Anomaly Detection Techniques for Web-based Applications: An Experimental Study

被引:5
|
作者
Magalhaes, Joao Paulo [1 ]
Silva, Luis Moura [2 ]
机构
[1] ESTGF Porto Polytech Inst, CIICESI, P-4610156 Felgueiras, Portugal
[2] Univ Coimbra, CISUC, P-3000 Coimbra, Portugal
关键词
monitoring; dependability; fail-stutter; crash-failures; performance anomalies;
D O I
10.1109/NCA.2012.27
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The web-based applications are exposed to a large spectrum of factors that may affect their availability and performability. The mean-time-to-detect (MTTD) and the mean-time-to-repair (MTTR) are considered of utmost importance to reduce the failure impacts. In this context, the combination of multiple monitoring techniques is commonly adopted to provide IT staff with information useful for timely detection and recovery from the failures. In this paper we provide an experimental study about the detection abilities provided by the monitoring tools that are being used nowadays in web-based applications. Besides the system-level, end-to-end and container-level monitoring techniques we incorporate an application-level monitoring technique. This technique provides the detection of performance anomalies by performing a correlation analysis among application parameters collected by an aspect-oriented program. The detection latency, the number of end-users affected, the coverage analysis and the overhead achieved by each monitoring technique, was evaluated considering different anomaly scenarios. Despite the importance of the monitoring techniques complementarity, the results achieved by the application-level monitoring are very interesting: it has detected 100% of the anomaly scenarios tested; for 73% of the anomalies it was the fastest detection technique; and due to the low detection latency it contributes to reduce the number of end-users experiencing the anomalies.
引用
下载
收藏
页码:181 / 190
页数:10
相关论文
共 50 条
  • [41] Deep Learning Techniques for Web-Based Attack Detection in Industry 5.0: A Novel Approach
    Salam, Abdu
    Ullah, Faizan
    Amin, Farhan
    Abrar, Mohammad
    TECHNOLOGIES, 2023, 11 (04)
  • [42] Anomaly based web phishing page detection
    Pan, Ying
    Ding, Xuhua
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 381 - +
  • [43] An Anomaly Detection Method for Individual Service on Web-based System by Selection of Dummy Variables in Multiple Regression
    Tsuda, Yuki
    Nguyen Ngoc Tan
    Samejima, Masaki
    Akiyoshi, Masanori
    Komoda, Norihisa
    Yoshino, Matsuki
    PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2012, : 1873 - 1877
  • [44] An anomaly detection method for individual service on web-based system by selection of dummy variables in multiple regression
    Tsuda, Yuki
    Samejima, Masaki
    Akiyoshi, Masanori
    Komoda, Norihisa
    Yoshino, Matsuki
    IEEJ Transactions on Electronics, Information and Systems, 2013, 133 (07): : 1410 - 1416
  • [45] An Anomaly Detection Method for Individual Services on a Web-Based System by Selection of Dummy Variables in Multiple Regression
    Tsuda, Yuki
    Samejima, Masaki
    Akiyoshi, Masanori
    Komoda, Norihisa
    Yoshino, Matsuki
    ELECTRONICS AND COMMUNICATIONS IN JAPAN, 2014, 97 (02) : 9 - 16
  • [46] Rethinking Security of Web-Based System Applications
    Georgiev, Martin
    Jana, Suman
    Shmatikov, Vitaly
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW 2015), 2015, : 366 - 376
  • [47] A General Framework for Testing Web-Based Applications
    Abrishami, Saeid
    Kahani, Mohsen
    INNOVATIONS AND ADVANCES IN COMPUTER SCIENCES AND ENGINEERING, 2010, : 303 - 306
  • [48] Capacity Planning and Allocation for Web-Based Applications
    Mohan, Srimathy
    Alam, Ferdous M.
    Fowler, John W.
    Gopalakrishnan, Mohan
    Printezis, Antonios
    DECISION SCIENCES, 2014, 45 (03) : 535 - 567
  • [49] State Synchronization Approaches in Web-based Applications
    Grocevs, Aleksejs
    Prokofyeva, Natalya
    Leye, Stefan
    APPLIED COMPUTER SYSTEMS, 2014, 16 (01) : 92 - 96
  • [50] Web-based Recommendation Systems Technologies and Applications
    Janusz Sobecki
    New Generation Computing, 2008, 26 : 205 - 208