Invariants represent properties of a system that are expected to hold when everything goes well. Thus, the violation of an invariant most likely corresponds to the occurrence of an anomaly in the system. In this paper, we discuss the accuracy and the completeness of an anomaly detection system based on invariants. The case study we have taken is a back-end operation of a SaaS platform. Results show the rationality of the approach and discuss the impact of the invariant mining strategy on the detection capabilities, both in terms of accuracy and of time to reveal violations
It is notoriously hard to develop dependable distributed systems. This is partly due to the difficul...
In this work we approach the problem of deploying anomaly detection techniques for detecting cyber a...
Graduation date: 2008Web applications are popular attack targets. Misuse detection systems use signa...
Invariants represent properties of a system that are expected to hold when everything goes well. Thu...
The increasing popularity of Software as a Service (SaaS) stresses the need of solutions to predict ...
Invariants are stable relationships among system metrics expected to hold during normal operating co...
Much of the software we use for everyday purposes incorporates elements developed and maintained by ...
Likely system invariants model properties that hold in operating conditions of a computing system. I...
International audienceRRABIDS (Ruby on Rails Anomaly Based Intrusion Detection System) is an applica...
The quality of Web applications is everyday more important. Web applications are crucial vehicles fo...
The quality of Web applications is everyday more important. Web applications are crucial vehicles fo...
Invariants monitoring is a software attestation technique that aims at proving the integrity of a ru...
This paper will show how the accuracy and security of SCADA systems can be improved by using anomaly...
In the research area of anomaly detection, novel and promising methods are frequently developed. How...
Revealing anomalies in data usually suggest significant - also critical - actionable information in ...
It is notoriously hard to develop dependable distributed systems. This is partly due to the difficul...
In this work we approach the problem of deploying anomaly detection techniques for detecting cyber a...
Graduation date: 2008Web applications are popular attack targets. Misuse detection systems use signa...
Invariants represent properties of a system that are expected to hold when everything goes well. Thu...
The increasing popularity of Software as a Service (SaaS) stresses the need of solutions to predict ...
Invariants are stable relationships among system metrics expected to hold during normal operating co...
Much of the software we use for everyday purposes incorporates elements developed and maintained by ...
Likely system invariants model properties that hold in operating conditions of a computing system. I...
International audienceRRABIDS (Ruby on Rails Anomaly Based Intrusion Detection System) is an applica...
The quality of Web applications is everyday more important. Web applications are crucial vehicles fo...
The quality of Web applications is everyday more important. Web applications are crucial vehicles fo...
Invariants monitoring is a software attestation technique that aims at proving the integrity of a ru...
This paper will show how the accuracy and security of SCADA systems can be improved by using anomaly...
In the research area of anomaly detection, novel and promising methods are frequently developed. How...
Revealing anomalies in data usually suggest significant - also critical - actionable information in ...
It is notoriously hard to develop dependable distributed systems. This is partly due to the difficul...
In this work we approach the problem of deploying anomaly detection techniques for detecting cyber a...
Graduation date: 2008Web applications are popular attack targets. Misuse detection systems use signa...