The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Increasingly, the application providers are using a separate fault management system that offers out-of-the-box monitoring and alarms support for application instances. A fault management system is usually distributed in nature and consists of a set of management components that does both fault detection and can trigger actions, for example, automatic restart of monitored components. Such a distributed...
This paper introduces an approach that handleswith the trustworthy cloud service selection issue in Cloudcomputing environments. Despite the fact that most of theexisting trust systems consider several QoS attributes for trustcomputing, none of them did consider the correlation that mayexist among these attributes. However, we demonstrate in thispaper that the integration of correlation between QoS...
False and nuisance alarms are major problems in the process industry. Generalized delay-timer is an effective technique to improve the performance of an alarm system. However, due to the increasing intermediate states, computation of the performance indices, false alarm rate (FAR), missed alarm rate (MAR) and expected detection delay (EDD), is hard and unsolved for generalized delay-timer. In this...
Given service logs of who used what service, and when, how can we find intrusions and anomalies? In this paper, a cyber threat detection framework - ChainSpot was proposed, in which the novelty is to build graphical patterns by summarizing user's sequential behaviors of using application-layer services, and to discover deviations against one's normal patterns. Besides modeling, the issue of justifying...
What you see is not definitely believable is not a rare case in the cyber security monitoring. However, due to various tricks of camouflages, such as packing or virutal private network (VPN), detecting "advanced persistent threat"(APT) by only signature based malware detection system becomes more and more intractable. On the other hand, by carefully modeling users' subsequent behaviors of...
As modern computer systems become increasingly complex in infrastructure and usage, the demand for capabilities of detecting anomalous behavior has grown urgent. Although techniques for point anomaly detection have been proposed and adopted in practice, behavior anomaly detection still lacks effective approaches due to its inherent complexities. We present a new anomalous behavior detection model...
The framework of empirical evidence equilibrium (EEE) for stochastic games is developed in this paper. In a stochastic game, agents collectively influence the dynamic of the environment. In standard equilibria, each agent's strategy is optimal with respect to its opponents' strategies. Therefore, each strategy is the solution to a partially observable Markov decision process (POMDP). The following...
Monitoring and predicting resource consumption is a fundamental need when running a virtualized system. Predicting resources is necessary because cloud infrastructures use virtual resources on demand. Current monitoring tools are insufficient to predict resource usage of virtualized systems so, without proper monitoring, virtualized systems can suffer down time, which can directly affect cloud infrastructure...
The need to monitor and analyse network traffic grows with the deployment of new multimedia services over high speed networks. Predicting the overall capturing performance is crucial to know if the traffic monitoring system will be able to cope with all the traffic packets, or if it needs more processing power. In this paper, we present an analytical model based on a Markov chain to study the efficiency...
In Usage CONtrol (UCON) access decisions rely on mutable attributes. A reference monitor should re-evaluate security policies each time when attributes change their values. Catching timely all attribute changes is a challenging issue, especially if the attribute provider and the reference monitor reside in different security domains. Some attribute changes might be missed, corrupted, and delayed....
Sliding-window multi-stream join (SWMJ) is a fundamental operation for correlating information from different streams. We provide a solution to the problem of assessing significance of the SWMJ result by focusing on the relative frequency of windows satisfying a given equijoin predicate as the most important parameter of the SWMJ result. In particular, we derive an analytic formula for computing the...
Modern software applications increasingly live in an open world, characterized by continuous change in the environment in which they are situated and in the requirements they have to meet. Continuous changes occur autonomously and unpredictably, in a way that can hardly be predicted (and taken care of) by software engineers, as the application is designed. As a consequence, changes are out of control...
MANET is highly vulnerable to be attacked because of its special structure. Security measures, such as authentication and encryption, can be used for reducing the possibilities of attacks. But they are far from sufficiency. Intrusion detection is the second mechanism to detect the attacks. Anomaly IDS can be used to detect the abnormal behaviors of the network to find some unknown attacking patterns...
Wireless ad hoc network is highly vulnerable to malicious attacks because of its special characteristics. Attack prevention measures, such as authentication and encryption, can be used as the first line of defense for reducing the possibilities of attacks. Intrusion detection is the second mechanism to detect and response the attacks, especially those newer ones. This paper proposed an anomaly intrusion...
Businesses today are becoming increasingly dependent on information technology (IT) to meet business-critical demands. The more available a computer system is, the more value it can provide to its users. In many cases high availability (HA) requirement becomes as critical as high performance. Cluster computing has been attracting more and more attention from both the industrial and the academic world...
This paper evaluate and estimate the monitoring of the network traffic based on queuing theory in heterogeneous environment the monitoring of network traffic is necessary for evaluating of efficiency and confidence from constant operations of network which we discuss the performance and prediction of network traffic management and will give a suggestion for control the performance of work traffic...
Peer-to-peer storage systems aim to provide a reliable long-term storage at low cost. In such systems, peers fail continuously, hence, the necessity of self-repairing mechanisms to achieve high durability. In this paper, we propose and study analytical models that assess the bandwidth consumption and the probability to lose data of storage systems that use erasure coded redundancy. We show by simulations...
Wide-area surveillance requires a system of multiple cameras that are sparsely distributed without overlapping fields of view. Tracking objects in such a setting is challenging because blind gaps between disjoint camera views cannot ensure spatial, temporal, and visual continuity in successive observations. We propose an association algorithm for tracking an unknown number of objects with sparsely...
With the growing complexity in computer systems, it has been a real challenge to detect and diagnose problems in today's large-scale distributed systems. Usually, the correlations between measurements collected across the distributed system contain rich information about the system behaviors, and thus a reasonable model to describe such correlations is crucially important in detecting and locating...
The paper has shown how the Markov decision process framework can be used for sensor coordination. This method is suitable for networks of relatively few sensors and where the computational capabilities and energy reserves at each node are limited.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.