Detection of Changes in Group of Services in SOA System by Learning Algorithms

作者: Ilona Bluemke , Marcin Tarka

DOI: 10.1007/978-3-319-10383-9_20

关键词:

摘要: The objective of this chapter is to present the detection some anomalies in SOA system by learning algorithms. Special model was designed and implemented for experimental purpose. In systems several were introduced. one them i.e. changes frequency a group services presented. Three algorithms: Kohonen network, emerging patterns k-means clustering used detector. effectiveness algorithms detecting anomaly measured. results experiments may be select an efficient algorithm anomaly.

参考文章(22)
Debra Anderson, Thane Frivold, Alfonso Valdes, Next-generation Intrusion Detection Expert System (NIDES)A Summary ,(1997)
Mark Watson, Neural Network Library Springer, New York, NY. pp. 89- 139 ,(1996) , 10.1007/978-1-4612-2394-8_6
Hanley Ja, Receiver operating characteristic (ROC) methodology: the state of the art. Critical Reviews in Diagnostic Imaging. ,vol. 29, pp. 307- 335 ,(1989)
Aaron Schwartzbard, Anup K. Ghosh, A study in using neural networks for anomaly and misuse detection usenix security symposium. pp. 12- 12 ,(1999)
Ilona Bluemke, Marcin Tarka, Detection of Anomalies in a SOA System by Learning Algorithms Springer, Berlin, Heidelberg. pp. 69- 85 ,(2013) , 10.1007/978-3-642-30662-4_5
Wenke Lee, Salvatore J. Stolfo, Data mining approaches for intrusion detection usenix security symposium. pp. 6- 6 ,(1998) , 10.21236/ADA401496
Mark Borning, Roland Büschkes, Dogan Kesdogan, Transaction-based Anomaly Detection ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1. pp. 129- 140 ,(1999)
Michelangelo Ceci, Annalisa Appice, Costantina Caruso, Donato Malerba, Discovering emerging patterns for anomaly detection in network connection data international syposium on methodologies for intelligent systems. pp. 179- 188 ,(2008) , 10.1007/978-3-540-68123-6_20
Nong Ye, Qiang Chen, An anomaly detection technique based on a chi‐square statistic for detecting intrusions into information systems Quality and Reliability Engineering International. ,vol. 17, pp. 105- 112 ,(2001) , 10.1002/QRE.392
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou, Specification-based anomaly detection Proceedings of the 9th ACM conference on Computer and communications security - CCS '02. pp. 265- 274 ,(2002) , 10.1145/586110.586146