Timing behavior anomaly detection in enterprise information systems

被引:0
|
作者
Rohr, Matthias [1 ]
Giesecke, Simon [1 ]
Hasselbring, Wilhelm [1 ]
机构
[1] Carl von Ossietzky Univ Oldenburg, Grad Sch TrustSoft, Engn Grp, D-26111 Oldenburg, Germany
关键词
software measurement; software engineering; anomaly detection; failure diagnosis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Business-critical enterprise information systems (EIS) have to satisfy high availability requirements. In order to achieve the required availability, automatic failure detection and diagnosis techniques must be used. A major cause of failures in EIS are software faults in the application layer. In this paper, we propose to use anomaly detection to diagnose failures in the application layer of EIS. Anomaly detection aims to identify unusual system behavior in monitoring data. These anomalies can be valuable indicators for availability or security problems, and support failure diagnosis. In this paper we outline the basic principles of anomaly detection, present the state of the art, and typical application challenges. We outline a new approach for anomaly detection in Enterprise Information Systems that addresses some of these challenges.
引用
收藏
页码:494 / 497
页数:4
相关论文
共 50 条
  • [31] Automated Anomaly Detection and Performance Modeling of Enterprise Applications
    Cherkasova, Ludmila
    Ozonat, Kivanc
    Mi, Ningfang
    Symons, Julie
    Smirni, Evgenia
    ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2009, 27 (03):
  • [32] Blockchain Technologies in Enterprise Modeling and Enterprise Information Systems
    Fill, Hans-Georg
    Fettke, Peter
    Rinderle-Ma, Stefanie
    ENTERPRISE MODELLING AND INFORMATION SYSTEMS ARCHITECTURES-AN INTERNATIONAL JOURNAL, 2020, 15
  • [33] ONLINE UNSUPERVISED ANOMALY DETECTION IN LARGE INFORMATION SYSTEMS USING COPULA THEORY
    Huyot, Benoit
    Mabiala, Yves
    Marcotorchino, Jean-Francois
    2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems (CCIS), 2014, : 679 - 684
  • [34] Enterprise Architecture, Enterprise Information Systems and Enterprise Integration: A Review Based on Systems Theory Perspective
    Gorkhali, Anjee
    Da Xu, Li
    JOURNAL OF INDUSTRIAL INTEGRATION AND MANAGEMENT-INNOVATION AND ENTREPRENEURSHIP, 2019, 4 (02):
  • [35] Enterprise Information Systems, Volume 4 Issue 2 2010 Resilient Enterprise Information Systems foreword
    Zhang, W. J.
    ENTERPRISE INFORMATION SYSTEMS, 2010, 4 (02) : 95 - 97
  • [36] Anomaly Detection Method for Industrial IoT Timing Data
    Xie, Wei
    Lu, Shida
    Shi, Kuanzhi
    Wang, Honglan
    Gu, Rongbin
    Huang, Jun
    Li, Jing
    Computer Engineering and Applications, 2024, 60 (12) : 270 - 282
  • [37] Anomaly detection survey for information security
    Kaur, Harsurinder
    Pannu, Husanbir Singh
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 251 - +
  • [38] Timing-Based Anomaly Detection in SCADA Networks
    Lin, Chih-Yuan
    Nadjm-Tehrani, Simin
    Asplund, Mikael
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY (CRITIS 2017), 2018, 10707 : 48 - 59
  • [39] Mutual information applied to anomaly detection
    Kopylova, Yuliya
    Buell, Duncan A.
    Huang, Chin-Tser
    Janies, Jeff
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2008, 10 (01) : 89 - 97
  • [40] The Algorithm of Information System Anomaly Detection
    Gu, Ming
    2013 3RD INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, COMMUNICATIONS AND NETWORKS (CECNET), 2013, : 653 - 657