2009
DOI: 10.1007/978-0-387-88775-3_14
|View full text |Cite
|
Sign up to set email alerts
|

Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework

Abstract: This is the accepted version of the paper.This version of the publication may differ from the final published version. Abstract The SERENITY monitoring framework offers mechanisms for diagnosing the causes of violations of security and dependability (S&D) properties and detecting potential violations of such properties, called "threats". Diagnostic information and threat detection are often necessary for deciding what an appropriate reaction to a violation is and taking pre-emptive actions against predicted vi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2009
2009
2013
2013

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…Early versions of our event assessment approach have been presented in [39][40] [41]. The main contributions of this paper with respect to our earlier work are related to:…”
Section: Figure 1 Location Based Access Control System (Lbacs)mentioning
confidence: 99%
“…Early versions of our event assessment approach have been presented in [39][40] [41]. The main contributions of this paper with respect to our earlier work are related to:…”
Section: Figure 1 Location Based Access Control System (Lbacs)mentioning
confidence: 99%
“…EVEREST has been used for monitoring different types of properties of software systems including functional security and dependability properties [15]. It has also been applied for monitoring SLA guarantee terms for service-based systems [9].…”
Section: Background: the Everest Monitoring Frameworkmentioning
confidence: 99%
“…This work has focused on prediction related to different types of properties including, for example, software systems failures [13], system dependability [4], security [15], and parameters of system infrastructures such as server workloads, CPU loads, and network throughput [3] [6]. Related techniques have been based on wide spectrum of prediction algorithms ranging from time series analysis [2] to mean-value prediction techniques [3] or belief-based reasoning [8].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation