首页 > 最新文献

2009 IEEE/IFIP International Conference on Dependable Systems & Networks最新文献

英文 中文
Spam detection in voice-over-IP calls through semi-supervised clustering 基于半监督聚类的ip语音垃圾检测
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270323
Yu-Sung Wu, S. Bagchi, Navjot Singh, Ratsameetip Wita
In this paper, we present an approach for detection of spam calls over IP telephony called SPIT in VoIP systems. SPIT detection is different from spam detection in email in that the process has to be soft real-time, fewer features are available for examination due to the difficulty of mining voice traffic at runtime, and similarity in signaling traffic between legitimate and malicious callers. Our approach differs from existing work in its adaptability to new environments without the need for laborious and error-prone manual parameter configuration. We use clustering based on the call parameters, using optional user feedback for some calls, which they mark as SPIT or non-SPIT. We improve on a popular algorithm for semi-supervised learning, called MPCK-Means, to make it scalable to a large number of calls and operate at runtime. Our evaluation on captured call traces shows a fifteen fold reduction in computation time, with improvement in detection accuracy.
在本文中,我们提出了一种在VoIP系统中通过IP电话检测垃圾电话的方法。唾液检测与垃圾邮件检测的不同之处在于,该过程必须是软实时的,由于在运行时挖掘语音流量的困难,可用于检测的特征较少,并且合法和恶意呼叫者之间的信令流量相似。我们的方法与现有工作的不同之处在于它对新环境的适应性,而不需要费力且容易出错的手动参数配置。我们使用基于调用参数的聚类,对一些调用使用可选的用户反馈,他们将其标记为SPIT或非SPIT。我们改进了一种流行的半监督学习算法,称为MPCK-Means,使其可扩展到大量调用并在运行时运行。我们对捕获的调用跟踪的评估显示,计算时间减少了15倍,检测精度提高了。
{"title":"Spam detection in voice-over-IP calls through semi-supervised clustering","authors":"Yu-Sung Wu, S. Bagchi, Navjot Singh, Ratsameetip Wita","doi":"10.1109/DSN.2009.5270323","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270323","url":null,"abstract":"In this paper, we present an approach for detection of spam calls over IP telephony called SPIT in VoIP systems. SPIT detection is different from spam detection in email in that the process has to be soft real-time, fewer features are available for examination due to the difficulty of mining voice traffic at runtime, and similarity in signaling traffic between legitimate and malicious callers. Our approach differs from existing work in its adaptability to new environments without the need for laborious and error-prone manual parameter configuration. We use clustering based on the call parameters, using optional user feedback for some calls, which they mark as SPIT or non-SPIT. We improve on a popular algorithm for semi-supervised learning, called MPCK-Means, to make it scalable to a large number of calls and operate at runtime. Our evaluation on captured call traces shows a fifteen fold reduction in computation time, with improvement in detection accuracy.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116714192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Evaluating the impact of Undetected Disk Errors in RAID systems 评估未检测到的磁盘错误对RAID系统的影响
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270353
Eric Rozier, W. Belluomini, Veera Deenadhayalan, J. Hafner, K. K. Rao, Pin Zhou
Despite the reliability of modern disks, recent studies have made it clear that a new class of faults, UndetectedDisk Errors (UDEs) also known as silent data corruption events, become a real challenge as storage capacity scales. While RAID systems have proven effective in protecting data from traditional disk failures, silent data corruption events remain a significant problem unaddressed by RAID. We present a fault model for UDEs, and a hybrid framework for simulating UDEs in large-scale systems. The framework combines a multi-resolution discrete event simulator with numerical solvers. Our implementation enables us to model arbitrary storage systems and workloads and estimate the rate of undetected data corruptions. We present results for several systems and workloads, from gigascale to petascale. These results indicate that corruption from UDEs is a significant problem in the absence of protection schemes and that such schemes dramatically decrease the rate of undetected data corruption.
