Proceedings of the First Joint WOSP/SIPEW International Conference on Performance Engineering 2010
DOI: 10.1145/1712605.1712621
|View full text |Cite
|
Sign up to set email alerts
|

Workload-intensity-sensitive timing behavior analysis for distributed multi-user software systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…A complex application may behave more diversely if it is considered as a whole entity, however, considering different legitimate paths can result in more accurate analysis. Although the current profiling literature – which is more concerned with the distribution of task response‐times – looks coarse‐grained for security related attack detection, however, some statistical ideas exist for profiling multi‐modal timing behaviour [65] or workload‐sensitive [66] software can be mapped for modelling complex software with multiple menu options and behaviours. Another difficulty in mapping noted topics is that the source code is not available when working with commodity software.…”
Section: Discussionmentioning
confidence: 99%
“…A complex application may behave more diversely if it is considered as a whole entity, however, considering different legitimate paths can result in more accurate analysis. Although the current profiling literature – which is more concerned with the distribution of task response‐times – looks coarse‐grained for security related attack detection, however, some statistical ideas exist for profiling multi‐modal timing behaviour [65] or workload‐sensitive [66] software can be mapped for modelling complex software with multiple menu options and behaviours. Another difficulty in mapping noted topics is that the source code is not available when working with commodity software.…”
Section: Discussionmentioning
confidence: 99%
“…In this paper, we apply the model introduced in [1] to the performance analysis of denial of service attacks in multi-server systems. Security implications of [1] have been briefly pointed out by [35]. In this work, we take a step further, studying how the mean and standard deviation of response times may impact decisions related to the setup of service infrastructures.…”
Section: A Multi-server Queues and Optimal Number Of Serversmentioning
confidence: 97%
“…6. The access pattern of our object system was modeled after a real web application access pattern which is detailed in [11].…”
Section: Workloadmentioning
confidence: 99%