2020
DOI: 10.1016/j.procs.2020.09.094
|View full text |Cite
|
Sign up to set email alerts
|

SCoRMiner: Automated Discovery of Network Service and Application Dependencies using a graph mining approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…However, studies [33], [34], [35], [36] seek solutions to the same problem presented in our study. Among these solutions, [36] is notable for containing a fundamental definition of software components, in which a component is equivalent to a mono-functional service with a set of dependencies on other components.…”
Section: B a Walkthrough Of The Dependency Management Mechanismsmentioning
confidence: 88%
See 2 more Smart Citations
“…However, studies [33], [34], [35], [36] seek solutions to the same problem presented in our study. Among these solutions, [36] is notable for containing a fundamental definition of software components, in which a component is equivalent to a mono-functional service with a set of dependencies on other components.…”
Section: B a Walkthrough Of The Dependency Management Mechanismsmentioning
confidence: 88%
“…A promising approach would be automatic parsing and wrapping mechanisms allowing for adapting and standardizing legacy packages, such as in [52]. Second, developer-declarative inter-software dependency potentially poses a threat when increasing the number of authorized services; thus, Fenrir will require some statistical model allowing potential failures that might be unnoticed in the development phase to be traced and detected [33]. Finally, we still need to work on adapting Fenrir for shared driving services and collaborative fleet management services, whose dynamicity may represent a problem for the system security, as well as for large multimedia files that could slow down system performance considerably, effectively blocking the blockchain agent.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Lange et al [9] used the time series-based analysis of network traffic to detect dependencies of network services. The topic became of utmost importance in cloud management, and thus, the SCoRMiner was proposed by Slimani et al [10] to detect dependencies between cloud services using both network traces and application-level data and graph mining.…”
Section: Related Workmentioning
confidence: 99%
“…The motivation is often network configuration management, e.g., analysis of potential impacts in case of failures, performance issues, and malicious attacks [4], [5], [1]. The previous research revealed dependencies using passively monitored network traffic [6], active approach [7], system logs instead of network traces [8], and applying time series or graph mining [9], [10]. Even though it provided valuable results, it focused on specific input data, had some limitations, or revealed only specific types of dependencies.…”
Section: Introductionmentioning
confidence: 99%