proprietary interfaces of middleware products or ma-
nipulates middleware for monitoring. A disadvan-
tage of code instrumentation is that the primary busi-
ness logic of the software is mixed with monitoring
logic, which may reduce the readability of the code
(and therefore, the maintainability). However, code
instrumentation avoids dependencies on manipulated
middleware or proprietary middleware interfaces. To
reduce the problem of mixing business and monitor-
ing logic in the source code, we employ an approach
based on Aspect-Oriented Programming (AOP). AOP
is a technique to isolate cross-cutting concerns, such
as monitoring, from the primary business logic. In
a previous case study, we evaluated the monitoring
overhead and the maintainability of this monitoring
approach in a large business system of a German
telecommunication provider (Focke et al., 2007).
Additionally, maintainability is addressed by au-
tomatically creating the profile of normal timing be-
havior from historical data. To derive the model, no
intrusive changes to the software system are required,
it is merely necessary to perform the system instru-
mentation as described in the previous section.
5 CONCLUSION
This paper motivates anomaly detection for failure di-
agnosis in enterprise information systems. Anomaly
detection allows to target failures caused by faults in
the application-layer. The problem of anomaly de-
tection was successfully targeted for failure diagnosis
in industrial manufacturing, network management, or
system security. Anomaly detection for failure diag-
nosis in EIS is far less studied, but promising first re-
sults indicated the potential benefits.
We propose a new approach to anomaly detection
for EIS based on timing behavior analysis. The ma-
jor concepts are workload awareness, and user request
awareness to improve the anomaly detection quality
by reducing the dependence to the changes in the op-
erational profile, which should reduce the number of
false alarms. From another point of view, the higher
robustness against workload changes increases the ap-
plicability to multi-user applications by omitting the
requirement of non-concurrent system usage. The
maintainability of our monitoring approach has been
shown during an evaluation in an EIS of a telecom-
munication company. In future work we will perform
an evaluation of the anomaly detection approach.
We discussed that the dynamic nature of enter-
prise application systems requires that in particular
the maintainability of a failure diagnosis approach for
EIS is important and outlined that anomaly detection
can be realized in a maintainable way.
ACKNOWLEDGEMENTS
This work is supported by the German Research
Foundation (DFG), grant GRK 1076/1.
REFERENCES
Agarwal, M. K., Appleby, K., Gupta, M., Kar, G., Neogi,
A., and Sailer, A. (2004). Problem determination us-
ing dependency graphs and run-time behavior mod-
els. In 15th IFIP/IEEE International Workshop on
Distributed Systems: Operations and Management
(DSOM’04), volume 3278 of Lecture Notes in Com-
puter Science, pages 171–182. Springer.
Avi
ˇ
zienis, A., Laprie, J.-C., Randell, B., and Landwehr, C.
(2004). Basic concepts and taxonomy of dependable
and secure computing. IEEE Transactions on Depend-
able and Secure Computing, 1(1):11–33.
Bocaniala, C. D. and Palade, V. (2006). Computational in-
telligence methodologies in fault diagnosis: Review
and state of the art. In Computational Intelligence in
Fault Diagnosis, Advanced Information and Knowl-
edge Processing, chapter 1, pages 1–36. Springer.
Denning, D. (1987). An intrusion-detection model. IEEE
Transactions on Software Engineering, 13(2):222–
232.
Focke, T., Hasselbring, W., Rohr, M., and Schute, J.-G.
(2007). Instrumentierung zum Monitoring mittels
Aspekt-orientierter Programmierung. In Proceedings
Software Engineering 2007, Hamburg, GI-Edition –
Lecture Notes in Informatics. Bonner K
¨
ollen Verlag.
Hoke, E., Sun, J., Strunk, J. D., Ganger, G. R., and Falout-
sos, C. (2006). Intemon: continuous mining of sensor
data in large-scale self-infrastructures. SIGOPS Oper.
Syst. Rev., 40(3):38–44.
Kiciman, E. (2005). Using Statistical Monitoring to De-
tect Failures in Internet Services. PhD thesis, Stanford
University.
Maxion, R. A. (1990). Anomaly detection for network diag-
nosis. In Randell, B., editor, Proceedings of the 20th
International Symposium on Fault-Tolerant Comput-
ing (FTCS ’90), pages 20–27. IEEE.
Maxion, R. A. and Olszewski, R. T. (1993). Detection and
discrimination of injected network faults. In Digest of
Papers of the 23rd Internation Symposium on Fault-
Tolerant Computing, pages 198–207. IEEE.
Mielke, A. (2006). Elements for response-time statistics
in ERP transaction systems. Performance Evaluation,
63(7):635–653.
Steinder, M. and Sethi, A. S. (2004). A survey of fault lo-
calization techniques in computer networks. Science
of Computer Programming, 53(2):165–194.
TIMING BEHAVIOR ANOMALY DETECTION IN ENTERPRISE INFORMATION SYSTEMS
497