19,047 research outputs found
A log mining approach for process monitoring in SCADA
SCADA (Supervisory Control and Data Acquisition) systems are used for controlling and monitoring industrial processes. We propose a methodology to systematically identify potential process-related threats in SCADA. Process-related threats take place when an attacker gains user access rights and performs actions, which look legitimate, but which are intended to disrupt the SCADA process. To detect such threats, we propose a semi-automated approach of log processing. We conduct experiments on a real-life water treatment facility. A preliminary case study suggests that our approach is effective in detecting anomalous events that might alter the regular process workflow
Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities
Critical Infrastructures (CIs), such as smart power grids, transport systems,
and financial infrastructures, are more and more vulnerable to cyber threats,
due to the adoption of commodity computing facilities. Despite the use of
several monitoring tools, recent attacks have proven that current defensive
mechanisms for CIs are not effective enough against most advanced threats. In
this paper we explore the idea of a framework leveraging multiple data sources
to improve protection capabilities of CIs. Challenges and opportunities are
discussed along three main research directions: i) use of distinct and
heterogeneous data sources, ii) monitoring with adaptive granularity, and iii)
attack modeling and runtime combination of multiple data analysis techniques.Comment: EDCC-2014, BIG4CIP-201
A Method to Improve the Early Stages of the Robotic Process Automation Lifecycle
The robotic automation of processes is of much interest to
organizations. A common use case is to automate the repetitive manual
tasks (or processes) that are currently done by back-office staff
through some information system (IS). The lifecycle of any Robotic Process
Automation (RPA) project starts with the analysis of the process
to automate. This is a very time-consuming phase, which in practical
settings often relies on the study of process documentation. Such documentation
is typically incomplete or inaccurate, e.g., some documented
cases never occur, occurring cases are not documented, or documented
cases differ from reality. To deploy robots in a production environment
that are designed on such a shaky basis entails a high risk. This paper
describes and evaluates a new proposal for the early stages of an RPA
project: the analysis of a process and its subsequent design. The idea is to
leverage the knowledge of back-office staff, which starts by monitoring
them in a non-invasive manner. This is done through a screen-mousekey-
logger, i.e., a sequence of images, mouse actions, and key actions
are stored along with their timestamps. The log which is obtained in
this way is transformed into a UI log through image-analysis techniques
(e.g., fingerprinting or OCR) and then transformed into a process model
by the use of process discovery algorithms. We evaluated this method for
two real-life, industrial cases. The evaluation shows clear and substantial
benefits in terms of accuracy and speed. This paper presents the method,
along with a number of limitations that need to be addressed such that
it can be applied in wider contexts.Ministerio de Economía y Competitividad TIN2016-76956-C3-2-
Data-Driven Application Maintenance: Views from the Trenches
In this paper we present our experience during design, development, and pilot
deployments of a data-driven machine learning based application maintenance
solution. We implemented a proof of concept to address a spectrum of
interrelated problems encountered in application maintenance projects including
duplicate incident ticket identification, assignee recommendation, theme
mining, and mapping of incidents to business processes. In the context of IT
services, these problems are frequently encountered, yet there is a gap in
bringing automation and optimization. Despite long-standing research around
mining and analysis of software repositories, such research outputs are not
adopted well in practice due to the constraints these solutions impose on the
users. We discuss need for designing pragmatic solutions with low barriers to
adoption and addressing right level of complexity of problems with respect to
underlying business constraints and nature of data.Comment: Earlier version of paper appearing in proceedings of the 4th
International Workshop on Software Engineering Research and Industrial
Practice (SER&IP), IEEE Press, pp. 48-54, 201
ADEPT2 - Next Generation Process Management Technology
If current process management systems shall be applied to a broad spectrum of applications, they will have to be significantly improved with respect to their technological capabilities. In particular, in dynamic environments it must be possible to quickly implement and deploy new processes, to enable ad-hoc modifications of single process instances at runtime (e.g., to add, delete or shift process steps), and to support process schema evolution with instance migration, i.e., to propagate process schema changes to already running instances. These requirements must be met without affecting process consistency and by preserving the robustness of the process management system. In this paper we describe how these challenges have been addressed and solved in the ADEPT2 Process Management System. Our overall vision is to provide a next generation process management technology which can be used in a variety of application domains
Recommended from our members
