2021
DOI: 10.1016/j.ress.2020.107305
|View full text |Cite
|
Sign up to set email alerts
|

Association rules extraction for the identification of functional dependencies in complex technical infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(14 citation statements)
references
References 27 publications
0
14
0
Order By: Relevance
“…The above-described techniques for producing the suggestions are covering almost all cases. Recently, we have also analysed the usage of Functional Dependencies and their imprecise/ relaxed and/or precise approaches [4,12,13,27]. Those approaches are mainly focussed on identifying the complexity of relationships on data models.…”
Section: Considerations On Functional Dependenciesmentioning
confidence: 99%
“…The above-described techniques for producing the suggestions are covering almost all cases. Recently, we have also analysed the usage of Functional Dependencies and their imprecise/ relaxed and/or precise approaches [4,12,13,27]. Those approaches are mainly focussed on identifying the complexity of relationships on data models.…”
Section: Considerations On Functional Dependenciesmentioning
confidence: 99%
“…[7]. This evolution modifies the physical interconnections between the systems of the CTI, which consequently alters the functional dependencies among the components and, therefore, their criticalities [1,8,9].…”
Section: Introductionmentioning
confidence: 99%
“…General guidelines and conceptual definitions have been provided in Zio (2016). In this context, datadriven methods for the identification of FEDPs in CTIs using alarm data have been developed (Serio et al 2018;Antonello et al 2019;Antonello et al 2021a). They are based on the application of the Association Rule Mining (ARM) (Agrawal and Imieliński 1993;Srikant and Agrawal 1996;Witten and Frank 2016) algorithm for scanning the alarm databases and identifying associations among patterns of alarms in the form of "if (antecedent) then (consequent)" rules; from these, the FDEPs are derived.…”
mentioning
confidence: 99%
“…A main challenge in the application of the Apriori-based algorithms to alarm databases is the difficulty of identifying rare FDEPs, which are typically unknown and can be actually the most relevant for CTI vulnerability (Wang et al 2000;Kim and Yun 2016;Zio 2016;Antonello et al 2021a). Their identification typically requires the use of a small value for the minimum support threshold, which renders the search computationally unaffordable (Lin and Tseng 2006;Wulandari et al 2019) and leads to the generation of a very large set of rules, which are not strongly supported and hard to analyse for discovering vulnerabilities in the CTI (Marin et al 2008;Zhang et al 2013).…”
mentioning
confidence: 99%
See 1 more Smart Citation