Formal verification of the heavy hitter problem

The heavy hitter problem is used to assess the frequency of occurrence of an element in a given data stream. It is one of the most widely used combinatorial tools in many safety-critical domains including medicine, telecommunications and stock exchange markets. Traditionally, the heavy hitter problem is analyzed using paper-and-pencil proofs, simulation or computer algebra systems. These techniques are informal and thus may result in an inaccurate analysis, which poses a serious threat to the reliability of the underlying applications of the problem. To overcome this limitation, we present a formal probabilistic analysis approach for the heavy hitter problem using a higher-order-logic theorem prover (HOL). The paper presents the higher-order-logic model of an algorithm for the heavy hitter problem. This model is then utilized to formally verify some interesting probabilistic and statistical properties associated with the heavy hitter problem in HOL.

[1]  Osman Hasan,et al.  Formal probabilistic analysis using theorem proving , 2008 .

[2]  Johannes Hölzl,et al.  Three Chapters of Measure Theory in Isabelle/HOL , 2011, ITP.

[3]  Aaron Richard Coble,et al.  Anonymity, information, and machine-assisted proof , 2010 .

[4]  Masayuki Noro,et al.  A Computer Algebra System , 2022 .

[5]  Sofiène Tahar,et al.  Formally Analyzing Expected Time Complexity of Algorithms Using Theorem Proving , 2010, Journal of Computer Science and Technology.

[6]  Xin-She Yang,et al.  Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.

[7]  Michael J. C. Gordon,et al.  Mechanizing programming logics in higher order logic , 1989 .

[8]  Charles M. Grinstead,et al.  Introduction to probability , 1999, Statistics for the Behavioural Sciences.

[9]  Xiaofeng Wang,et al.  Monitoring Heavy-Hitter Flows in High-Speed Network Concurrently , 2010, 2010 Fourth International Conference on Network and System Security.

[10]  Masayuki Noro,et al.  Risa/Asir—a computer algebra system , 1992, ISSAC '92.

[11]  John N. Tsitsiklis,et al.  Introduction to Probability , 2002 .

[12]  Vyas Sekar,et al.  LADS: Large-scale Automated DDoS Detection System , 2006, USENIX Annual Technical Conference, General Track.

[13]  Marina Thottan,et al.  Anomaly Detection Approaches for Communication Networks , 2010, Algorithms for Next Generation Networks.

[14]  Eli Upfal,et al.  Probability and Computing: Randomized Algorithms and Probabilistic Analysis , 2005 .

[15]  Sofiène Tahar,et al.  Formalization of Entropy Measures in HOL , 2011, ITP.