2013
DOI: 10.1007/978-3-642-30662-4_5
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Anomalies in a SOA System by Learning Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…The results presented in this paper and in [29] show that in anomalies detection in SOA systems different algorithms may appear most suitable for different type of anomaly so further research should be conducted. The exemplary SOA system (section 2) enables to conduct other experiments examining the suitability of learning algorithms in the detection of other anomalies.…”
Section: Discussionmentioning
confidence: 89%
See 3 more Smart Citations
“…The results presented in this paper and in [29] show that in anomalies detection in SOA systems different algorithms may appear most suitable for different type of anomaly so further research should be conducted. The exemplary SOA system (section 2) enables to conduct other experiments examining the suitability of learning algorithms in the detection of other anomalies.…”
Section: Discussionmentioning
confidence: 89%
“…In [29] the results of detecting other anomaly -the change in frequencies of service calls was described. The least accurate in the detection of this kind of anomaly was the k-means clustering algorithm and the best was emerging pattern algorithm.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Focusing on Unknowns. In addition to the surveyed works, we refer to the context-aware studies in [47], [48] to evaluate the ability of MADneSs to detect manifestation of unknowns, either due to undiscovered faults or zero day attacks. In [47] authors use a contextual misuse detector combined with a neighbour-based algorithm to detect zero-day cyber-attacks in static systems.…”
Section: Comparison With Respect To Other Frameworkmentioning
confidence: 99%