tailieunhanh - Requirements for a Practical Network Event Recognition Language

Deploying a computationalmarket for resource alloca- tion in the systems domain can benefit two research con- stituencies. The first constituency, which will be ignored for the rest of this paper, are the experimental economists and economically-minded computer scientists. Rarely are economists actually given the opportunity to deploy a market or a whole economy, let alone several for compar- ison. Computationalmechanismdesign [13] is an emerg- ing topic partly because the results apply to many differ- ent domains, and there is some merit in asking systems researchers to be research subjects as they attempt to use some market mechanism for their own work. But systems researchers (the second constituency) are much more interested in knowing. | RV 02 Preliminary Version Requirements for a Practical Network Event Recognition Language Karthikeyan Bhargavan University of Pennsylvania bkarthik@ Carl A. Gunter University of Pennsylvania gunter@ Abstract We propose a run-time monitoring and checking architecture for network protocols called Network Event Recognition. Our framework is based on passively monitoring the packet trace produced by a protocol implementation and checking it for properties written in a formal specification language NERL. In this paper we describe the design requirements for NERL. We show how the unique requirements of network protocol monitoring impact design and implementation options. Finally we outline our prototype implementation of NERL and discuss two case studies checking the correctness of network protocol simulations and privacy issues in packet-mode surveillance. 1 Introduction Runtime monitoring enables a monitor M to observe events created by a program p and check properties of these events as the program executes. If the program p can be instrumented to create a program P that generates events internal to p and reports them in a convenient form to .1 . then the monitor M can be simplified to take advantage of this white box event recognition. In some circumstances it is desirable or essential to avoid modification of the original program by the monitor and make do with black box analysis of the events produced by the monitored program. In this case the ability to choose what events are monitored falls much more completely on the monitor .1 . which must now recognize the events it aims to monitor from possibly incomplete and low-level events observable from p. The aim of this paper is to describe some key requirements for event recognition for black box monitoring of packet-mode communication protocols particularly protocols built on the Internet Protocol IP . Such protocols produce This is a preliminary version. The final version will be published

TÀI LIỆU LIÊN QUAN
TỪ KHÓA LIÊN QUAN
crossorigin="anonymous">
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.