virtualizing the sme with opaque data processing

21
ca Devcenter Virtualizing the SME with Opaque Data Processing Stefana Muller DCX05S @StefanaMuller CA Technologies Senior Principal Product Manager

Upload: stefana-muller

Post on 27-Jul-2015

296 views

Category:

Software


3 download

TRANSCRIPT

ca Devcenter

Virtualizing the SME withOpaque Data Processing Stefana Muller

DCX05S @StefanaMuller

CA TechnologiesSenior Principal Product Manager

2 © 2014 CA. ALL RIGHTS RESERVED.

For Informational Purposes Only

© 2014 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.

This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutions so actual results may vary.

Terms of this Presentation

3 © 2014 CA. ALL RIGHTS RESERVED.

Any sufficiently advanced

technology is indistinguishable

from magic.

- Arthur C. Clarke

4 © 2014 CA. ALL RIGHTS RESERVED.

Abstract

Opaque Data Processing (ODP) uses patented algorithms to automatically find the relationships inside of nearly any data source, radically reducing the time required to create virtual services. Machine learning AI means the more data provided, the stronger the tool becomes. ODP makes moot the question, “Do you support that protocol?”

Stefana MullerCA Technologies

Senior Principal Product Manager

5 © 2014 CA. ALL RIGHTS RESERVED.

Agenda

SERVICE VIRTUALIZATION TODAY

CHALLENGES IN UNDERSTANDING DATA PROTOCOLS

ODP IN ACTION

OPAQUE DATA PROCESSING ESSENTIALS

OPAQUE DATA PROCESSING APPROACH

INCREASING ACCURACY OF ODP

1

2

3

4

5

6

6 © 2014 CA. ALL RIGHTS RESERVED.

The Big Problem - Constraints

“I can’t do anything until I have everything…and I never have everything!”

ESB

!

!

! ! !

System Unavailable

x x x

x

Invalid data Access Fees

Incomplete Development

7 © 2014 CA. ALL RIGHTS RESERVED.

How Service Virtualization Helps

“I have everything I need, when I need it!"

ESB

! ! !System Unavailable Invalid data Access Fees

Incomplete Development

8 © 2014 CA. ALL RIGHTS RESERVED.

Service Virtualization: How does it work?

CAPTURE PROCESS MODEL

Data Protocol Detection

Identification of Operation vs. other data in transaction

Identification of Magic Strings/Dates

De-Identify…

Record traffic between existing systems

Create from engineering specifications

From sources such as log files, sample data, packet capture and application insight files

Living, breathing “live” model

Sophisticated, contextual behavior

Automatic handling for dynamic properties

9 © 2014 CA. ALL RIGHTS RESERVED.

Service Virtualization: How does it work?

CAPTURE PROCESS MODEL

Record traffic between existing systems

Create from engineering specifications

From sources such as log files, sample data, packet capture and application insight files

Living, breathing “live” model

Sophisticated, contextual behavior

Automatic handling for dynamic properties

The DPHChallenge

10 © 2014 CA. ALL RIGHTS RESERVED.

The DPH Challenge

Must know the protocol‒ What if it is a proprietary protocol and the SME is no

longer available?

‒ What if the protocol is new, and there are no SMEs?

‒ What if you have a copybook and it is incomplete?

Must be able to identify the operation, body and syntax

It takes time to add new protocol support

11 © 2014 CA. ALL RIGHTS RESERVED.

ODP Essentials

High accuracy on the 4 well known protocols tested including IMS, LDAP, SOAP and Twitter (REST)

Speed and accuracy with Entropy Weighting + Message Clustering

The more data a service observes the more intelligent it becomes

Collaboration project between CA Labs, Swinburne University of Technology in Australia and the

CA Service Virtualization engineering and product teams

BRINGS TRUE ARTIFICIAL INTELLIGENCE (AI) TO SERVICE VIRTUALIZATION

HIGH ACCURACY: 99.6 – 100%

Virtualizes services without requiring any knowledge or decoding of the service protocols

Applies a genome sequence alignment algorithm, discovers byte-level patterns in message protocols

Virtualizes a much wider range of protocols without requiring a new DPH

12 © 2014 CA. ALL RIGHTS RESERVED.