Commodities and Linkages: Industrialisation in Sub-Saharan Africa
In a complementary Discussion Paper (MMCP DP 12 2011) we set out the reasons why we believe that there is extensive scope for linkage development into and out of SSA’s commodities sectors. In this Discussion Paper, we present the findings of our detailed empirical enquiry into the determinants of the breadth and depth of linkages in eight SSA countries (Angola, Botswana, Gabon, Ghana, Nigeria, South Africa Tanzania, and Zambia) and six sectors (copper, diamonds, gold, oil and gas, mining services and timber). We conclude from this detailed research that the extent of linkages varies as a consequence of four factors which intrinsically affect their progress – the passage of time, the complexity of the sector and the level of capabilities in the domestic economy. However, beyond this we identify three sets of related factors which determined the nature and pace of linkage development. The first is the structure of ownership, both in lead commodity producing firms and in their suppliers and domestic customers. The second is the nature and quality of both hard infrastructure (for example, roads and ports) and soft infrastructure (for example, the efficiency of customs clearance). The third is the availability of skills and the structure and orientation of the National System of Innovation in the domestic economy. The fourth, and overwhelmingly important contextual factor is policy. This reflects policy towards the commodity sector itself, and policy which affects the three contextual drivers, namely ownership, infrastructure and capabilities. As a result of this comparative analysis we provided an explanation of why linkage development was progressive in some economies (such as Botswana) and regressive in others (such as Tanzania). This cluster of factors also explains why the breadth and depth of linkages is relative advanced in some countries (such as South Africa), and at a very nascent stage in other countries (such as Angola)
Grand Challenges of Traceability: The Next Ten Years
In 2007, the software and systems traceability community met at the first
Natural Bridge symposium on the Grand Challenges of Traceability to establish
and address research goals for achieving effective, trustworthy, and ubiquitous
traceability. Ten years later, in 2017, the community came together to evaluate
a decade of progress towards achieving these goals. These proceedings document
some of that progress. They include a series of short position papers,
representing current work in the community organized across four process axes
of traceability practice. The sessions covered topics from Trace Strategizing,
Trace Link Creation and Evolution, Trace Link Usage, real-world applications of
Traceability, and Traceability Datasets and benchmarks. Two breakout groups
focused on the importance of creating and sharing traceability datasets within
the research community, and discussed challenges related to the adoption of
tracing techniques in industrial practice. Members of the research community
are engaged in many active, ongoing, and impactful research projects. Our hope
is that ten years from now we will be able to look back at a productive decade
of research and claim that we have achieved the overarching Grand Challenge of
Traceability, which seeks for traceability to be always present, built into the
engineering process, and for it to have "effectively disappeared without a
trace". We hope that others will see the potential that traceability has for
empowering software and systems engineers to develop higher-quality products at
increasing levels of complexity and scale, and that they will join the active
community of Software and Systems traceability researchers as we move forward
into the next decade of research
Grand Challenges of Traceability: The Next Ten Years
In 2007, the software and systems traceability community met at the first
Natural Bridge symposium on the Grand Challenges of Traceability to establish
and address research goals for achieving effective, trustworthy, and ubiquitous
traceability. Ten years later, in 2017, the community came together to evaluate
a decade of progress towards achieving these goals. These proceedings document
some of that progress. They include a series of short position papers,
representing current work in the community organized across four process axes
of traceability practice. The sessions covered topics from Trace Strategizing,
Trace Link Creation and Evolution, Trace Link Usage, real-world applications of
Traceability, and Traceability Datasets and benchmarks. Two breakout groups
focused on the importance of creating and sharing traceability datasets within
the research community, and discussed challenges related to the adoption of
tracing techniques in industrial practice. Members of the research community
are engaged in many active, ongoing, and impactful research projects. Our hope
is that ten years from now we will be able to look back at a productive decade
of research and claim that we have achieved the overarching Grand Challenge of
Traceability, which seeks for traceability to be always present, built into the
engineering process, and for it to have "effectively disappeared without a
trace". We hope that others will see the potential that traceability has for
empowering software and systems engineers to develop higher-quality products at
increasing levels of complexity and scale, and that they will join the active
community of Software and Systems traceability researchers as we move forward
into the next decade of research
- …