Filters








6,144 Hits in 6.6 sec

Modeling Human Behavior to Anticipate Insider Attacks

Frank L. Greitzer, Ryan E. Hohimer
2011 Journal of Strategic Security  
This research focuses on the intelligence domain, including human behavior modeling with application to identifying/predicting malicious insider cyber activities, modeling socio-cultural factors as predictors  ...  Greitzer leads the cognitive informatics R&D focus area, which addresses human factors and social/behavioral science challenges through modeling and advanced engineering/computing approaches.  ...  Anomaly detection is based on identifying events or behaviors that are statistical outliers; a major drawback of this approach is its inability to effectively combat the strategy of insiders to work below  ... 
doi:10.5038/1944-0472.4.2.2 fatcat:qsl4zakz4jgrlk6eapkqqyezpe

A Framework for Detecting System Performance Anomalies Using Tracing Data Analysis

Iman Kohyarnejadfard, Daniel Aloise, Michel R. Dagenais, Mahsa Shakeri
2021 Entropy  
anomalous subsequences of system calls based on their execution times and frequency.  ...  Performance metrics represent the average load on the system and do not help discover the cause of the problem if abnormal behavior occurs during software execution.  ...  Data Availability Statement: The data presented in this study are available on request from the corresponding author. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/e23081011 fatcat:dkkv7nv47reulcdr3u7ob65jn4

MicroRAS: Automatic Recovery in the Absence of Historical Failure Data for Microservice Systems

Li Wu, Johan Tordsson, Alexander Acker, Odej Kao
2020 2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC)  
The estimation of action effects is based on a system-state model represented by an attributed graph that tracks the propagation of effects.  ...  MicroRAS is a model-driven method that selects the appropriate recovery action with a trade-off between the effectiveness and recovery time of actions.  ...  Model-based approaches model different aspects of a healing process, such as the properties of the fault [43] , the properties of the actions [44] , or use theoretical techniques, like Markov decision  ... 
doi:10.1109/ucc48980.2020.00041 fatcat:zbhbvy4pwbaifiqkgjqqopfkw4

Error detection framework for complex software systems

Antonio Bovenzi, Domenico Cotroneo, Roberto Pietrantuono, Gabriella Carrozza
2011 Proceedings of the 13th European Workshop on Dependable Computing - EWDC '11  
In this paper, we propose an error detection framework to cope with software failures, which combines multiple sources of data gathered both at application-level and OS-level.  ...  Such behaviors, due to their complex triggering patterns, typically escape the testing phase.  ...  For these reasons, anomaly-based detection approaches have been conceived for detection. They aim to compare normal behavior with the observed one, and reveal anomalous runs of the system.  ... 
doi:10.1145/1978582.1978596 dblp:conf/ewdc/BovenziCPC11 fatcat:57njsbwq3jenlh4bh42n65yx3q

Deep Learning Based Intrusion Detection in Cloud Services for Resilience Management

S. Sreenivasa Chakravarthi, R. Jagadeesh Kannan, V. Anantha Natarajan, Xiao-Zhi Gao
2022 Computers Materials & Continua  
This paper focuses on designing an intelligent deep learning based approach for detecting cloud anomalies in real time to make it more resilient.  ...  The deep learning architectures-based anomaly detection mechanisms uses various monitoring metrics characterize the normal behavior of cloud services and identify the abnormal events.  ...  based on evolutionary approach.  ... 
doi:10.32604/cmc.2022.022351 fatcat:7mcqneanq5hf5c4hbqjg5uwm3a

Attack-Detection Architectural Framework Based on Anomalous Patterns of System Performance and Resource Utilization-Part II

Abdulmohsan Aloseel, Saba Al-Rubaye, Argyrios Zolotas, Carl Shaw
2021 IEEE Access  
the anomalous patterns accurately based on one predicator.  ...  With this method, the machine will learn based on training samples of the structure of a graph.  ... 
doi:10.1109/access.2021.3088411 fatcat:zio7jzjbwnhk7o62demkphzytm

Machine Learning for 5G Mobile Networks: a Pragmatic Essay on where, how and why [chapter]

Paolo Dini, Michele Rossi
2019 Zenodo  
Our objective is to demonstrate where (which applications), how (in combination with which techniques) andwhy (the benefits) ML may be useful, with an emphasis on the how, i.e., what are the usage models  ...  We follow a pragmatic approach, leveraging our recent research work, which encompasses algorithms for energy efficiency, Quality of Service (QoS) enhancements and the use of inference tools for the analysis  ...  Education, University and Research) through the initiative "Departments of Excellence" (Law 232/2016).  ... 
doi:10.5281/zenodo.3675362 fatcat:kkzk6ho4urcv3igzs3233yzzei

Parallelization Strategies for Spatial Agent-Based Models

Nuno Fachada, Vitor V. Lopes, Rui C. Martins, Agostinho C. Rosa
2016 International journal of parallel programming  
Agent-based modeling (ABM) is a bottom-up modeling approach, where each entity of the system being modeled is uniquely represented as an independent decision-making agent.  ...  study how different parallelization strategies impact simulation performance on a shared memory architecture.  ...  Introduction Agent-based modeling (ABM) is a bottom-up modeling approach, where each entity of the system being modeled is uniquely represented as an independent decision-making agent.  ... 
doi:10.1007/s10766-015-0399-9 fatcat:m2ff3wx6gnezzm35b4tx4gcxka

Adaptive Hybrid Model for Network Intrusion Detection and Comparison among Machine Learning Algorithms

Md. Enamul Haque, Talal M. Alkharobi
2015 International Journal of Machine Learning and Computing  
Our approach found out that this algorithm outperforms all other learning techniques.  ...  We have shown that reducing the dimensionality of the large dataset provides most accurate detection.  ...  Their model uses a game theoretic response strategy based on two-player Stackelberg stochastic games. The RRE applies attack response trees (ART) and concludes with some sort of attack prediction.  ... 
doi:10.7763/ijmlc.2015.v5.476 fatcat:eb5taxtc3ja6rdjlogvtw5c434

Modeling Driver Behavior in a Cognitive Architecture

Dario D. Salvucci
2006 Human Factors  
Many existing models of driver behavior and performance emphasize only one or two of the ETA-triad components.  ...  The monitoring component, part of Michon's tactical level, maintains 1 The initial model was developed in version 4.0 of the ACT-R architecture (Anderson & Lebiere, 1998); the model described here represents  ...  Acknowledgments This work is supported in part by Office of Naval Research grant #N00014-03-1-0036 and National Science Foundation Grant #IIS-0133083.  ... 
doi:10.1518/001872006777724417 pmid:16884055 fatcat:g5weectldrcyvabsggxmkqfccy

A Comprehensive Survey of Graph-based Deep Learning Approaches for Anomaly Detection in Complex Distributed Systems [article]

Armin Danesh Pazho, Ghazal Alinezhad Noghre, Arnab A Purkayastha, Jagannadh Vempati, Otto Martin, Hamed Tabkhi
2022 arXiv   pre-print
Later, we discuss why graphs can be leveraged in such systems and the benefits of utilizing graphs.  ...  In this survey, we explore the significant potential of graph-based algorithms to identify and mitigate different types of anomalies in complex distributed heterogeneous systems.  ...  ACKNOWLEDGMENTS This work is part of a research collaboration with Siemens Inc., USA.  ... 
arXiv:2206.04149v1 fatcat:pprw7huwqvbadozlzhigftgi7u

Intelligent perception and control for space robotics

Faisal Qureshi, Demetri Terzopoulos
2007 Machine Vision and Applications  
We present a space robotic system capable of capturing a free-flying satellite for the purposes of on-orbit satellite servicing.  ...  Reasoning and related elements, among them intention, context, and memory, are responsible for the robustness and reliability of the overall system.  ...  Acknowledgments The authors acknowledge the valuable technical contributions of P. Jasiobedzki, R. Gillett, H.K. Ng, S. Greene, J. Richmond, M. Greenspan, M. Liu, and A. Chan.  ... 
doi:10.1007/s00138-007-0085-z fatcat:r7bdepvtkvcfld7lokcocim7nu

Human Rights and Genetic Discrimination: Protecting Genomics' Promise for Public Health

Michael Ashley Stein, Anita Silvers
2010 Social Science Research Network  
Such an equality-based approach to classification addresses the concern that characteristics associated with one genetic class become a standard for members of other classes.  ...  of the benefits genomics promises. 5 We argue in this article for a much broader approach, an equality-based protection similar to the bans against race and sex discrimination.  ... 
doi:10.2139/ssrn.1552047 fatcat:tb64umkswbdqvb7bh4yhcnysom

Reasoning about Human Participation in Self-Adaptive Systems

Javier Camara, Gabriel Moreno, David Garlan
2015 2015 IEEE/ACM 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems  
The approach consists of: (i) a language to express adaptation models that capture factors affecting human behavior and its interactions with the system, and (ii) a formalization of these adaptation models  ...  We contribute a formal framework to reason about human involvement in self-adaptation, focusing on the role of human participants as actors (i.e., effectors) during the execution stage of adaptation.  ...  This material is based upon work funded and supported by the Department of Defense under Contract No.  ... 
doi:10.1109/seams.2015.14 dblp:conf/icse/CamaraMG15 fatcat:kw45wkpcczhzde4luxlix4psaq

Monitoring energy consumption with SIOX

Julian M. Kunkel, Alvaro Aguilera, Nathanael Hübbe, Marc Wiedemann, Michaela Zimmer
2014 Computer Science - Research and Development  
SIOX is one such endeavor, with a uniquely holistic approach: Not only does it aim to record a certain kind of data, but to make all relevant data available for analysis and optimization.  ...  about critical situations.  ...  Acknowledgements We want to express our gratitude to the German Aerospace Center (DLR) as responsible project agency and to the Federal Ministry of Education and Research (BMBF) for the financial support  ... 
doi:10.1007/s00450-014-0271-y fatcat:7732rzwdhzalnj3btithzo5nhy
« Previous Showing results 1 — 15 out of 6,144 results