16th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing (ISORC 2013) 2013
DOI: 10.1109/isorc.2013.6913240
|View full text |Cite
|
Sign up to set email alerts
|

A framework for enhancing dependability in self-x systems by Artificial Immune Systems

Abstract: In self-adapting embedded real-time systems, operating systems and software provide mechanisms to self-adapt to changing requirements. Autonomous adaptation decisions introduce novel risks as they may lead to unforeseen system behavior that could not have been specified within a design-time model. However, as part of its functionality the operating system has to ensure the reliability of the entire self-x system during run-time.In this paper, we present our work in progress for an operating system framework wh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 27 publications
0
9
0
Order By: Relevance
“…In our previous work, the basic idea of our anomaly detection framework was introduced in detail and will be presented in short here. The anomaly detection framework has been inspired by the Danger Theory that has actually attracted great attention for anomaly detection techniques as it offers new potentials in terms of adaptivity and learning.…”
Section: Anomaly Detection Frameworkmentioning
confidence: 99%
“…In our previous work, the basic idea of our anomaly detection framework was introduced in detail and will be presented in short here. The anomaly detection framework has been inspired by the Danger Theory that has actually attracted great attention for anomaly detection techniques as it offers new potentials in terms of adaptivity and learning.…”
Section: Anomaly Detection Frameworkmentioning
confidence: 99%
“…The basic idea of our anomaly detection framework has been introduced in [23]. For integrating anomaly detection as a service of the operating system, the underlaying operating system has been extended by components that are responsible for monitoring, analysis and evaluation, and controlling.…”
Section: Anomaly Detection Frameworkmentioning
confidence: 99%
“…a sequence P 4 = EEEEE consisting of 5 consecutive calls of the same system call E may lead to an overallocation of the resources used by that system call. Furthermore, referring to the anomaly detection framework proposed in [23], observed behavioral patterns are evaluated online and can be classified as malicious in correlation with a certain density of so called PAMP Signals (standing for Pathogen-Associated-Molecular-Pattern) or Danger Signals. Such patterns indicating dangerous behavior need also to be stored in a knowledge base in order to enhance future identification of known dangers.…”
Section: B Knowledge Base Propertiesmentioning
confidence: 99%
See 2 more Smart Citations