Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Software Failure Investigation (eBook)

A Near-Miss Analysis Approach
eBook Download: PDF
2017 | 1st ed. 2018
IX, 119 Seiten
Springer International Publishing (Verlag)
978-3-319-61334-5 (ISBN)

Lese- und Medienproben

Software Failure Investigation - Jan Eloff, Madeleine Bihina Bella
Systemvoraussetzungen
96,29 inkl. MwSt
(CHF 93,95)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This book reviews existing operational software failure analysis techniques and proposes near-miss analysis as a novel, and new technique for investigating and preventing software failures. The authors provide details on how near-miss analysis techniques focus on the time-window before the software failure actually unfolds, so as to detect the high-risk conditions that can lead to a major failure. They detail how by alerting system users of an upcoming software failure, the detection of near misses provides an opportunity to collect at runtime failure-related data that is complete and relevant. They present a near-miss management systems (NMS) for detecting upcoming software failures, which can contribute significantly to the improvement of the accuracy of the software failure analysis. A prototype of the NMS is implemented and is discussed in the book. The authors give a practical hands-on approach towards doing software failure investigations by means of near-miss analysis that is of use to industry and academia

Professor Jan Eloff graduated in 1985 with a PhD in Computer Science. Up to June 2015 he was appointed as the Research Director for SAP Research in Africa and is currently appointed as Deputy Dean Research & Postgraduate studies: Faculty of Eng., Built Environment and IT (EBIT) and as a full professor in computer science at the University of Pretoria. From 2007 he is an associate-editor of the Computers & Security journal and an editorial member for the international Computer Fraud & Security bulletin published by Elsevier. He is an internationally recognised researcher and has published 113 peer reviewed papers with 3537 citations.

Dr. Madeleine Bihina Bella has over 10 years of industry experience with expertise in IT security and business analysis working in leading roles in a number of multinationals across various industries. She is also a part-time computer science lecturer. In 2015 she graduated with a PhD in Computer Science from the University of Pretoria specializing in the field of digital forensics. Her research focused on near-miss analysis as a novel technique to improve the forensic investigation of software failures. '. She received a number of awards for her doctoral research including the South African Women in Science Award, the Google Women Techmakers sholarship and the L'Oréal/UNESCO Regional Fellowship for Women in Science in Sub-Saharan Africa. She has published a number of journal and conference papers.

Professor Jan Eloff graduated in 1985 with a PhD in Computer Science. Up to June 2015 he was appointed as the Research Director for SAP Research in Africa and is currently appointed as Deputy Dean Research & Postgraduate studies: Faculty of Eng., Built Environment and IT (EBIT) and as a full professor in computer science at the University of Pretoria. From 2007 he is an associate-editor of the Computers & Security journal and an editorial member for the international Computer Fraud & Security bulletin published by Elsevier. He is an internationally recognised researcher and has published 113 peer reviewed papers with 3537 citations.Dr. Madeleine Bihina Bella has over 10 years of industry experience with expertise in IT security and business analysis working in leading roles in a number of multinationals across various industries. She is also a part-time computer science lecturer. In 2015 she graduated with a PhD in Computer Science from the University of Pretoria specializing in the field of digital forensics. Her research focused on near-miss analysis as a novel technique to improve the forensic investigation of software failures. ”. She received a number of awards for her doctoral research including the South African Women in Science Award, the Google Women Techmakers sholarship and the L’Oréal/UNESCO Regional Fellowship for Women in Science in Sub-Saharan Africa. She has published a number of journal and conference papers.

