Two effective anomaly correction methods in embedded systems

Roghayeh Mojarad, H. Zarandi
{"title":"Two effective anomaly correction methods in embedded systems","authors":"Roghayeh Mojarad, H. Zarandi","doi":"10.1109/RTEST.2015.7369849","DOIUrl":null,"url":null,"abstract":"In this paper, two anomaly correction methods are proposed which are based on Markov and Stide detection methods. Both methods consist of three steps: 1) Training, 2) Anomaly detection and 3) Anomaly Correction. In training step, the Morkov-based method constructs a transition matrix; Stidebased method makes a database by events with their frequency. In detection step, when the probability of transition from previous event to current event does not reach a predefined threshold, the morkov-based method detects an anomaly. While, if frequency of unmatched events exceeds from the threshold value, Stide-based method determined an anomaly. In the correction step, the methods check the defined constraints for each anomalous event to find source of anomaly and a suitable way to correct the anomalous event. Evaluation of the proposed methods are done using a total of 7000 data sets. The window size of corrector and the number of injected anomalies varied between 3 and 5, 1 and 7, respectively. The experiments have been done to measure the correction coverage rate for Markov-based and Stide-based methods which are on average 77.66% and 60.9%, respectively. Area consumptions in Makov-based and Stide-based methods are on average 415.48μm2 and 239.61μm2, respectively.","PeriodicalId":376270,"journal":{"name":"2015 CSI Symposium on Real-Time and Embedded Systems and Technologies (RTEST)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 CSI Symposium on Real-Time and Embedded Systems and Technologies (RTEST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RTEST.2015.7369849","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

In this paper, two anomaly correction methods are proposed which are based on Markov and Stide detection methods. Both methods consist of three steps: 1) Training, 2) Anomaly detection and 3) Anomaly Correction. In training step, the Morkov-based method constructs a transition matrix; Stidebased method makes a database by events with their frequency. In detection step, when the probability of transition from previous event to current event does not reach a predefined threshold, the morkov-based method detects an anomaly. While, if frequency of unmatched events exceeds from the threshold value, Stide-based method determined an anomaly. In the correction step, the methods check the defined constraints for each anomalous event to find source of anomaly and a suitable way to correct the anomalous event. Evaluation of the proposed methods are done using a total of 7000 data sets. The window size of corrector and the number of injected anomalies varied between 3 and 5, 1 and 7, respectively. The experiments have been done to measure the correction coverage rate for Markov-based and Stide-based methods which are on average 77.66% and 60.9%, respectively. Area consumptions in Makov-based and Stide-based methods are on average 415.48μm2 and 239.61μm2, respectively.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
嵌入式系统中两种有效的异常校正方法
本文提出了两种基于马尔可夫和斯蒂德检测的异常校正方法。两种方法都包括三个步骤:1)训练,2)异常检测,3)异常校正。在训练步骤中,基于morkov的方法构造一个转移矩阵;基于频率的方法根据事件的频率创建数据库。在检测步骤中,当从先前事件到当前事件的转换概率未达到预定义的阈值时,基于morkov的方法检测异常。而如果不匹配事件的频率超过阈值,则基于stide的方法确定异常。在校正步骤中,对每个异常事件的约束条件进行检查,找出异常的来源和合适的方法来校正异常事件。使用总共7000个数据集对所提出的方法进行了评估。校正器的窗口大小和注入异常数量分别在3 ~ 5、1 ~ 7之间变化。实验测量了基于markov和stide方法的校正覆盖率,平均校正覆盖率分别为77.66%和60.9%。基于makov法和基于stide法的面积消耗平均分别为415.48μm2和239.61μm2。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Stretch: exploiting service level degradation for energy management in mixed-criticality systems Fault-tolerant architecture and CAD algorithm for field-programmable pin-constrained digital microfluidic biochips A partial task replication algorithm for fault- tolerant FPGA-based soft-multiprocessors Two effective anomaly correction methods in embedded systems A2CM2: aging-aware cache memory management technique
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1