Skip to main content

Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set

  • Conference paper
  • First Online:
  • 537 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9473))

Abstract

Structural analysis represented by FSMDiff algorithm is the main measuring approach for existing software behavior model which is based on finite state automata. This method just focus on the data structure of finite state automata as figure characteristics, however, as software behavior model, it is more important for finite state automaton to reflect the characteristics of software behavior. So we need to find out a method to distinguish the importance in the finite state automata between different state nodes. This paper shows how the output of the FSMDiff algorithm can provide a quantified expression of structural difference between two models. According to this, we also introduce the language-set analysis, which uses the depth-first traversal algorithm to solve the language set of finite state automata. Above all, we propose a new strategy of assigning weights for the local elements of software behavior model, which can fusion assigning weight results and structural analysis for evaluation of software behavioral models. Experiment results demonstrate the effectiveness and feasibility of software behavioral model measuring approach of combining structural analysis and language set, and laid the foundation for constructing evaluation system of software behavior model inference technology.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Wang, X.Z., Sun, L.C., Lu, Y.L.: Intrusion detection approach towards software behavior trustworthiness. J. Univ. Sci. Technol. China 41(7), 626–635 (2011)

    Google Scholar 

  2. Peng, G.J., Tao, F., Zhang, H.G.: Research on theory model of software dynamic trustiness based on behavior integrity. In: Proceedings of the 2009 International Conference on Multimedia Information Networking and Security, pp. 130–134. Washington, DC, USA (2009)

    Google Scholar 

  3. Godefroid, E., Levin, M.Y., Molnar, D.: Automated whitebox fuzz testing. In: Proceedings of the 16th Annual Network & Distributed System Security Symposium, pp. 1–10. San Diego, USA (2008)

    Google Scholar 

  4. Borger, E.: Abstract state machines and high-level system design and analysis. Theor. Comput. Sci. 336(2), 205–207 (2005)

    Article  MathSciNet  Google Scholar 

  5. Quante, J., Koschke, R.: Dynamic protocol recovery. In: Proceedings of the 14th International Working Conference on Reverse Engineering, pp. 219–228. Vancouver, Canada (2007)

    Google Scholar 

  6. Hopcroft, J., Motwani, R., Ullman, J.: Introduction to automata theory, languages and computation, 3rd edn. Addison-Wesley, New Jersey (2007)

    Google Scholar 

  7. Walkinshaw, N., Bogdanov, K.: Comparing software behavior models. Technical report: CS-08-16, The University of Sheffield, Sheffield, UK (2008)

    Google Scholar 

  8. Walkinshaw, N., Bogdanov, K., Johnson, K.: Evaluation and comparison of inferred regular grammars. In: Clark, A., Coste, F., Miclet, L. (eds.) ICGI 2008. LNCS (LNAI), vol. 5278, pp. 252––265. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  9. Lo, D., Khoo, S.: QUARK: empirical assessment of automaton-based specification miners. In: Proceedings of the 13th Working Conference on Reverse Engineering, pp. 51–60. Benevento, Italy (2006)

    Google Scholar 

  10. Frossi, A., Maggi, F., Rizzo, G.L., Zanero, S.: Selecting and improving system call models for anomaly detection. In: Flegel, U., Bruschi, D. (eds.) DIMVA 2009. LNCS, vol. 5587, pp. 206––223. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  11. Lang, K.J., Pearlmutter, B.A., Price, R.A.: In: Honavar, V.G., Slutzki, G. (eds.) ICGI 1998. LNCS (LNAI), vol. 1433, p. 1. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

Download references

Acknowledgment

This work was supported by the Key Project of National Defense Basic Research Program of China (Grant No. B1120132031) and the Ph.D. Programs Foundation of Ministry of Education of China (Grant No. 20131101120043).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to ZhiQiang Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Xue, J., Zhang, Y., Hu, C., Ren, H., Li, Z. (2015). Software Behavior Model Measuring Approach of Combining Structural Analysis and Language Set. In: Yung, M., Zhu, L., Yang, Y. (eds) Trusted Systems. INTRUST 2014. Lecture Notes in Computer Science(), vol 9473. Springer, Cham. https://doi.org/10.1007/978-3-319-27998-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27998-5_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27997-8

  • Online ISBN: 978-3-319-27998-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics