The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Monitoring is a common requirement in everyday modern life, from anti-virus scanners on personal computers to securing large multinational systems' health and status. Such monitoring is a fundamental process which must be undertaken where resources are offered as a service as in the cloud, to make sure that the service has been delivered to meet all contractual obligations. However, with a dynamic...
Data leakage has become a problem of epidemic proportions with very serious consequences for businesses and their customers. Experts warn that it is very difficult for organisations to avoid infiltration and that they should be prepared for such events. Proactive detection of ongoing attacks is therefore critically important. In this paper we describe the design and implementation of Peeper, a policy...
In this work we report the final results of the field demonstration of the European FP7 mPlane project concerning the evaluation of the network performance with particular details regarding the access Quality of Service and traffic monitoring. We show how the proposed and experimented architecture of this measurement plane is fundamental for many future internet evolutions concerning user perception,...
In this paper we consider a root-cause analysis framework for NFV infrastructure. As monitoring machinery for NFV has matured the next step is to leverage on such data to automatically optimize failure detection, analysis, and overall resiliency. The complex architecture and dynamics of NFV poses significant challenges from the point of view of causality inference. In particular, the need for an approach...
Modern botnets such as Zeus and Conficker com-monly utilize a technique called domain fluxing or a Domain Generation Algorithm (DGA) to generate a large number of pseudo-random domain names dynamically for botnet operators to control their bots. These botnets are becoming one of the most serious threats to the Internet security on a global scale. In this paper, we present a method based on analyzing...
Numerous enterprises are migrating their applications onto cloud platforms to gain benefit from cloud computing technology. These applications are composed of several service components with complicated dependency structures, especially for network applications which commonly take serial collaboration of service components. We call a group of VMs belonging to the same application a VM family. Finding...
This paper describes the design and implementation of an intelligent monitoring system, that runs advanced inference mechanisms to correlate events from various sensors. Different to existing monitoring approaches, it exploits taxonomic background knowledge in form of ontological information to draw refined inferences. The monitoring system provides abstract knowledge exchange capabilities between...
Modern people are concerned with healthy eating habits; however, sustaining these habits often requires vigilant self-monitoring and strong will. In a related work, a social media system was proposed that enables people to begin eating naturally meals without conscious effort. The system used the concept of expectation assimilation, that is, it converted others' evaluations of healthfulness into those...
Nowadays, assuring security of computer systems becomes difficult due to the rapid development of IT technologies, even in household appliances. This article shows exemplary model of the IT security monitoring and management system. Proposed solution is aimed to collect security events, analyse them, assess the risk they bring and inform the administrator about them in order to take appropriate decision...
The large-scale dynamic cloud computing environment has raised great challenges for fault diagnosis in Web applications. First, fluctuating workloads cause traditional application models to change over time. Moreover, modeling the behaviors of complex applications always requires domain knowledge which is difficult to obtain. Finally, managing large-scale applications manually is impractical for operators...
In this paper, we conduct a detailed study characterizing the performance of multi-tier web applications on commercial cloud platforms and evaluate the potential of techniques to improve the resilience of such applications to performance fluctuations in the cloud. In contrast to prior works that have studied the performance of individual cloud services or that of compute-intensive scientific applications...
Monitoring application performance over IT infrastructure is common practise for cloud providers, and is the foundation for ensuring the health of systems and quality of service for users. However, with the architecture of cloud computing allowing the allocation and provision of resources to be set at several layers, the scope for potential performance issues is increased and as a result increases...
We propose a method for estimating the locations of the causes of failure or deterioration in quality in the service function chains (SFCs) of datacenter networks by using tests packets. Our method is especially effective in service-quality deterioration where no alarms are notified from physical and virtual components. This method models SFC configurations by creating a correlation ID, which identifies...
Identification of VMs exhibiting similar behavior can improve scalability in monitoring and management of cloud data centers. Existing solutions for automatic VM clustering may be either very accurate, at the price of a high computational cost, or able to provide fast results with limited accuracy. Furthermore, the performance of most solutions may change significantly depending on the specific values...
Monitoring traffics between applictions deployed in a distributed computing system (DCS) can help analyzers perceive the dynamic load of each application, and detect the anomalies in all the running processes. However, due to the factors of high dimension and strong periodicity, the traffic data is difficult to visualize and interpret. In this paper, we propose a traffic monitoring approach based...
The adaptation of a cloud infrastructure is an ongoing process. Cloud adaptation aims to provide the cloud infrastructure with the necessary computational resources to meet the agreed SLAs and, simultaneously, optimize the resources usage. In a cloud, the consumers are typically limited to the SLAs defined in advance with the cloud service provider. This creates a strong dependence in the cloud provider,...
In this paper, we describe the SHõWA framework and evaluate its ability to recover from performance anomalies in Web-based applications. SHõWA is meant to automatically detect and recover from performance anomalies, without calling for human intervention. It does not require manual changes to the application source code or previous knowledge about its implementation details. The application is monitored...
The availability of network communications may be affected or even disrupted by malicious actions or by unexpected usage conditions. The good health of systems connected to the network (or lack thereof) may also reflect on network usage patterns. In order to maintain proper functionality for a significantly large network domain, automated or semi-automated methods of anomaly detection are required...
Security issues like service misuse and fraud are well-known problems of SIP-based networks. To develop effective countermeasures, it is important to know how these attacks are launched in reality. For gathering the required data, a specialized SIP Honeynet System has been running since January 2009 and has recorded over 58 million SIP messages. The analyses have shown that SIP-based misuse is typically...
In this work, we address problem determination in virtualized clouds. We show that high dynamism, resource sharing, frequent reconfiguration, high propensity to faults and automated management introduce significant new challenges towards fault diagnosis in clouds. Towards this, we propose CloudPD, a fault management framework for clouds. CloudPD leverages (i) a canonical representation of the operating...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.