Proceedings of the First Joint WOSP/SIPEW International Conference on Performance Engineering 2010
DOI: 10.1145/1712605.1712623
|View full text |Cite
|
Sign up to set email alerts
|

Monitoring for security intrusion using performance signatures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0
5

Year Published

2012
2012
2022
2022

Publication Types

Select...
3
3
3

Relationship

2
7

Authors

Journals

citations
Cited by 28 publications
(19 citation statements)
references
References 8 publications
0
14
0
5
Order By: Relevance
“…Caso não seja possível descobrir os ataques apenas com medições em redes, pode ser necessário monitorar remotamente a telemetria das mesmas (CPU e memória) [Avritzer et al 2010]. Esse monitoramento pode ser feito em universidades, nos quais os computadores estão todos sob a mesma autoridade, mas não em favelas, por exemplo.…”
Section: Detectando Cryptojackingunclassified
“…Caso não seja possível descobrir os ataques apenas com medições em redes, pode ser necessário monitorar remotamente a telemetria das mesmas (CPU e memória) [Avritzer et al 2010]. Esse monitoramento pode ser feito em universidades, nos quais os computadores estão todos sob a mesma autoridade, mas não em favelas, por exemplo.…”
Section: Detectando Cryptojackingunclassified
“…A related area of research is building signatures based on code instrumentation or performance counters. Several studies have used this approach to identify patterns in applications' power consumption [15]- [17] or resource usage [18]- [21] or to detect anomalous behavior [22]. They build these signatures from traces of performance counter values rather than power consumption, and performance counters can be collected much more frequently than the standard 1 Hz for system-level power measurements in HPC [23].…”
Section: Related Workmentioning
confidence: 99%
“…Finally, the most common trends in the rapprochement between QoS and security are the following: (i) tests to evaluate the performance of new security solutions ; (ii) studies of the network QoS to help to detect the existence of threats ; and (iii) security techniques to help to prevent the QoS degradation (SfQ) . Also we find studies where the QoS is considered as a prerequisite for the development of security applications (QfS) .…”
Section: Analysis Of Existing Solutionsmentioning
confidence: 99%