Abstract:
Methods, systems, and computer readable media for modeling a workload are disclosed. According to one method, the method occurs at a computing platform. The method includes providing for user configuration of a file system associated with a device under test (DUT), providing for user configuration of at least one emulated user, and providing for user configuration of interaction behavior between the at least one emulated user and the file system.
Abstract:
Methods, systems, and computer readable media for testing network function virtualization (NFV) are disclosed. According to one method, the method occurs at a network test controller implemented using at least one processor. The method includes determining, using network configuration information, a first insertion point for inserting a first network function tester (NFT) into a service chain comprising a plurality of virtualized network functions (VNFs). The method also includes configuring the first NFT to analyze or ignore traffic matching filtering information, wherein the traffic traverses the first NFT from at least one VNF of the plurality of VNFs. The method further includes inserting, at the first insertion point, the first NFT into the service chain.
Abstract:
Methods, systems, and computer readable media for testing network function virtualization (NFV) are disclosed. According to one method, the method occurs at a network test controller implemented using at least one processor. The method includes determining, using network configuration information, a first insertion point for inserting a first network function tester (NFT) into a service chain comprising a plurality of virtualized network functions (VNFs). The method also includes configuring the first NFT to analyze or ignore traffic matching filtering information, wherein the traffic traverses the first NFT from at least one VNF of the plurality of VNFs. The method further includes inserting, at the first insertion point, the first NFT into the service chain.
Abstract:
Methods, systems, and computer readable media for modeling a workload are disclosed. According to one method, the method occurs at a computing platform. The method includes providing for user configuration of a file system associated with a device under test (DUT), providing for user configuration of at least one emulated user, and providing for user configuration of interaction behavior between the at least one emulated user and the file system.
Abstract:
A method for progressive convergence on network protocol stack vulnerabilities includes defining an initial protocol field and field value space for fuzz testing of a network communications protocol stack implementation. The method further includes dividing the initial space into regions corresponding to combinations of protocol fields and field values. The method further includes assigning vulnerability ratings to at least some of the regions. The method further includes executing fuzz testing of the network communications protocol stack implementation using the protocol fields and field values corresponding to the regions. The method further includes updating the vulnerability ratings of the regions based on results of the testing. The method further includes identifying, based on the updated vulnerability ratings, at least one region with a higher vulnerability rating than other regions. The method further includes performing fuzz testing for the sub-regions.
Abstract:
A method for progressive convergence on network protocol stack vulnerabilities includes defining an initial protocol field and field value space for fuzz testing of a network communications protocol stack implementation. The method further includes dividing the initial space into regions corresponding to combinations of protocol fields and field values. The method further includes assigning vulnerability ratings to at least some of the regions. The method further includes executing fuzz testing of the network communications protocol stack implementation using the protocol fields and field values corresponding to the regions. The method further includes updating the vulnerability ratings of the regions based on results of the testing. The method further includes identifying, based on the updated vulnerability ratings, at least one region with a higher vulnerability rating than other regions. The method further includes performing fuzz testing for the sub-regions.
Abstract:
Methods, systems, and computer readable media for monitoring and/or testing network communications are disclosed. A method for monitoring network communications includes receiving packets from a network connected device, determining features associated with either the network connected device or a communications network to which the network connected device is connected by actively or passively monitoring or testing the packets, and automatically switching between passively monitoring or testing the packets and actively monitoring or testing the packets in response to receiving a packet carrying instructions.
Abstract:
Methods, systems, and computer readable media for monitoring and/or testing network communications are disclosed. A method for monitoring network communications includes receiving packets from a network connected device, determining features associated with either the network connected device or a communications network to which the network connected device is connected by actively or passively monitoring or testing the packets, and automatically switching between passively monitoring or testing the packets and actively monitoring or testing the packets in response to receiving a packet carrying instructions.