LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Tsigritis, T.; Spanoudakis, G. (2013)
Languages: English
Types: Article
Subjects: QA75
Monitoring security properties of cyber systems at runtime is necessary if the preservation of such properties cannot be guaranteed by formal analysis of their specification. It is also necessary if the runtime interactions between their components that are distributed over different types of local and wide area networks cannot be fully analysed before putting the systems in operation. The effectiveness of runtime monitoring depends on the trustworthiness of the runtime system events, which are analysed by the monitor. In this paper, we describe an approach for assessing the trustworthiness of such events. Our approach is based on the generation of possible explanations of runtime events based on a diagnostic model of the system under surveillance using abductive reasoning, and the confirmation of the validity of such explanations and the runtime events using belief based reasoning. The assessment process that we have developed based on this approach has been implemented as part of the EVEREST runtime monitoring framework and has been evaluated in a series of simulations that are discussed in the paper.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] Alberti M. et al., Abduction with Hypotheses Confirmation, Int. Joint Conf. on Artificial Intelligence, 19: 1545-1546, 2005
    • Allen J. F., Maintaining Knowledge about Temporal Intervals. Communications of the ACM 26(1): 832-843, 1983
    • Armenteros A. et al., Realising the Potential of SERENITY in Emerging AmI Ecosystems: Implications and Challenges, In Security and Dependability for Ambient Intelligence, Advances in Information Security, Springer, 2009
    • Artho C, et al., JNuke: Efficient Dynamic Analysis for Java. 16th Int. Conf. On Computer Aided Verification, LNCS 3114: 462-465, 2004
    • Baresi L, and Guinea S, Towards Dynamic Monitoring of WS-BPEL Processes. 3rd Int. Conf. On Service Oriented Computing, 2005.
    • Barringer H., et al., Rule-Based Runtime Verification. 5th Int. Conf. on Verification, Model Checking, and Abstract Interpretation, LNCS 2937: 44-57, 2004 Barringer H., Rydeheard D., and Havelund K. Rule systems for run-time monitoring: From Eagle to RuleR. In Runtime Verification, pp. 111-125, Springer Berlin/Heidelberg, 2007 Bouyer P., et al., Fault Diagnosis using Timed Automata. LNCS 3441:219-233, 2005 Brörkens M., and Möller M., Jassda trace assertions, runtime checking the dynamic of java programs. Int. Conf. on Testing of Communicating Systems, Berlin, Germany, pp. 39-48, 2002 Chen F., and Rosu G., Towards Monitoring-Oriented Programming: A Paradigm Combining Specification and Implementation. In Electronic Notes in Theoretical Computer Science, 89(2): 108- 127, 2003
    • Console L., Terenziani P., and Dupre D.T., Local reasoning and knowledge compilation for efficient temporal abduction. IEEE Transactions on Knowledge and Data Engineering, 14(6): 1230-1248, 2002
    • d'Amorim M., and Havelund K., Event-based runtime verification of Java programs. ACM SIGSOFT Software Engineering Notes, 30(4): 1-7, 2005
    • Drusinsky D. The Temporal Rover and the ATG Rover. In SPIN Model Checking and Software Verification, LNCS 1885: 323-330, 2000
    • Shafer G., A Mathematical Theory of Evidence., Princeton University Press, 1975 Schneider F.B., Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1): 30-50, 2000 Spanoudakis G., Kloukinas C., and Mahbub K., The SERENITY Runtime Monitoring Framework, In Security and Dependability for Ambient Intelligence, Advances in Information Security Series, Springer, pp. 213-238, 2009
    • Spanoudakis G., and Mahbub K., Non intrusive monitoring of service based systems. Int. Journal of Cooperative Information Systems, 15(3):325-358, 2006
    • Tripakis S, Fault diagnosis for timed automata. 7th Int. Symposium on Formal Techniques in RealTime and Fault Tolerant Systems, LNCS 2469: 205-224, Springer, 2002 Tsigkritis T., Diagnosing Runtime Violations of Security and Dependability Properties, PhD Thesis, City University, May 2011
    • Tsigritis T, Spanoudakis G., Diagnosing Runtime Violations of Security & Dependability Properties, 20th Int. Conf. on Software Engineering and Knowledge Engineering, July 2008 Tsigritis T., Spanoudakis G., A Temporal Abductive Diagnostic Process for Runtime Properties Violation, In ECAI 2008 Workshop on Explanation Aware Computing (Exact '08), 2008
  • No related research data.
  • No similar publications.

Share - Bookmark

Download from

Cite this article