Learn More
We present an approach to the runtime monitoring of network traffic for the violation of properties specified in classical predicate logic. The properties are expressed by quantified formulas which are interpreted over sequences of messages, i.e., the quantified variable denotes a position in the sequence. Using the ordering of stream positions and nested(More)
—We present a novel approach to the runtime monitoring of network traffic where from a high-level specification of security properties an executable monitor is generated; this monitor observes the network traffic in real time for violation of the specified properties in order to report respectively prevent these violations. The specification formalism is(More)
Reliably running large server infrastructures requires continuous monitoring of system states. Nowadays, these infrastructures are often being executed on an IaaS cloud infrastructure. At its heart IaaS cloud computing heavily relies on virtualization technology spanning from virtualized servers to networks. Compared to a typical server setup,(More)
In an increasingly networked society users are spending more and more time on online activities every day. This is enforced by the continuous migration of applications from local environments to web-based offerings. As a consequence the daily life of people and industries are already depending on the availability of online resources. Still end-user devices(More)
Due to the ever increasing amounts of data in application areas relevant both for business and research, the requirements for data handling have increased significantly over the last years, often exceeding the capabilities of standard software, which has been used in specific application areas. To face this challenges software needs to be adapted or(More)
  • 1