Anomaly Detection Techniques for Web-based Applications: An Experimental Study

被引:5
|
作者
Magalhaes, Joao Paulo [1 ]
Silva, Luis Moura [2 ]
机构
[1] ESTGF Porto Polytech Inst, CIICESI, P-4610156 Felgueiras, Portugal
[2] Univ Coimbra, CISUC, P-3000 Coimbra, Portugal
关键词
monitoring; dependability; fail-stutter; crash-failures; performance anomalies;
D O I
10.1109/NCA.2012.27
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The web-based applications are exposed to a large spectrum of factors that may affect their availability and performability. The mean-time-to-detect (MTTD) and the mean-time-to-repair (MTTR) are considered of utmost importance to reduce the failure impacts. In this context, the combination of multiple monitoring techniques is commonly adopted to provide IT staff with information useful for timely detection and recovery from the failures. In this paper we provide an experimental study about the detection abilities provided by the monitoring tools that are being used nowadays in web-based applications. Besides the system-level, end-to-end and container-level monitoring techniques we incorporate an application-level monitoring technique. This technique provides the detection of performance anomalies by performing a correlation analysis among application parameters collected by an aspect-oriented program. The detection latency, the number of end-users affected, the coverage analysis and the overhead achieved by each monitoring technique, was evaluated considering different anomaly scenarios. Despite the importance of the monitoring techniques complementarity, the results achieved by the application-level monitoring are very interesting: it has detected 100% of the anomaly scenarios tested; for 73% of the anomalies it was the fastest detection technique; and due to the low detection latency it contributes to reduce the number of end-users experiencing the anomalies.
引用
下载
收藏
页码:181 / 190
页数:10
相关论文
共 50 条
  • [1] Data Processing and Anomaly Detection in Web-Based Applications
    Sriraghavan, Rajagopal G.
    Lucchese, Luca
    2008 IEEE WORKSHOP ON MACHINE LEARNING FOR SIGNAL PROCESSING, 2008, : 187 - 192
  • [2] An Adaptive Anomaly Detection of WEB-based Attacks
    Kai, Wen
    Fan, Guo
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 690 - 694
  • [3] A comparative study of anomaly detection techniques in web site defacement detection
    Davanzo, Giorgio
    Medvet, Eric
    Bartoli, Alberto
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 711 - 715
  • [4] Web-based Application Anomaly Detection Based on Efficient Frequent Pattern Mining
    Zhou, Jingli
    Yu, Jifeng
    Xiong, Liqin
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 256 - 259
  • [5] A Comparative Study of Anomaly Based Detection Techniques
    Umasoni
    Kumari, Uma
    Kumar, Anil
    INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018, 2019, 26 : 344 - 349
  • [6] Anomaly Detection of Malicious Users' Behaviors for Web Applications Based on Web Logs
    Gao, Yang
    Ma, Yan
    Li, Dandan
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 1352 - 1355
  • [7] Web-based Fingerprinting Techniques
    Bernardo, Vitor
    Domingos, Dulce
    SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, : 271 - 282
  • [8] An anomaly detection method on web-based system by trend analysis with autoregressive model
    Samejima, Masaki
    Ohno, Hiroshi
    Akiyoshi, Masanori
    Komoda, Norihisa
    Yoshino, Matsuki
    IEEJ Transactions on Electronics, Information and Systems, 2014, 134 (06) : 814 - 820
  • [9] A Novel Anomaly Detection Approach for Mitigating Web-based Attacks against Clouds
    Zhang, Simin
    Li, Bo
    Li, Jianxin
    Zhang, Mingming
    Chen, Yang
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 289 - 294
  • [10] Robust Training for Injection Attacks Detection in Web-based Applications
    Appiah, Benjamin
    Qin, Zhiguang
    Kwabena, Owusu A.
    Abdullah, Muhammed A.
    International Journal of Network Security, 2021, 23 (06) : 1028 - 1036