ODP Approach

Current Approach

Opaque Data Processing

OPAQUE VSE

raw bytesrequest

responseCLIENT

machine learning match

VSE

Parse format delimit

request

responseCLIENT

matchdecode

13 © 2014 CA. ALL RIGHTS RESERVED.

ODP Approach – Byte-Level Alignment

Receive incoming request from client

Apply byte-level alignment to transactions in recording to find closest matching request (Needleman-Wunsch algorithm)

Perform byte-string substitution in matching response

Send modified response

14 © 2014 CA. ALL RIGHTS RESERVED.

Entropy Weighting

Increases accuracy of request matching

Weighs similar strings in a message higher than dissimilar strings

Assumption: The “Type”/Operation of a request is more important to match before the record information itself

For example: AddUser: 123456789012345

“Add User” – 7 bytes/higher priority“123456789012345” - 15 bytes/lower priority

15 © 2014 CA. ALL RIGHTS RESERVED.

ODP Approach with Entropy Weighting

ClientOpaque

ResponseGenerator

TransactionLibrary

StringSubstitution

Request

GeneratedResponse

Request

MatchingResponse

Matching Response

Modified Response

Needleman-WunschMatch

ClientOpaque

ResponseGenerator

TransactionLibrary

StringSubstitution

Request

GeneratedResponse

Request

MatchingResponse

Matching Response

Modified Response

CalculateEntropyWeighing

WeightedNeedleman-WunschMatch

16 © 2014 CA. ALL RIGHTS RESERVED.

ODP Accuracy with Entropy Weights

ProtocolSimple Method

% CorrectEntropy Weights

% Correct Best Entropy Measure

IMS 77.4 100 Richness

CICS 100 100 Shannon/Richness

LDAP ASN.1 94.2 94.6 Shannon

LDAP Text 100 100 Shannon/Richness

Twitter (REST) 99.5 99.6 Shannon

SOAP 100 100 Any

17 © 2014 CA. ALL RIGHTS RESERVED.

When to Apply ODP

ODP provides a turn key solution to virtualize protocols otherwise not supported by CA Service Virtualization

When you need reasonable data and you do not need to force specific behavior

For encrypted messages, decryption needs to occur before ODP analysis

ODP currently treats all transactions as stateless

?

18 © 2014 CA. ALL RIGHTS RESERVED.

Q & A

19 © 2014 CA. ALL RIGHTS RESERVED.

Credits

to the team of engineers and researchers for their hard work and determination in coming up with this innovative way to address the ever-growing challenge of protocol support.

Miao Du, Jean-Guy Schneider, Jun Han and John Grundy – Faculty of Information and Communication Technologies, Swinburne University of Technology, Australia

Steve Versteeg – Research Staff Member and Team Lead at CA Labs

Robert Williams (Staff Software Engineer and Architect) and Chris Kraus (Sr. Principal Product Manager) from the CA Service Virtualization product team

Dr. Steve VersteegCA Labs

Ms. Miao DuPhD Candidate

Dr. Jean-Guy Schneider

Prof. John Grundy

Prof. Jun Han

Robert WilliamsStaff Software Engineer,

CA Technologies

Chris KrausSr. Principal Product Manager

CA Technologies

Thank you . . .

20 © 2014 CA. ALL RIGHTS RESERVED.

Session Evaluation

Please provide your feedback about this session

Session Name:Virtualizing the SME with Opaque Data Processing

Access inside the CA World Mobile App

Click on SURVEY/SESSION EVALUATION If your badge was scanned at the entrance to

this session, click on the name of this session.

21 © 2014 CA. ALL RIGHTS RESERVED.

Devcenter CA Continuous Application Insight

CA Technologies

Devcenter CA Application Test

CA Technologies

Related Technologies

DevcenterCA Service Virtualization

CA Technologies

Devcenter CA Service Virtualization for SAP

CA Technologies