Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/58318
Citations
Scopus Web of Science® Altmetric
?
?
Type: Conference paper
Title: Significance-based failure and interference detection in data streams
Author: Falkner, N.
Sheng, Q.
Citation: Database and Expert systems applications: 20th International Conference, DEXA 2009, Linz, Austria, August 31-September 4, 2009, Proceedings;. pp.645-659
Publisher: Springer-Verlag
Publisher Place: Germany
Issue Date: 2009
Series/Report no.: Lecture Notes in Computer Science; 5690
ISBN: 3642035728
9783642035722
ISSN: 0302-9743
1611-3349
Conference Name: International Conference on Database and Expert Systems Applications (DEXA) (31 Aug 2010 - 4 Sep 2009 : Austria)
Editor: Bhowmick, S.S.
Kung, J.
Wagner, R.
Statement of
Responsibility: 
Nickolas J.G. Falkner and Quan Z. Sheng
Abstract: Detecting the failure of a data stream is relatively easy when the stream is continually full of data. The transfer of large amounts of data allows for the simple detection of interference, whether accidental or malicious. However, during interference, data transmission can become irregular, rather than smooth. When the traffic is intermittent, it is harder to detect when failure has occurred and may lead to an application at the receiving end requesting retransmission or disconnecting. Request retransmission places additional load on a system and disconnection can lead to unnecessary reversion to a checkpointed database, before reconnecting and reissuing the same request or response. In this paper, we model the traffic in data streams as a set of significant events, with an arrival rate distributed with a Poisson distribution. Once an arrival rate has been determined, over-time, or lost, events can be determined with a greater chance of reliability. This model also allows for the alteration of the rate parameter to reflect changes in the system and provides support for multiple levels of data aggregation. One significant benefit of the Poisson-based model is that transmission events can be deliberately manipulated in time to provide a steganographic channel that confirms sender/receiver identity.
Rights: © Springer-Verlag Berlin Heidelberg 2009
DOI: 10.1007/978-3-642-03573-9_54
Published version: http://dx.doi.org/10.1007/978-3-642-03573-9_54
Appears in Collections:Aurora harvest 5
Computer Science publications

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.