header
PAYL 

Tag:
Edit edit   Starstar

Program Information

Name: PAYL 
Domain: Machine learning
Functionality: An anomaly-based intrusion detection system 
Input: T:The training data  D:The testing data 
Output: C: Classification of testing data  

Reference

Properties of Machine Learning Applications for Use in Metamorphic Testing
https://pdfs.semanticscholar.org/8b12/c5fd003efd52b798235d97a89a9c91dfd666.pdf?_ga=2.92592733.1914929612.1565157787-500444029.1561960669 

MR Information

MR1------

Description:
Property: $C_{1}=C_{2}$ 
Source input: T,$D_{1}$ 
Source output: $C_{1}$ 
Follow-up input: T,$D_{2}$ 
Follow-up output: $C_{2}$ 
Input relation: $D_{2}$: Adding a constant value to each byte of $D_{1}$ 
Output relation: $C_{1}=C_{2}$ 
Pattern:

MR2------

Description:
Property: $C_{1}=C_{2}$ 
Source input: T,$D_{1}$ 
Source output: $C_{1}$ 
Follow-up input: T,$D_{2}$ 
Follow-up output: $C_{2}$ 
Input relation: $D_{2}$: each byte of $D_{1}$ are multiplied by a constant 
Output relation: $C_{1}=C_{2}$ 
Pattern:

MR3------

Description:
Property: $C_{1}=C_{2}$ 
Source input: $T_{1}$,D 
Source output: $C_{1}$ 
Follow-up input:  $T_{2}$,D 
Follow-up output: $C_{2}$ 
Input relation: $T_{2}$:Permutation of $T_{1}$ 
Output relation: $C_{1}=C_{2}$ 
Pattern:

MR4------

Description:
Property: $C_{1}=C_{2}$ 
Source input: T,$D_{1}$ 
Source output: $C_{1}$ 
Follow-up input: T,$D_{2}$ 
Follow-up output: $C_{2}$ 
Input relation: $D_{2}$: Subtracting each byte value of $D_{1}$ from the maximum (255, or 0xFF) 
Output relation: $C_{1}=C_{2}$ 
Pattern:

MR5------

Description:
Property: $C_{2}$:It should not be considered as a alert 
Source input: $T_{1}$,D 
Source output: $C_{1}$ 
Follow-up input:  $T_{2}$,D 
Follow-up output: $C_{2}$ 
Input relation: $T_{2}$:include a particular payload which generates an alert in $T_{1}$ 
Output relation: $C_{2}$:It should not be considered as a alert 
Pattern:

MR6------

Description:
Property: $C_{2}$:Any messages of that length should be considered as a alert 
Source input: $T_{1}$,D 
Source output: $C_{1}$ 
Follow-up input:  $T_{2}$,D 
Follow-up output: $C_{2}$ 
Input relation: $T_{2}$:Remove all payloads of a certain length in $T_{1}$ 
Output relation: $C_{2}$:Any messages of that length should be considered as a alert 
Pattern:
Insert title here