尽管现代磁盘的可靠性很高,但最近的研究清楚地表明,随着存储容量的扩大,一类新的故障,即未检测到的磁盘错误(UDEs),也称为静默数据损坏事件,成为了一个真正的挑战。虽然RAID系统已被证明在保护数据免受传统磁盘故障的影响方面是有效的,但数据损坏事件仍然是RAID无法解决的一个重要问题。我们提出了一种故障模型,并提出了一种混合框架来模拟大规模系统中的故障模型。该框架结合了多分辨率离散事件模拟器和数值求解器。我们的实现使我们能够对任意存储系统和工作负载建模,并估计未检测到的数据损坏率。我们给出了从千兆级到千兆级的几种系统和工作负载的结果。这些结果表明,在没有保护方案的情况下,数据损坏是一个严重的问题,这种方案大大降低了未检测到的数据损坏率。
{"title":"Evaluating the impact of Undetected Disk Errors in RAID systems","authors":"Eric Rozier, W. Belluomini, Veera Deenadhayalan, J. Hafner, K. K. Rao, Pin Zhou","doi":"10.1109/DSN.2009.5270353","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270353","url":null,"abstract":"Despite the reliability of modern disks, recent studies have made it clear that a new class of faults, UndetectedDisk Errors (UDEs) also known as silent data corruption events, become a real challenge as storage capacity scales. While RAID systems have proven effective in protecting data from traditional disk failures, silent data corruption events remain a significant problem unaddressed by RAID. We present a fault model for UDEs, and a hybrid framework for simulating UDEs in large-scale systems. The framework combines a multi-resolution discrete event simulator with numerical solvers. Our implementation enables us to model arbitrary storage systems and workloads and estimate the rate of undetected data corruptions. We present results for several systems and workloads, from gigascale to petascale. These results indicate that corruption from UDEs is a significant problem in the absence of protection schemes and that such schemes dramatically decrease the rate of undetected data corruption.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"32 3-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114045790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Fast memory state synchronization for virtualization-based fault tolerance 基于虚拟化容错的快速内存状态同步
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270295
Maohua Lu, T. Chiueh
migration and thus enables a new form of fault tolerance that is completely transparent to applications and operating systems. While initial prototypes show promise, virtualization-based fault-tolerant architecture still experiences substantial performance overhead especially for data-intensive workloads. The main performance challenge of virtualizationbased fault tolerance is how to synchronize the memory states of the Master and Slave in a way that minimizes the end-to-end impact on the application performance. This paper describes three optimization techniques for memory state synchronization: fine-grained dirty region identification, speculative state transfer, and synchronization traffic reduction using active slave, and presents a comprehensive performance study of these techniques under three realistic workloads, the TPC-E benchmark, the SPECsfs 2008 CIFS benchmark, and a Microsoft Exchange workload. We show that these three techniques can each reduce the amount of end-of-epoch synchronization traffic by a factor of up to 7, 15 and 5, respectively.
迁移,从而支持一种对应用程序和操作系统完全透明的新形式的容错。虽然最初的原型显示出了希望,但基于虚拟化的容错架构仍然有很大的性能开销,特别是对于数据密集型工作负载。基于虚拟化的容错的主要性能挑战是如何以最小化对应用程序性能的端到端影响的方式同步主服务器和从服务器的内存状态。本文描述了内存状态同步的三种优化技术:细粒度脏区域识别、推测状态传输和使用主动slave减少同步流量,并在三种实际工作负载(TPC-E基准测试、SPECsfs 2008 CIFS基准测试和Microsoft Exchange工作负载)下对这些技术进行了全面的性能研究。我们表明,这三种技术分别可以将历元结束同步通信量减少多达7、15和5倍。
{"title":"Fast memory state synchronization for virtualization-based fault tolerance","authors":"Maohua Lu, T. Chiueh","doi":"10.1109/DSN.2009.5270295","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270295","url":null,"abstract":"migration and thus enables a new form of fault tolerance that is completely transparent to applications and operating systems. While initial prototypes show promise, virtualization-based fault-tolerant architecture still experiences substantial performance overhead especially for data-intensive workloads. The main performance challenge of virtualizationbased fault tolerance is how to synchronize the memory states of the Master and Slave in a way that minimizes the end-to-end impact on the application performance. This paper describes three optimization techniques for memory state synchronization: fine-grained dirty region identification, speculative state transfer, and synchronization traffic reduction using active slave, and presents a comprehensive performance study of these techniques under three realistic workloads, the TPC-E benchmark, the SPECsfs 2008 CIFS benchmark, and a Microsoft Exchange workload. We show that these three techniques can each reduce the amount of end-of-epoch synchronization traffic by a factor of up to 7, 15 and 5, respectively.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115748650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Fault isolation for device drivers 设备驱动程序的故障隔离
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270357
J. Herder, H. Bos, Ben Gras, P. Homburg, A. Tanenbaum
This work explores the principles and practice of isolating low-level device drivers in order to improve OS dependability. In particular, we explore the operations drivers can perform and how fault propagation in the event a bug is triggered can be prevented. We have prototyped our ideas in an open-source multiserver OS (MINIX 3) that isolates drivers by strictly enforcing least authority and iteratively refined our isolation techniques using a pragmatic approach based on extensive software-implemented fault-injection (SWIFI) testing. In the end, out of 3,400,000 common faults injected randomly into 4 different Ethernet drivers using both programmed I/O and DMA, no fault was able to break our protection mechanisms and crash the OS. In total, we experienced only one hang, but this appears to be caused by buggy hardware.
这项工作探讨了隔离低级设备驱动程序的原则和实践,以提高操作系统的可靠性。特别是,我们将探讨驱动程序可以执行的操作,以及在触发错误的情况下如何防止错误传播。我们在一个开源的多服务器操作系统(MINIX 3)中建立了我们的想法的原型,该操作系统通过严格执行最小权限来隔离驱动程序,并使用基于广泛的软件实现的故障注入(SWIFI)测试的实用方法迭代地改进了我们的隔离技术。最后,在使用编程I/O和DMA随机注入4个不同以太网驱动程序的3,400,000个常见故障中,没有一个故障能够破坏我们的保护机制并使操作系统崩溃。总的来说,我们只遇到了一次挂起,但这似乎是由硬件错误引起的。
{"title":"Fault isolation for device drivers","authors":"J. Herder, H. Bos, Ben Gras, P. Homburg, A. Tanenbaum","doi":"10.1109/DSN.2009.5270357","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270357","url":null,"abstract":"This work explores the principles and practice of isolating low-level device drivers in order to improve OS dependability. In particular, we explore the operations drivers can perform and how fault propagation in the event a bug is triggered can be prevented. We have prototyped our ideas in an open-source multiserver OS (MINIX 3) that isolates drivers by strictly enforcing least authority and iteratively refined our isolation techniques using a pragmatic approach based on extensive software-implemented fault-injection (SWIFI) testing. In the end, out of 3,400,000 common faults injected randomly into 4 different Ethernet drivers using both programmed I/O and DMA, no fault was able to break our protection mechanisms and crash the OS. In total, we experienced only one hang, but this appears to be caused by buggy hardware.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132413847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
Blue-Watchdog: Detecting Bluetooth worm propagation in public areas Blue-Watchdog:检测公共区域的蓝牙蠕虫传播
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270319
Guanhua Yan, L. Cuéllar, S. Eidenbenz, N. Hengartner
The rising popularity of mobile devices, such as cellular phones and PDAs, has made them a lucrative playground for mobile malware propagation. One common infection vector exploited by these mobile malware is Bluetooth. In this paper, we propose an architecture called Blue-Watchdog that detects Bluetooth worm propagation in public areas based on statistical methods. To achieve fast and accurate Bluetooth worm detection, Blue-Watchdog monitors abrupt changes of average paging rate per Bluetooth device from both temporal and temporal-spatial perspectives. The temporal scheme relies on the CUSUM (Cumulative Sum) sequential test together with the generalized likelihood ratio (GLR), and the temporal-spatial scheme aims to identify spatial regions with abnormally frequent paging attempts. Experimental results show that Blue-Watchdog not only has low false alarm rates, but also effectively detects Bluetooth worms that spread quickly in areas where Bluetooth devices are greatly mixed due to high mobility and also those that propagate relatively slowly in a spatially constrained fashion.
移动设备的日益普及,如移动电话和pda,使它们成为移动恶意软件传播的有利可图的游乐场。这些移动恶意软件利用的一个常见感染媒介是蓝牙。本文提出了一种基于统计方法检测公共区域蓝牙蠕虫传播的bluewatchdog架构。为了实现快速准确的蓝牙蠕虫检测,Blue-Watchdog从时间和时空角度监测每个蓝牙设备平均寻呼速率的突变。时间方案依赖于CUSUM (Cumulative Sum)序列检验和广义似然比(generalized likelihood ratio, GLR),时空方案旨在识别异常频繁分页尝试的空间区域。实验结果表明,Blue-Watchdog不仅具有较低的虚警率,而且能够有效检测到在高移动性蓝牙设备混合较多的区域快速传播的蓝牙蠕虫,以及在空间约束下传播相对较慢的蓝牙蠕虫。
{"title":"Blue-Watchdog: Detecting Bluetooth worm propagation in public areas","authors":"Guanhua Yan, L. Cuéllar, S. Eidenbenz, N. Hengartner","doi":"10.1109/DSN.2009.5270319","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270319","url":null,"abstract":"The rising popularity of mobile devices, such as cellular phones and PDAs, has made them a lucrative playground for mobile malware propagation. One common infection vector exploited by these mobile malware is Bluetooth. In this paper, we propose an architecture called Blue-Watchdog that detects Bluetooth worm propagation in public areas based on statistical methods. To achieve fast and accurate Bluetooth worm detection, Blue-Watchdog monitors abrupt changes of average paging rate per Bluetooth device from both temporal and temporal-spatial perspectives. The temporal scheme relies on the CUSUM (Cumulative Sum) sequential test together with the generalized likelihood ratio (GLR), and the temporal-spatial scheme aims to identify spatial regions with abnormally frequent paging attempts. Experimental results show that Blue-Watchdog not only has low false alarm rates, but also effectively detects Bluetooth worms that spread quickly in areas where Bluetooth devices are greatly mixed due to high mobility and also those that propagate relatively slowly in a spatially constrained fashion.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115623438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Xprobe2++: Low volume remote network information gathering tool xprobe2++:小容量远程网络信息收集工具
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270338
Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, Shih-Yao Dai, Yennun Huang, S. Kuo
Active operating system fingerprinting is the process of actively determining a target network system's underlying operating system type and characteristics by probing the target system network stack with specifically crafted packets and analyzing received response. Identifying the underlying operating system of a network host is an important characteristic that can be used to complement network inventory processes, intrusion detection system discovery mechanisms, security network scanners, vulnerability analysis systems and other security tools that need to evaluate vulnerabilities on remote network systems.
主动操作系统指纹识别是通过使用特制的数据包探测目标系统网络堆栈并分析接收到的响应,主动确定目标网络系统的底层操作系统类型和特征的过程。识别网络主机的底层操作系统是一项重要特征,可用于补充网络库存流程、入侵检测系统发现机制、安全网络扫描仪、漏洞分析系统和其他需要评估远程网络系统漏洞的安全工具。
{"title":"Xprobe2++: Low volume remote network information gathering tool","authors":"Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, Shih-Yao Dai, Yennun Huang, S. Kuo","doi":"10.1109/DSN.2009.5270338","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270338","url":null,"abstract":"Active operating system fingerprinting is the process of actively determining a target network system's underlying operating system type and characteristics by probing the target system network stack with specifically crafted packets and analyzing received response. Identifying the underlying operating system of a network host is an important characteristic that can be used to complement network inventory processes, intrusion detection system discovery mechanisms, security network scanners, vulnerability analysis systems and other security tools that need to evaluate vulnerabilities on remote network systems.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125632403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
An efficient XOR-scheduling algorithm for erasure codes encoding 一种用于擦除码编码的高效异或调度算法
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270300
Jianqiang Luo, Lihao Xu, J. Plank
In large storage systems, it is crucial to protect data from loss due to failures. Erasure codes lay the foundation of this protection, enabling systems to reconstruct lost data when components fail. Erasure codes can however impose significant performance overhead in two core operations: encoding, where coding information is calculated from newly written data, and decoding, where data is reconstructed after failures. This paper focuses on improving the performance of encoding, the more frequent operation. It does so by scheduling the operations of XOR-based erasure codes to optimize their use of cache memory. We call the technique XORscheduling and demonstrate how it applies to a wide variety of existing erasure codes. We conduct a performance evaluation of scheduling these codes on a variety of processors and show that XOR-scheduling significantly improves upon the traditional approach. Hence, we believe that XORscheduling has great potential to have wide impact in practical storage systems.
在大型存储系统中,保护数据不因故障而丢失是至关重要的。Erasure代码为这种保护奠定了基础,使系统能够在组件发生故障时重建丢失的数据。然而,Erasure码在两个核心操作中会带来显著的性能开销:编码(从新写入的数据中计算编码信息)和解码(在故障后重建数据)。本文着重于提高编码性能,提高操作频率。它通过调度基于xor的擦除代码的操作来优化它们对缓存内存的使用。我们将该技术称为XORscheduling,并演示如何将其应用于各种现有的擦除码。我们对在各种处理器上调度这些代码进行了性能评估,并表明异或调度在传统方法的基础上有了显着改进。因此,我们相信XORscheduling在实际存储系统中具有广泛影响的巨大潜力。
{"title":"An efficient XOR-scheduling algorithm for erasure codes encoding","authors":"Jianqiang Luo, Lihao Xu, J. Plank","doi":"10.1109/DSN.2009.5270300","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270300","url":null,"abstract":"In large storage systems, it is crucial to protect data from loss due to failures. Erasure codes lay the foundation of this protection, enabling systems to reconstruct lost data when components fail. Erasure codes can however impose significant performance overhead in two core operations: encoding, where coding information is calculated from newly written data, and decoding, where data is reconstructed after failures. This paper focuses on improving the performance of encoding, the more frequent operation. It does so by scheduling the operations of XOR-based erasure codes to optimize their use of cache memory. We call the technique XORscheduling and demonstrate how it applies to a wide variety of existing erasure codes. We conduct a performance evaluation of scheduling these codes on a variety of processors and show that XOR-scheduling significantly improves upon the traditional approach. Hence, we believe that XORscheduling has great potential to have wide impact in practical storage systems.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130597597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Deterministic high-speed simulation of complex systems including fault-injection 包含故障注入的复杂系统的确定性高速仿真
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270335
Matthias Sand, Stefan Potyra, V. Sieh
FAUmachine is a virtual machine for the highly detailed simulation of standard PC hardware together with an environment. FAUmachine comes with fault injection capabilities and an automatic experiment controller facility. Due to its use of just-in-time compiler techniques, it offers good performance. This tool description introduces the new feature of FAUmachine to simulate systems deterministically. This will enable developers to design and test complex systems for fault tolerance by running identically reproducible automated tests in reasonable time and thus even allow testing for real time constraints.
FAUmachine是一个虚拟机,用于非常详细地模拟标准PC硬件和环境。faummachine具有故障注入功能和自动实验控制器设施。由于使用了即时编译器技术,它提供了良好的性能。该工具描述介绍了faummachine的新特性,以确定地模拟系统。这将使开发人员能够通过在合理的时间内运行相同的可重复的自动化测试来设计和测试复杂系统的容错性,从而甚至允许对实时约束进行测试。
{"title":"Deterministic high-speed simulation of complex systems including fault-injection","authors":"Matthias Sand, Stefan Potyra, V. Sieh","doi":"10.1109/DSN.2009.5270335","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270335","url":null,"abstract":"FAUmachine is a virtual machine for the highly detailed simulation of standard PC hardware together with an environment. FAUmachine comes with fault injection capabilities and an automatic experiment controller facility. Due to its use of just-in-time compiler techniques, it offers good performance. This tool description introduces the new feature of FAUmachine to simulate systems deterministically. This will enable developers to design and test complex systems for fault tolerance by running identically reproducible automated tests in reasonable time and thus even allow testing for real time constraints.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128837645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
System log pre-processing to improve failure prediction 系统日志预处理,提高故障预测
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270289
Ziming Zheng, Z. Lan, Byung-Hoon Park, A. Geist
Log preprocessing, a process applied on the raw log before applying a predictive method, is of paramount importance to failure prediction and diagnosis. While existing filtering methods have demonstrated good compression rate, they fail to preserve important failure patterns that are crucial for failure analysis. To address the problem, in this paper we present a log preprocessing method. It consists of three integrated steps: (1) event categorization to uniformly classify system events and identify fatal events; (2) event filtering to remove temporal and spatial redundant records, while also preserving necessary failure patterns for failure analysis; (3) causality-related filtering to combine correlated events for filtering through apriori association rule mining. We demonstrate the effectiveness of our preprocessing method by using real failure logs collected from the Cray XT4 at ORNL and the Blue Gene/L system at SDSC. Experiments show that our method can preserve more failure patterns for failure analysis, thereby improving failure prediction by up to 174%.
日志预处理是在应用预测方法之前对原始日志进行处理的过程,对故障预测和诊断至关重要。虽然现有的过滤方法已经证明了良好的压缩率,但它们无法保留对故障分析至关重要的重要故障模式。为了解决这一问题,本文提出了一种日志预处理方法。它包括三个集成步骤:(1)事件分类,对系统事件进行统一分类,识别致命事件;(2)事件过滤,去除时间和空间冗余记录,同时保留必要的故障模式用于故障分析;(3)因果关联过滤,结合相关事件进行先验关联规则挖掘过滤。通过使用ORNL的Cray XT4和SDSC的Blue Gene/L系统收集的真实故障日志,我们证明了预处理方法的有效性。实验表明,该方法可以保留更多的故障模式用于故障分析,从而将故障预测提高了174%。
{"title":"System log pre-processing to improve failure prediction","authors":"Ziming Zheng, Z. Lan, Byung-Hoon Park, A. Geist","doi":"10.1109/DSN.2009.5270289","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270289","url":null,"abstract":"Log preprocessing, a process applied on the raw log before applying a predictive method, is of paramount importance to failure prediction and diagnosis. While existing filtering methods have demonstrated good compression rate, they fail to preserve important failure patterns that are crucial for failure analysis. To address the problem, in this paper we present a log preprocessing method. It consists of three integrated steps: (1) event categorization to uniformly classify system events and identify fatal events; (2) event filtering to remove temporal and spatial redundant records, while also preserving necessary failure patterns for failure analysis; (3) causality-related filtering to combine correlated events for filtering through apriori association rule mining. We demonstrate the effectiveness of our preprocessing method by using real failure logs collected from the Cray XT4 at ORNL and the Blue Gene/L system at SDSC. Experiments show that our method can preserve more failure patterns for failure analysis, thereby improving failure prediction by up to 174%.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"46 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132335063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 102
Vulnerability & attack injection for web applications 针对web应用程序的漏洞和攻击注入
Pub Date : 2009-09-29 DOI: 10.1109/DSN.2009.5270349
J. Fonseca, M. Vieira, H. Madeira
In this paper we propose a methodology to inject realistic attacks in web applications. The methodology is based on the idea that by injecting realistic vulnerabilities in a web application and attacking them automatically we can assess existing security mechanisms. To provide true to life results, this methodology relies on field studies of a large number of vulnerabilities in web applications. The paper also describes a set of tools implementing the proposed methodology. They allow the automation of the entire process, including gathering results and analysis. We used these tools to conduct a set of experiments to demonstrate the feasibility and effectiveness of the proposed methodology. The experiments include the evaluation of coverage and false positives of an Intrusion Detection System for SQL Injection and the assessment of the effectiveness of two Web Application Vulnerability Scanners. Results show that the injection of vulnerabilities and attacks is an effective way to evaluate security mechanisms and tools.
在本文中,我们提出了一种在web应用程序中注入真实攻击的方法。该方法基于这样一种理念,即通过在web应用程序中注入真实的漏洞并自动攻击它们,我们可以评估现有的安全机制。为了提供真实的结果,这种方法依赖于对web应用程序中大量漏洞的实地研究。本文还描述了一套实现所提出方法的工具。它们允许整个过程的自动化,包括收集结果和分析。我们使用这些工具进行了一组实验,以证明所提出方法的可行性和有效性。实验包括评估SQL注入入侵检测系统的覆盖率和误报率,以及评估两种Web应用程序漏洞扫描器的有效性。结果表明,注入漏洞和攻击是评估安全机制和工具的有效方法。
{"title":"Vulnerability & attack injection for web applications","authors":"J. Fonseca, M. Vieira, H. Madeira","doi":"10.1109/DSN.2009.5270349","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270349","url":null,"abstract":"In this paper we propose a methodology to inject realistic attacks in web applications. The methodology is based on the idea that by injecting realistic vulnerabilities in a web application and attacking them automatically we can assess existing security mechanisms. To provide true to life results, this methodology relies on field studies of a large number of vulnerabilities in web applications. The paper also describes a set of tools implementing the proposed methodology. They allow the automation of the entire process, including gathering results and analysis. We used these tools to conduct a set of experiments to demonstrate the feasibility and effectiveness of the proposed methodology. The experiments include the evaluation of coverage and false positives of an Intrusion Detection System for SQL Injection and the assessment of the effectiveness of two Web Application Vulnerability Scanners. Results show that the injection of vulnerabilities and attacks is an effective way to evaluate security mechanisms and tools.","PeriodicalId":376982,"journal":{"name":"2009 IEEE/IFIP International Conference on Dependable Systems & Networks","volume":"67 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131892947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
期刊
2009 IEEE/IFIP International Conference on Dependable Systems & Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1