Skip to main content

Showing 1–3 of 3 results for author: Avritzer, A

.
  1. Improving Predictability of User-Affecting Metrics to Support Anomaly Detection in Cloud Services

    Authors: Vilc Rufino, Mateus Nogueira, Alberto Avritzer, Daniel Menasché, Barbara Russo, Andrea Janes, Vincenzo Ferme, André Van Hoorn, Henning Schulz, Cabral Lima

    Abstract: Anomaly detection systems aim to detect and report attacks or unexpected behavior in networked systems. Previous work has shown that anomalies have an impact on system performance, and that performance signatures can be effectively used for implementing an IDS. In this paper, we present an analytical and an experimental study on the trade-off between anomaly detection based on performance signatur… ▽ More

    Submitted 24 December, 2020; originally announced December 2020.

    Journal ref: IEEE Access, vol. 8, p.198152-198167, 2020

  2. arXiv:2006.08811  [pdf, other

    cs.CR cs.SE

    A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm Rate

    Authors: Charles F. Gonçalves, Daniel S. Menasché, Alberto Avritzer, Nuno Antunes, Marco Vieira

    Abstract: The complexity and ubiquity of modern computing systems is a fertile ground for anomalies, including security and privacy breaches. In this paper, we propose a new methodology that addresses the practical challenges to implement anomaly detection approaches. Specifically, it is challenging to define normal behavior comprehensively and to acquire data on anomalies in diverse cloud environments. To… ▽ More

    Submitted 15 June, 2020; originally announced June 2020.

    Comments: 2020 Mediterranean Communication and Computer Networking Conference (MedComNet)

    ACM Class: C.4

  3. arXiv:1410.1160  [pdf, other

    cs.CR eess.SY

    On Benchmarking Intrusion Detection Systems in Virtualized Environments

    Authors: Aleksandar Milenkoski, Samuel Kounev, Alberto Avritzer, Nuno Antunes, Marco Vieira

    Abstract: Modern intrusion detection systems (IDSes) for virtualized environments are deployed in the virtualization layer with components inside the virtual machine monitor (VMM) and the trusted host virtual machine (VM). Such IDSes can monitor at the same time the network and host activities of all guest VMs running on top of a VMM being isolated from malicious users of these VMs. We refer to IDSes for vi… ▽ More

    Submitted 5 October, 2014; originally announced October 2014.

    Comments: SPEC (Standard Performance Evaluation Corporation) Research Group --- IDS Benchmarking Working Group

    Report number: SPEC-RG-2013-002