2015
DOI: 10.1145/2693208.2693221
|View full text |Cite
|
Sign up to set email alerts
|

Interaction Traces Mining for Efficient System Responses Generation

Abstract: Software service emulation is an emerging technique for creating realistic executable models of server-side behaviour. It is particularly useful in quality assurance and DevOps, replicating production-like conditions for large-scale enterprise software systems. Existing approaches can automatically build client-server and server-server interaction models of complex software systems directly from analysis of service interaction trace data. However, when these interaction traces become large, searching an entire… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
11
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 18 publications
0
11
0
Order By: Relevance
“…Service virtualization is a critical technology for DevOps and Continuous Delivery [1], to enable au-dependent systems. Service virtualization [2,3,4] requires the understanding of message formats in order to decode request messages and formulate appropriate response messages. In the domain of network security [5,6,7], intrusion detection systems (IDS) and firewall systems require the knowledge of protocol message formats before performing deep packet inspection.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Service virtualization is a critical technology for DevOps and Continuous Delivery [1], to enable au-dependent systems. Service virtualization [2,3,4] requires the understanding of message formats in order to decode request messages and formulate appropriate response messages. In the domain of network security [5,6,7], intrusion detection systems (IDS) and firewall systems require the knowledge of protocol message formats before performing deep packet inspection.…”
Section: Introductionmentioning
confidence: 99%
“…P-token leverages the positions of keywords in the message template structure to differentiate a keyword occurrence from its string value's occurrences in message payload and therefore identify message keywords more accurately. P-token has three major steps with corresponding techniques: (1) identifying positional keywords, i.e., keywords together with their positions in the messages, (2) clustering the messages into groups with a two-level hierarchical clustering strategy, such that each group has high homogeneity (representing a particular type of messages), and (3) inferring the message format for each cluster based on the natural positions of keywords in messages. In Step (1), we introduce a new technique called positional token.…”
Section: Introductionmentioning
confidence: 99%
“…We have been working on an automated approach to service emulation which uses no explicit knowledge of the services, their message protocols and structures, but solely relies on recordings of interactions between a system under test and its environment services [3], [4]. One key aspect of the approach is to identify similarities between messages and exploit these similarities in response generation.…”
Section: Introductionmentioning
confidence: 99%
“…One key aspect of the approach is to identify similarities between messages and exploit these similarities in response generation. Commonly used multiple sequence alignment (MSA) techniques from biology [5], [6] were used to do so -refer to [4] for the details of the approach.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation