Stateful traffic replay for web application proxies

Chun-Ying Huang*, Ying-Dar Lin, Peng Yu Liao, Yuan Cheng Lai

*Corresponding author for this work

研究成果: Article同行評審

4 引文 斯高帕斯(Scopus)


It is a common practice to test a network device by replaying network traffic onto it and observe its reactions. Many replay tools support Transmission Control Protocol/Internet Protocol stateful traffic replay and hence can be used to test switches, routers, and gateway devices. However, they often fail if the device under test (DUT) is an application level proxy. In this paper, we design and implement ProxyReplay to replay application-layer traffic for network proxies. As many application proxies have built-in security functions, the main purpose of this tool is to evaluate the security functionalities of DUTs using payloads constructed from real network traces. ProxyReplay modifies requests and responses and maintains queues for request-response pairs to resolve the issues of protocol dependency, functional dependency, concurrent replay, and error resistance. The solution provides two replay modes, that is, the preprocess mode and the concurrent mode. Depending on the benchmark scenario, we show that the preprocess mode is better for benchmarking the performance capability of a DUT. In contrast, the concurrent mode is used when the replayed trace file is extremely large. Our experiments show 99% accuracy. In addition, the replay performance exceeds 320 Mbps by running the benchmark with an off-the-shelf personal computer in the preprocess mode.

頁(從 - 到)970-981
期刊Security and Communication Networks
出版狀態Published - 1 四月 2015

指紋 深入研究「Stateful traffic replay for web application proxies」主題。共同形成了獨特的指紋。