Skip to main content

Abstract

The CoMiFin framework can be considered as a highly dynamic controlled system that evolves over time according to SR interactions and the event processing activities performed within SRs. SR event processing requires the ability to allocate and manage online the resources that are necessary for the processing itself, and for meeting the SR business level objectives. These objectives are usually specified in the SR contracts as service level agreements. Accordingly, it is crucial to continuously monitor the operation of the CoMiFin framework in order to ensure its compliance with the specifications of the expected behavior. This chapter describes an efficient monitoring system that (a) collects vital infrastructure metrics (e.g., CPU/memory utilization) and application data (e.g., the number of processed events) from the set of resources and services used for event processing purposes, and (b) processes those metrics to detect violations of the SR contract. The monitoring architecture is model-driven so that changes in the resources or the system objectives can be automatically mapped to monitoring assets. It is implemented in a plugin-based fashion, which enables the flexible extension of evaluation features to capture the complex behavior of the system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Acquisti, A.: Essays on privacy, anonymity, and tracking in computer-mediated economic transactions. Ph.D. thesis, UC Berkeley (2003)

    Google Scholar 

  2. Basili, V.: The goal question metric approach. In: Encyclopedia of Software Engineering, pp. 528–532 (1994)

    Google Scholar 

  3. Berander, P., Jönsson, P.: A goal question metric based approach for efficient measurement framework definition. In: Proc. of the 2006 ACM/IEEE International Symposium on Empirical Software Engineering, pp. 316–325 (2006)

    Chapter  Google Scholar 

  4. JBoss Community: Drools, Dec 2010. http://www.jboss.org/drools/

  5. Debusmann, M., Kroger, R., Geihs, K.: Unifying service level management using an MDA-based approach. In: Network Operations and Management Symposium, 2004. NOMS 2004. IEEE/IFIP, vol. 1, pp. 801–814. IEEE, New York (2004)

    Chapter  Google Scholar 

  6. Ghani, H., Khelil, A., Suri, N., Gönczy, L., Csertán, G., Urbanics, G., Clarke, J.: A metrics based approach for assessing the quality of critical infrastructure protection (The CoMiFin Project Approach). In: Proc. of the 1st International Workshop on the Security of the Internet of Things (SecIoT) (2010)

    Google Scholar 

  7. Khelil, A., Jeckel, S., Germanus, D., Suri, N.: Towards Benchmarking of P2P technologies from a SCADA systems protection perspective. In: Proc. of the 2nd International Conference on Mobile Lightweight Wireless Systems (MOBILIGHT) (2010)

    Google Scholar 

  8. Nagios Enterprises: Nagios—The Industry Standard in IT Infrastructure Monitoring, Dec 2010. http://www.nagios.org/

  9. Grance, T., Hash, J., Stevens, M., O’Neal, K., Bartol, N.: Security metrics guide for information technology systems. In: NIST report 800-35 (2003)

    Google Scholar 

  10. Institute for Information Infrastructure Protection. I3P: Institute for Information Infrastructure Protection (2010)

    Google Scholar 

  11. Keller, A., Ludwig, H.: The WSLA framework specifying and monitoring service level agreements for web services. J. Netw. Syst. Manag. 1, 57–81 (2003)

    Article  Google Scholar 

  12. Kumaran, S., Bishop, P., Chao, T., Dhoolia, P., Jain, P., Jaluka, R., Ludwig, H., Moyer, A., Nigam, A.: Using a model-driven transformational approach and service-oriented architecture for service delivery management. IBM Syst. J. 46(3), 513–529 (2007)

    Article  Google Scholar 

  13. Lodi, G., Baldoni, R., Csertan, G., Elshaafi, H., Gonczy, L., Mulcahy, B.: Trust management in monitoring financial critical information infrastructures. In: Proc. of the 2nd International Conference on Mobile Lightweight Wireless Systems—Critical Information Infrastructure Protection Track (2010)

    Google Scholar 

  14. Momm, C., Detsch, T., Gebhart, M., Abeck, S.: Model-driven development of monitored web service compositions. In: 15th HPSUA Workshop (2008)

    Google Scholar 

  15. Naqvi, S., Riguidel, M.: Quantifiable security metrics for large scale heterogeneous systems. In: Proc. of the 40th Annual IEEE International Carnahan Conferences Security Technology, pp. 209–215 (2006)

    Chapter  Google Scholar 

  16. National Institute of Standards and Technology (NIST). National Institute of Standards and Technology (2010)

    Google Scholar 

  17. Savola, R.: A novel security metrics taxonomy for R&D organizations. In: Proc. of the Innovative Minds Conference (ISSA), pp. 379–390 (2008)

    Google Scholar 

  18. Seddigh, N., Pieda, P., Matrawy, A., Nandy, B., Lambadaris, I., Hatfield, A.: Current trends and advances in information assurance metrics. In: Proc. of the Second Annual Conference on Privacy, Security and Trust (PST), pp. 197–205 (2004)

    Google Scholar 

  19. Stoddard, M., Haimes, Y., Bodeau, D., Lian, C., Carlson, R., Santos, J., Glantz, C., Shaw, J.: Process control system security metrics, state of practice. Technical report, Institute for Information Infrastructure Protection Research (2005)

    Google Scholar 

  20. Vaughn, R.B., Henning, R., Siraj, A.: Information assurance measures and metrics state of practice and proposed taxonomy. In: Proc. of the 36th Annual Hawaii International Conference on System Sciences (HICSS), vol. 9, pp. 331–340 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to László Gönczy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Esteves Verssimo, P. et al. (2012). Monitoring and Evaluation of Semantic Rooms. In: Baldoni, R., Chockler, G. (eds) Collaborative Financial Infrastructure Protection. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20420-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20420-3_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20419-7

  • Online ISBN: 978-3-642-20420-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics