Anomaly Detection Techniques for Web-based Applications: An Experimental Study

被引:5
|
作者
Magalhaes, Joao Paulo [1 ]
Silva, Luis Moura [2 ]
机构
[1] ESTGF Porto Polytech Inst, CIICESI, P-4610156 Felgueiras, Portugal
[2] Univ Coimbra, CISUC, P-3000 Coimbra, Portugal
关键词
monitoring; dependability; fail-stutter; crash-failures; performance anomalies;
D O I
10.1109/NCA.2012.27
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The web-based applications are exposed to a large spectrum of factors that may affect their availability and performability. The mean-time-to-detect (MTTD) and the mean-time-to-repair (MTTR) are considered of utmost importance to reduce the failure impacts. In this context, the combination of multiple monitoring techniques is commonly adopted to provide IT staff with information useful for timely detection and recovery from the failures. In this paper we provide an experimental study about the detection abilities provided by the monitoring tools that are being used nowadays in web-based applications. Besides the system-level, end-to-end and container-level monitoring techniques we incorporate an application-level monitoring technique. This technique provides the detection of performance anomalies by performing a correlation analysis among application parameters collected by an aspect-oriented program. The detection latency, the number of end-users affected, the coverage analysis and the overhead achieved by each monitoring technique, was evaluated considering different anomaly scenarios. Despite the importance of the monitoring techniques complementarity, the results achieved by the application-level monitoring are very interesting: it has detected 100% of the anomaly scenarios tested; for 73% of the anomalies it was the fastest detection technique; and due to the low detection latency it contributes to reduce the number of end-users experiencing the anomalies.
引用
下载
收藏
页码:181 / 190
页数:10
相关论文
共 50 条
  • [21] A Study of Memory Management for Web-based Applications on Multicore Processors
    Inoue, Hiroshi
    Komatsu, Hideaki
    Nakatani, Toshio
    ACM SIGPLAN NOTICES, 2009, 44 (06) : 386 - 396
  • [22] A Study of Memory Management for Web-based Applications on Multicore Processors
    Inoue, Hiroshi
    Komatsu, Hideaki
    Nakatani, Toshio
    PLDI'09 PROCEEDINGS OF THE 2009 ACM SIGPLAN CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION, 2009, : 386 - 396
  • [23] Webshell Detection Techniques in Web Applications
    Truong Dinh Tu
    Cheng Guang
    Guo Xiaojun
    Pan Wubin
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [24] An experimental study of learner perceptions of the interactivity of web-based instruction
    Sun, Jui-ni
    Hsu, Yu-chen
    INTERACTING WITH COMPUTERS, 2012, 24 (01) : 35 - 48
  • [25] Swaddler: An approach for the anomaly-based detection of state violations in web applications
    Cova, Marco
    Balzarotti, Davide
    Felmetsger, Viktoria
    Vigna, Giovanni
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2007, 4637 : 63 - +
  • [26] Web-based visualization of processes: Applications
    Malandrino, D
    Meo, G
    Palmieri, G
    Scarano, V
    2001 IEEE FOURTH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 2001, : 383 - 388
  • [27] Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries
    Vigna, Giovanni
    Valeur, Fredrik
    Balzarotti, Davide
    Robertson, William
    Kruegel, Christopher
    Kirda, Engin
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (03) : 305 - 329
  • [28] Interoperability in Web-Based Geospatial Applications
    Sikder, Iftikhar U.
    Gangopadhyay, Aryya
    Shampur, Nikhil V.
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2008, 3 (03) : 66 - 88
  • [29] Assuring quality of web-based applications
    Zhu, Hong
    Kung, David
    INFORMATION AND SOFTWARE TECHNOLOGY, 2006, 48 (12) : 1135 - 1136
  • [30] Online testing of web-based applications
    Wang, QX
    Quan, LN
    Ying, FC
    PROCEEDINGS OF THE 28TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATION CONFERENCE, WORKSHOP AND FAST ABSTRACTS, 2004, : 166 - 169