skip to main content
10.1145/2896941.2896950acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Enhanced playback of automated service emulation models using entropy analysis

Authors Info & Claims
Published:14 May 2016Publication History

ABSTRACT

Service virtualisation is a supporting tool for DevOps to generate interactive service models of dependency systems on which a system-under-test relies. These service models allow applications under development to be continuously tested against production-like conditions. Generating these virtual service models requires expert knowledge of the service protocol, which may not always be available. However, service models may be generated automatically from network traces. Previous work has used the Needleman-Wunsch algorithm to select a response from the service model to play back for a live request. We propose an extension of the Needleman-Wunsch algorithm, which uses entropy analysis to automatically detect the critical matching fields for selecting a response. Empirical tests against four enterprise protocols demonstrate that entropy weighted matching can improve response accuracy.

References

  1. T. Banzai, H. Koizumi, R. Kanbayashi, T. Imada, T. Hanawa, and M. Sato. D-cloud: Design of a software testing environment for reliable distributed systems using cloud computing technology. In 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing (CCGrid 2010), pages 631--636, Melbourne, Australia, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Bertolino, G. De Angelis, L. Frantzen, and A. Polini. Model-based generation of testbeds for web services. In Testing of Software and Communicating Systems, volume 5047, pages 266--282. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Box, D. Ehnebuske, G. Kakivaya, A. Layman, N. Mendelsohn, H. F. Nielsen, S. Thatte, and D. Winer. Simple Object Access Protocol (SOAP) 1.1, 5 2000. W3C Note 08 May 2000.Google ScholarGoogle Scholar
  4. L. Chen. Continuous delivery: Huge benefits, but challenges too. IEEE Software, 32(2):50--54, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. W. Cui, V. Paxson, N. C. Weaver, and R. H. Katz. Protocol-independent adaptive replay of application dialog. In Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS 2006), pages 1--15, San Diego, California, USA, 2006.Google ScholarGoogle Scholar
  6. Docker Inc. Docker. http://docker.com, 2015.Google ScholarGoogle Scholar
  7. M. Du, J.-G. Schneider, C. Hine, J. Grundy, and S. Versteeg. Generating service models by trace subsequence substitution. In Proceedings of the 9th International ACM Sigsoft Conference on Quality of Software Architectures (QoSA 2013), pages 123--132, Vancouver, British Columbia, Canada, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. T. Ebringer, L. Sun, and S. Boztas. A fast randomness test that preserves local detail. Virus Bulletin, 2008.Google ScholarGoogle Scholar
  9. B. Fitzgerald and K.-J. Stol. Continuous software engineering and beyond: trends and challenges. In 1st International Workshop on Rapid Continuous Software Engineering, pages 1--9. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. P. Godefroid. Micro execution. In 36th International Conference on Software Engineering (ICSE 2014), pages 539--549, Hyderabad, India, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Grundy, Y. Cai, and A. Liu. Softarch/mte: Generating distributed system test-beds from high-level software architecture descriptions. Automated Software Engineering, 12(1):5--39, Jan. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. C. Hine. Emulating Enterprise Software Environments. Phd thesis, Swinburne University of Technology, Faculty of Information and Communication Technologies, 2012.Google ScholarGoogle Scholar
  13. J. Humble. Continuous delivery vs continuous deployment. http://continuousdelivery.com/2010/08/continuous-delivery-vs-continuous-deployment/, 13 August 2010. (Accessed 19 January 2016).Google ScholarGoogle Scholar
  14. L. Jost. The relation between evenness and diversity. Diversity, 2(2):207--232, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  15. P. Li. Selecting and Using Virtualization Solutions: our Experiences with VMware and VirtualBox. Journal of Computing Sciences in Colleges, 25(3):11--17, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R. Long, M. Harrington, R. Hain, and G. Nicholls. IMS Primer. IBM International Technical Support Organisation, 2000.Google ScholarGoogle Scholar
  17. G. J. McLachlan, K.-A. Do, and C. Ambroise. Analyzing Microarray Gene Expression Data. Wiley-Interscience, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  18. J. Michelsen and J. English. Service Virtualization: Reality is Overrated. Apress, September 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. S. B. Needleman and C. D. Wunsch. A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal of Molecular Biology, 48(3):443--453, 1970.Google ScholarGoogle ScholarCross RefCross Ref
  20. J. Sermersheim. Lightweight Directory Access Protocol (LDAP): The Protocol, 6 2006. RFC 4511.Google ScholarGoogle Scholar
  21. C. E. Shannon. A mathematical theory of communication. The Bell System Technical Journal, 27:379--423, 623--656, 1948.Google ScholarGoogle ScholarCross RefCross Ref
  22. E. H. Simpson. Measurement of diversity. Nature, 1949.Google ScholarGoogle Scholar
  23. J. Sun and T. Mannisto. Usefulness evaluation of simulation in server system testing. In 36th IEEE Computer Software and Applications Conference (COMPSAC 2012), pages 158--163, Turkey, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Twitter. The Twitter REST API, 2014.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    CSED '16: Proceedings of the International Workshop on Continuous Software Evolution and Delivery
    May 2016
    98 pages
    ISBN:9781450341578
    DOI:10.1145/2896941

    Copyright © 2016 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 14 May 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Upcoming Conference

    ICSE 2025

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader