis, in real-time. Wireless home networking is chosen as our case study because it is notoriously difficult to install and manage, especially for non-expert users. The Homework network management system [4] has been designed to provide user-oriented support in home wireless local area network (WLAN) environments. The Homework user interface includes drag and drop, comic-strip style interaction for users, and the information plane uses a stream database to record (raw and derived) events. Events include network behaviours such as detecting that a new machine has joined the network, resulting in new links and granting a DCHP lease, and user-intiated behaviours such as enforcing or dropping a policy. Policies forbid or allow access control; for example, a policy might block UDP and TCP traffic from a given site. All network and policy events (simple and derived) are recorded as a stream of tuples in the stream database. This part of the management system is illustrated in the left hand side of Figure 1. On the right hand side of Figure 1 we depict our addtion to the Homework system: additional runtime verification components, and feedback from the verification to the network and users. In this talk we focus first on the bigraphical representations of networks topologies, the encodings of events that modify topologies as bigraph reaction rules, and the encodings of access control policy enforcements and revokations as bigraph reaction rules, and second on how the two components are deployed at run-time and their interplay. Both components are part of a larger bigraph evaluation and rewriting toolkit [3]. Briefly, the Bigraph encoder component encodes events (network topology or policy) as bigraphical reaction rules, in real-time, as they are stored in the stream database. The Bigraph analysis component has two roles. First, it generates the bigraphical representation of the current configuration of the WLAN, according to the sequences of reaction rules received from the Bigraph encoder. Namely, a sequence of bigraphs is generated. A simple example bigraph of a WLAN with one router (R), one machine (Ml), and their respective wireless signals (S), is given in Figure 2. Second, it analyses the current configuration by checking predicates encoded as instances of bigraph matching. These predicates encapsulate properties required for correct encoding of topology or policy events, as well as system properties, including detecting configurations that violate user-invoked access control policies. Example predicates include: 'Machine 01:23:45:67:89:ab is in the range of the router's signal', 'Host Laptop has access to the Internet', and 'TCP traffic is blocked for machine with IP address 192.168.0.3'. The results are logged and fed back to the system, or to the user, when a verification fails. An explanation of the failure, or a counter-example can be displayed to a user, using the graphical bigraph notation. An indication of failure is also sent to the network, if appropriate, e.g. to deny activation of a policy, and/or simply stored in a logfile. The encoding and analysis components have been implemented on the router itself, and we give some empirical evidence of runtime verification from experiments using actual and synthetic network data.......

【作者名称】: Muffy Calder, Michele Sevegnani
【作者单位】: School of Computing Science, University of Glasgow, UK, School of Computing Science, University of Glasgow, UK
【关 键 词】: Process Algebra for Event-Driven Runtime Verification: A Case Study of Wireless Network Management
【会议名称】: Integrated formal methods
【期刊论文数据库】: [DBS_Articles_01]
【期刊论文编号】: 101,419,171
【摘要长度】: 4,441
【会议地点】: Pisa(IT)
【会议组织】: School of Computing Science, University of Glasgow, UK;School of Computing Science, University of Glasgow, UK;
【会议时间】: 2012
【上篇论文】: 外文会议 - Agent Technology Applied to Monitoring, Security and Diagnosis of Energy Systems
【下篇论文】: 外文会议 - RBFs with Spatially Variable Shape Parameters and Optimized Knot Locations

【论文下载】: 免费获取 该期刊&论文全文内容