Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework

نویسندگان

  • Theocharis Tsigkritis
  • George Spanoudakis
  • Christos Kloukinas
  • Davide Lorenzoli
چکیده

In addition to the basic monitoring capabilities that have been described in Chapter 13, the SERENITY monitoring framework offers mechanisms for diagnosing the reasons that have caused the violation of security and dependability (S&D) properties and detecting potential violations of such properties, called “threats”. Diagnostic information and threat detection are often necessary for deciding what would be an appropriate reaction to a violation and taking preemptive actions that could stop the predicted violation, respectively. In this chapter, we describe the mechanisms of the SERENITY monitoring framework which are used to generate diagnostic information for violations of monitoring rules that express S&D properties within S&D Patterns, and predict potential violations of such properties. Theocharis Tsigkritis Dept. of Computing, City University, Northampton Square, London, EC1V 0HB, e-mail: [email protected] George Spanoudakis Dept. of Computing, City University, Northampton Square, London, EC1V 0HB, e-mail: [email protected] Christos Kloukinas Dept. of Computing, City University, Northampton Square, London, EC1V 0HB, e-mail: [email protected] Davide Lorenzoli Dept. of Computing, City University, Northampton Square, London, EC1V 0HB, e-mail: [email protected] 14.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Runtime Monitoring Framework of SERENITY

This chapter describes SERENITY’s approach to runtime monitoring and the framework that has been developed to support it. Runtime monitoring is required in SERENITY in order to check for violations of security and dependability properties which are necessary for the correct operation of the security and dependability solutions that are available from the SERENITY framework. This chapter discuss...

متن کامل

Online Monitoring and Fault Diagnosis of Multivariate-attribute Process Mean Using Neural Networks and Discriminant Analysis Technique

In some statistical process control applications, the process data are not Normally distributed and characterized by the combination of both variable and attributes quality characteristics. Despite different methods which are proposed separately for monitoring multivariate and multi-attribute processes, only few methods are available in the literature for monitoring multivariate-attribute proce...

متن کامل

ارائه مدلی جهت استفاده ازعاملهای متحرک در سیستم های تشخیص نفوذ توزیع شده مبتنی بر تئوری بازی

The proposed framework applies two game theoretic models for economic deployment of intrusion detection system (IDS). The first scheme models and analyzes the interaction behaviors of between an attacker and intrusion detection agent within a non-cooperative game, and then the security risk value is derived from the mixed strategy Nash equilibrium. The second scheme uses the security risk value...

متن کامل

Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals

Insider threat is a great challenge for most organizations in today’s digital world. It has received substantial research attention as a significant source of information security threat that could cause more financial losses and damages than any other threats. However, designing an effective monitoring and detection framework is a very challenging task. In this paper, we examine the use of hum...

متن کامل

Stator Turn-to-Turn Fault Detection of Induction Motor by Non-Invasive Method Using Generalized Regression Neural Network

Condition monitoring and protection methods based on the analysis of the machine's current are widely used according to non-invasive characteristics of current transformers. It should be noted that, these sensors are installed by default in the machine control center. On the other hand, condition monitoring based on mathematical methods has been proposed in literature. However, they are model b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009