Abstract
The CoMiFin framework can be considered as a highly dynamic controlled system that evolves over time according to SR interactions and the event processing activities performed within SRs. SR event processing requires the ability to allocate and manage online the resources that are necessary for the processing itself, and for meeting the SR business level objectives. These objectives are usually specified in the SR contracts as service level agreements. Accordingly, it is crucial to continuously monitor the operation of the CoMiFin framework in order to ensure its compliance with the specifications of the expected behavior. This chapter describes an efficient monitoring system that (a) collects vital infrastructure metrics (e.g., CPU/memory utilization) and application data (e.g., the number of processed events) from the set of resources and services used for event processing purposes, and (b) processes those metrics to detect violations of the SR contract. The monitoring architecture is model-driven so that changes in the resources or the system objectives can be automatically mapped to monitoring assets. It is implemented in a plugin-based fashion, which enables the flexible extension of evaluation features to capture the complex behavior of the system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Acquisti, A.: Essays on privacy, anonymity, and tracking in computer-mediated economic transactions. Ph.D. thesis, UC Berkeley (2003)
Basili, V.: The goal question metric approach. In: Encyclopedia of Software Engineering, pp. 528–532 (1994)
Berander, P., Jönsson, P.: A goal question metric based approach for efficient measurement framework definition. In: Proc. of the 2006 ACM/IEEE International Symposium on Empirical Software Engineering, pp. 316–325 (2006)
JBoss Community: Drools, Dec 2010. http://www.jboss.org/drools/
Debusmann, M., Kroger, R., Geihs, K.: Unifying service level management using an MDA-based approach. In: Network Operations and Management Symposium, 2004. NOMS 2004. IEEE/IFIP, vol. 1, pp. 801–814. IEEE, New York (2004)
Ghani, H., Khelil, A., Suri, N., Gönczy, L., Csertán, G., Urbanics, G., Clarke, J.: A metrics based approach for assessing the quality of critical infrastructure protection (The CoMiFin Project Approach). In: Proc. of the 1st International Workshop on the Security of the Internet of Things (SecIoT) (2010)
Khelil, A., Jeckel, S., Germanus, D., Suri, N.: Towards Benchmarking of P2P technologies from a SCADA systems protection perspective. In: Proc. of the 2nd International Conference on Mobile Lightweight Wireless Systems (MOBILIGHT) (2010)
Nagios Enterprises: Nagios—The Industry Standard in IT Infrastructure Monitoring, Dec 2010. http://www.nagios.org/
Grance, T., Hash, J., Stevens, M., O’Neal, K., Bartol, N.: Security metrics guide for information technology systems. In: NIST report 800-35 (2003)
Institute for Information Infrastructure Protection. I3P: Institute for Information Infrastructure Protection (2010)
Keller, A., Ludwig, H.: The WSLA framework specifying and monitoring service level agreements for web services. J. Netw. Syst. Manag. 1, 57–81 (2003)
Kumaran, S., Bishop, P., Chao, T., Dhoolia, P., Jain, P., Jaluka, R., Ludwig, H., Moyer, A., Nigam, A.: Using a model-driven transformational approach and service-oriented architecture for service delivery management. IBM Syst. J. 46(3), 513–529 (2007)
Lodi, G., Baldoni, R., Csertan, G., Elshaafi, H., Gonczy, L., Mulcahy, B.: Trust management in monitoring financial critical information infrastructures. In: Proc. of the 2nd International Conference on Mobile Lightweight Wireless Systems—Critical Information Infrastructure Protection Track (2010)
Momm, C., Detsch, T., Gebhart, M., Abeck, S.: Model-driven development of monitored web service compositions. In: 15th HPSUA Workshop (2008)
Naqvi, S., Riguidel, M.: Quantifiable security metrics for large scale heterogeneous systems. In: Proc. of the 40th Annual IEEE International Carnahan Conferences Security Technology, pp. 209–215 (2006)
National Institute of Standards and Technology (NIST). National Institute of Standards and Technology (2010)
Savola, R.: A novel security metrics taxonomy for R&D organizations. In: Proc. of the Innovative Minds Conference (ISSA), pp. 379–390 (2008)
Seddigh, N., Pieda, P., Matrawy, A., Nandy, B., Lambadaris, I., Hatfield, A.: Current trends and advances in information assurance metrics. In: Proc. of the Second Annual Conference on Privacy, Security and Trust (PST), pp. 197–205 (2004)
Stoddard, M., Haimes, Y., Bodeau, D., Lian, C., Carlson, R., Santos, J., Glantz, C., Shaw, J.: Process control system security metrics, state of practice. Technical report, Institute for Information Infrastructure Protection Research (2005)
Vaughn, R.B., Henning, R., Siraj, A.: Information assurance measures and metrics state of practice and proposed taxonomy. In: Proc. of the 36th Annual Hawaii International Conference on System Sciences (HICSS), vol. 9, pp. 331–340 (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Esteves Verssimo, P. et al. (2012). Monitoring and Evaluation of Semantic Rooms. In: Baldoni, R., Chockler, G. (eds) Collaborative Financial Infrastructure Protection. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20420-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-20420-3_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20419-7
Online ISBN: 978-3-642-20420-3
eBook Packages: Computer ScienceComputer Science (R0)