WiP: Behavior-based Service Change Detection

被引:1
|
作者
Jahl, Alexander [1 ]
Huu Tam Tran [1 ]
Baraki, Harun [1 ]
Geihs, Kurt [1 ]
机构
[1] Univ Kassel, Distributed Syst Grp, Kassel, Germany
关键词
Service Evolution; Change Detection; Machine Learning; Anomaly Detection;
D O I
10.1109/SMARTCOMP.2018.00053
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Detecting changes in service interfaces during the application life-cycle is essential for both change analysis and change management. Current approaches focus on structural and semantic changes without considering the actual behavior of a service by inspecting input and output values. This can lead to a selection of unsuitable services during an autonomous service replacement. Although a semantic and structural matching could be successful, the behavior of the selected service could deviate from the replaced service significantly. In this work, we present an architecture that captures and assesses additionally the behavior dimension of services to provide more reliable service replacements.
引用
收藏
页码:267 / 269
页数:3
相关论文
共 50 条
  • [31] Advanced Intrusion Detection Combining Signature-Based and Behavior-Based Detection Methods
    Kwon, Hee-Yong
    Kim, Taesic
    Lee, Mun-Kyu
    ELECTRONICS, 2022, 11 (06)
  • [32] An Intelligent Behavior-Based Ransomware Detection System For Android Platform
    Alzahrani, Abdulrahman
    Alshahrani, Hani
    Alshehri, Ali
    Fu, Huirong
    2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, : 28 - 35
  • [33] RESEARCH ON BEHAVIOR-BASED DETECTION METHOD FOR MOBILE APPLICATION SECURITY
    Chen Jianmin
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 240 - 243
  • [34] A Behavior-based Intrusion Detection Technique for Smart Grid Infrastructure
    Kwon, YooJin
    Kim, Huy Kang
    Lim, Yong Hun
    Lim, Jong In
    2015 IEEE EINDHOVEN POWERTECH, 2015,
  • [35] A Design of Network Behavior-Based Malware Detection System for Android
    Qi, Yincheng
    Cao, Mingjing
    Zhang, Can
    Wu, Ruping
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2014, PT II, 2014, 8631 : 590 - 600
  • [36] Direct vs Indirect Methods for Behavior-based Attack Detection
    Gadginmath, Darshan
    Krishnan, Vishaal
    Pasqualetti, Fabio
    2022 IEEE 61ST CONFERENCE ON DECISION AND CONTROL (CDC), 2022, : 7090 - 7096
  • [37] A BEHAVIOR-BASED CROSS-SITE SCRIPTING DETECTION TECHNIQUE
    Wang Liang
    Wang Xiuting
    2011 INTERNATIONAL CONFERENCE ON COMPUTER AND COMPUTATIONAL INTELLIGENCE (ICCCI 2011), 2012, : 519 - 523
  • [38] Behavior-Based Pricing in On-Demand Service Platforms With Network Effects
    Chen, Mingyang
    Gong, Yeming
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2023, 71 : 4160 - 4174
  • [39] Behavior-Based Telecom Tariff Service Design with Neural Network Approach
    Zhang, Yongbin
    Liang, Ronghua
    Li, Yeli
    2011 ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE (APPEEC), 2011,
  • [40] Behavior-based model of detection and prevention of intrusions in computer networks
    Serdiouk, V
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 380 - 393