Timing behavior anomaly detection in enterprise information systems

被引:0
|
作者
Rohr, Matthias [1 ]
Giesecke, Simon [1 ]
Hasselbring, Wilhelm [1 ]
机构
[1] Carl von Ossietzky Univ Oldenburg, Grad Sch TrustSoft, Engn Grp, D-26111 Oldenburg, Germany
关键词
software measurement; software engineering; anomaly detection; failure diagnosis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Business-critical enterprise information systems (EIS) have to satisfy high availability requirements. In order to achieve the required availability, automatic failure detection and diagnosis techniques must be used. A major cause of failures in EIS are software faults in the application layer. In this paper, we propose to use anomaly detection to diagnose failures in the application layer of EIS. Anomaly detection aims to identify unusual system behavior in monitoring data. These anomalies can be valuable indicators for availability or security problems, and support failure diagnosis. In this paper we outline the basic principles of anomaly detection, present the state of the art, and typical application challenges. We outline a new approach for anomaly detection in Enterprise Information Systems that addresses some of these challenges.
引用
收藏
页码:494 / 497
页数:4
相关论文
共 50 条
  • [41] Anomaly Detection in Networks with Temporal Information
    Angiulli, Fabrizio
    Fassetti, Fabio
    Narvaez, Estela
    DISCOVERY SCIENCE, (DS 2016), 2016, 9956 : 359 - 375
  • [42] Anomaly detection in embedded systems
    Maxion, RA
    Tan, KMC
    IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (02) : 108 - 120
  • [43] Behavior-based Community Detection: Application to Host Assessment In Enterprise Information Networks
    Cao, Cheng
    Chen, Zhengzhang
    Caverlee, James
    Tang, Lu-An
    Luo, Chen
    Li, Zhichun
    CIKM'18: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2018, : 1977 - 1985
  • [44] A Real-time Detection Scheme of User Behavior Anomaly for Management Information System
    Sun, Xiaohan
    Yang, Guanghong
    Zhang, Jilan
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 1054 - 1058
  • [45] Anomaly behavior detection and reliability assessment of control systems based on association rules
    Jie, Xinchun
    Wang, Haikuan
    Fei, Minrui
    Du, Dajun
    Sun, Qing
    Yang, T. C.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 22 : 90 - 99
  • [46] Behavior-based Anomaly Detection for Securing Smart Home Systems Automation
    Amraoui, Noureddine
    Zouari, Belhassen
    2020 28TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2020, : 373 - 378
  • [47] Mining configurable enterprise information systems
    Jansen-Vullers, MH
    van der Aalst, WMP
    Rosemann, M
    DATA & KNOWLEDGE ENGINEERING, 2006, 56 (03) : 195 - 244
  • [48] An ontology for enterprise and information systems modelling
    Opdahl, Andreas L.
    Berio, Giuseppe
    Harzallah, Mounira
    Matulevicius, Raimundas
    APPLIED ONTOLOGY, 2012, 7 (01) : 49 - 92
  • [49] Managing complexity of enterprise information systems
    Maciaszek, Leszek A.
    Enterprise Information Systems VI, 2006, : 30 - 36
  • [50] Assessment of information systems for enterprise development
    Zagorna, T. O.
    Kolomyceva, A. O.
    MARKETING AND MANAGEMENT OF INNOVATIONS, 2011, (03): : 141 - 152