The SERENITY Runtime Monitoring Framework

作者: George Spanoudakis , Christos Kloukinas , Khaled Mahbub

DOI: 10.1007/978-0-387-88775-3_13

关键词: Order (business)Truth valueReal-time computingDependabilitySoftware engineeringComputer scienceAmbient intelligenceIntrusion detection systemProperty (programming)

摘要: This chapter describes SERENITY’s approach to runtime monitoring and the framework that has been developed support it. Runtime is required in SERENITY order check for violations of security dependability properties which are necessary correct operation solutions available from framework. discusses how such specified monitored. The focuses on activation execution activities using S&D Patterns actions may be undertaken following detection property violations. demonstrated reference one industrial case studies project.

参考文章(26)
Georgios Androulidakis, Basil S. Maglaris, Mary Grammatikou, Vasilis Chatzigiannakis, An Architectural Framework for Distributed Intrusion Detection Using Smart Agents. Security and Management. pp. 193- 199 ,(2004)
Stuart Staniford-Chen, Brian Tung, Clifford Kahn, Phil Porras, Maureen Stillman, Rich Feiertag, Dan Schnackenberg, The Common Intrusion Detection Framework - Data Formats ,(1998)
Stephen E. Hansen, E. Todd Atkins, Automated System Monitoring and Notification With Swatch usenix large installation systems administration conference. pp. 145- 152 ,(1993)
Álvaro Armenteros, Laura García, Antonio Muñoz, Antonio Maña, Realising the Potential of Serenity in Emerging AmI Ecosystems:Implications and Challenges Security and Dependability for Ambient Intelligence. ,vol. 45, pp. 323- 342 ,(2009) , 10.1007/978-0-387-88775-3_18
Howard Barringer, Dov Gabbay, David Rydeheard, From runtime verification to evolvable systems runtime verification. pp. 97- 110 ,(2007) , 10.1007/978-3-540-77395-5_9
Khaled Mahbub, George Spanoudakis, Monitoring WS-Agreement s: An Event Calculus–Based Approach Test and Analysis of Web Services. pp. 265- 306 ,(2007) , 10.1007/978-3-540-72912-9_10
Vladimir Gudkov, Joseph E. Johnson, Multidimensional Network Monitoring for Intrusion Detection arXiv: Cryptography and Security. pp. 291- 302 ,(2008) , 10.1007/978-3-540-73849-7_33
Luciano Baresi, Sam Guinea, Dynamo: Dynamic Monitoring of WS-BPEL Processes Service-Oriented Computing – ICSOC 2007. ,vol. 3826, pp. 478- 483 ,(2005) , 10.1007/11596141_36
Theocharis Tsigkritis, George Spanoudakis, Christos Kloukinas, Davide Lorenzoli, Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework ambient intelligence. ,vol. 45, pp. 239- 271 ,(2009) , 10.1007/978-0-387-88775-3_14