Host-based intrusion detection system with system calls: Review and future trends

M Liu, Z Xue, X Xu, C Zhong, J Chen - ACM computing surveys (CSUR), 2018 - dl.acm.org
In a contemporary data center, Linux applications often generate a large quantity of real-time
system call traces, which are not suitable for traditional host-based intrusion detection …

Execution anomaly detection in distributed systems through unstructured log analysis

Q Fu, JG Lou, Y Wang, J Li - 2009 ninth IEEE international …, 2009 - ieeexplore.ieee.org
Detection of execution anomalies is very important for the maintenance, development, and
performance refinement of large scale distributed systems. Execution anomalies include …

[PDF][PDF] Mining invariants from console logs for system problem detection

JG Lou, Q Fu, S Yang, Y Xu, J Li - 2010 USENIX Annual Technical …, 2010 - usenix.org
Detecting execution anomalies is very important to the maintenance and monitoring of large-
scale distributed systems. People often use console logs that are produced by distributed …

Leveraging existing instrumentation to automatically infer invariant-constrained models

I Beschastnikh, Y Brun, S Schneider, M Sloan… - Proceedings of the 19th …, 2011 - dl.acm.org
Computer systems are often difficult to debug and understand. A common way of gaining
insight into system behavior is to inspect execution logs and documentation. Unfortunately …

Modelling and control for intelligent industrial systems

GG Rigatos - adaptive algorithms in robotics and industrial …, 2011 - Springer
Incorporating intelligence in industrial systems can help to increase productivity, cut-off
production costs, and to improve working conditions and safety in industrial environments …

Inferring models of concurrent systems from logs of their behavior with CSight

I Beschastnikh, Y Brun, MD Ernst… - Proceedings of the 36th …, 2014 - dl.acm.org
Concurrent systems are notoriously difficult to debug and understand. A common way of
gaining insight into system behavior is to inspect execution logs and documentation …

An improved KNN-based efficient log anomaly detection method with automatically labeled samples

S Ying, B Wang, L Wang, Q Li, Y Zhao… - ACM Transactions on …, 2021 - dl.acm.org
Logs that record system abnormal states (anomaly logs) can be regarded as outliers, and
the k-Nearest Neighbor (kNN) algorithm has relatively high accuracy in outlier detection …

Automated test oracles: State of the art, taxonomies, and trends

RAP Oliveira, U Kanewala, PA Nardi - Advances in computers, 2014 - Elsevier
Test oracle methods have changed significantly over time, which has resulted in clear shifts
in the research literature. Over the years, the testing techniques, strategies, and criteria …

Software testing using machine learning

R Chang, S Sankaranarayanan, G Jiang… - US Patent …, 2014 - Google Patents
A system and method for analyzing a computer program includes performing a static
analysis on a program to determine property correctness. Test cases are generated and …

Modeling and tracking of transaction flow dynamics for fault detection in complex systems

G Jiang, H Chen, K Yoshihira - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
With the prevalence of Internet services and the increase of their complexity, there is a
growing need to improve their operational reliability and availability. While a large amount of …