TY - GEN
T1 - High-coverage testing of softwarized networks
AU - Prabhu, Santhosh
AU - Chaudhry, Gohar Irfan
AU - Godfrey, Brighten
AU - Caesar, Matthew
N1 - Publisher Copyright:
© 2018 Copyright held by the owner/author(s).
PY - 2018/8/7
Y1 - 2018/8/7
N2 - Network operators face a challenge of ensuring correctness as networks grow more complex, in terms of scale and increasingly in terms of diversity of software components. Network-wide verification approaches can spot errors, but assume a simplified abstraction of the functionality of individual network devices, which may deviate from the real implementation. In this paper, we propose a technique for high-coverage testing of end-to-end network correctness using the real software that is deployed in these networks. Our design is effectively a hybrid, using an explicit-state model checker to explore all network-wide execution paths and event orderings, but executing real software as subroutines for each device. We show that this approach can detect correctness issues that would be missed both by existing verification and testing approaches, and a prototype implementation suggests the technique can scale to larger networks with reasonable performance.
AB - Network operators face a challenge of ensuring correctness as networks grow more complex, in terms of scale and increasingly in terms of diversity of software components. Network-wide verification approaches can spot errors, but assume a simplified abstraction of the functionality of individual network devices, which may deviate from the real implementation. In this paper, we propose a technique for high-coverage testing of end-to-end network correctness using the real software that is deployed in these networks. Our design is effectively a hybrid, using an explicit-state model checker to explore all network-wide execution paths and event orderings, but executing real software as subroutines for each device. We show that this approach can detect correctness issues that would be missed both by existing verification and testing approaches, and a prototype implementation suggests the technique can scale to larger networks with reasonable performance.
KW - Correctness
KW - Network verification
UR - http://www.scopus.com/inward/record.url?scp=85056379407&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85056379407&partnerID=8YFLogxK
U2 - 10.1145/3229616.3229617
DO - 10.1145/3229616.3229617
M3 - Conference contribution
AN - SCOPUS:85056379407
T3 - SecSoN 2018 - Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, Part of SIGCOMM 2018
SP - 46
EP - 52
BT - SecSoN 2018 - Proceedings of the 2018 Workshop on Security in Softwarized Networks
PB - Association for Computing Machinery
T2 - 1st Workshop on Security in Softwarized Networks: Prospects and Challenges, SecSoN 2018, held in conjunction with the ACM SIGCOMM 2018
Y2 - 24 August 2018
ER -