Contents 6
Chapter 1: Introduction 9
1.1 Introduction: Software Failures and the Investigation Thereof 9
1.2 Objectives, Scope and Context of This Book 12
1.3 Main Terminology Used in This Book: Definitions 13
1.4 Layout of This Book: How to Use the Rest of the Book 13
Chapter 2: Software Failures: An Overview 15
2.1 Introduction 15
2.2 Overview of Software Failures 15
2.3 Overview of Major Software Failures 17
2.4 Software Failures According to Industry 27
2.5 Requirements for Accurate Software Failure Investigation 30
2.6 Conclusion 32
Chapter 3: Near-Miss Analysis: An Overview 33
3.1 Introduction 33
3.2 Background and Review on Near-Miss Analysis 35
3.3 Tools and Techniques Used in Near-Miss Analysis 36
3.4 Benefits of Near Miss-Analysis Over Failure Analysis 38
3.5 Benefits of Analysing Near Misses Instead of Earlier Precursors 39
3.6 Near-Miss Analysis Success Stories 40
3.7 Challenges to Near-Miss Analysis in the Software Industry 40
3.8 A Structured Approach Towards Applying Near-Miss Analysis for Software Failure Investigations 41
3.9 Conclusion 45
Chapter 4: A Methodology for Investigating Software Failures Using Digital Forensics and Near-Miss Analysis 46
4.1 Introduction 46
4.2 Overview of Digital Forensics 46
4.3 Motivation for Using Digital Forensics for Software Failure Investigations 48
4.4 Digital Forensic Building Blocks 52
4.4.1 Overview of Best Practices in Digital Forensics 56
4.5 The Adapted Digital Forensic Process Model for Software Failure Investigations Incorporating the Use of Near-Miss Analysis 57
4.5.1 Phase 1: Evidence Collection 58
4.5.2 Phase 2: System Restoration 59
4.5.3 Phase 3: Root-Cause Analysis 59
4.5.4 Phase 4: Countermeasures Specifications 61
4.6 Interfacing the Proposed “Adapted Digital Forensic Process Model for Software Failure Investigations” with Existing IT Governance Frameworks such as ITIL 63
4.7 Conclusion 63
Chapter 5: A Well-Defined Model for Near-Miss Detection and Prioritisation 64
5.1 Introduction 64
5.2 Formal Definition of a Near Miss for Software Systems 64
5.3 Overview of Reliability Theory and Failure Probability Formula for IT Systems 67
5.4 The Reliability Theory of Redundant Hardware Components 68
5.5 Failure Probability Formula for Hardware Components 69
5.6 Proposed Failure Probability Formula for Software Components 69
5.7 Mathematical Modelling for Near-Miss Failure Probability 70
5.8 Prioritisation of Near Misses and the Near-Miss Prioritisation Formula 73
5.9 Conclusion 75
Chapter 6: An Architecture for a Near-Miss Management System (NMS) 76
6.1 Introduction 76
6.2 The NMS Architecture 76
6.3 The Near-Miss Monitor 77
6.4 The Near-Miss Classifier 79
6.5 The Near-Miss Data Collector 79
6.6 The Failure Prevention 79
6.7 The Event Investigation 79
6.8 Conclusion 80
Chapter 7: Practical Demonstration of Conducting a Near-Miss Analysis Investigation for Software Failures 82
7.1 Introduction 82
7.2 The Aims of the Prototype 82
7.3 Setting Up the Lab Environment 83
7.3.1 The Logs of a Software Failure on the Application Layer 84
7.3.2 System Logs 85
7.3.3 The Investigation Tools 87
7.4 Near-Miss Indicators 89
7.4.1 Formulate Hypothesis 90
7.4.2 Predict Evidence for the Hypothesis 90
7.4.3 Test Hypothesis with Experiment 90
7.4.4 Technical Set-Up 90
7.4.5 Results 91
7.4.6 SOM Analysis of Latency: Result 93
7.4.7 Technical Set-Up 93
7.4.8 Result 94
7.4.9 Technical Set-Up 95
7.4.10 Result 95
7.4.11 Technical Set-Up 98
7.4.12 Result 98
7.5 Near-Miss Formula 101
7.6 Conclusion 107
Appendix: Technical Details of the SOM Analysis 108
SOM Map Creation Process 108
How to Read Viscovery SOMine Output Maps: Example of First 1000 Records 108
Adding the Number of Running Processes to the C++ Program 110
Bibliography 111
Index 123

Erscheint lt. Verlag 7.9.2017
Zusatzinfo IX, 119 p. 83 illus., 21 illus. in color.
Verlagsort Cham
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Software Entwicklung
Mathematik / Informatik Informatik Web / Internet
Technik Elektrotechnik / Energietechnik
Wirtschaft Betriebswirtschaft / Management
Schlagworte digital forensics • downtime • Failure analysis • forensic investigation • Near-miss analysis • Near-miss management system (NMS) • Quality Control, Reliability, Safety and Risk • Reliability • Root-cause analysis • Software failure
ISBN-10 3-319-61334-0 / 3319613340
ISBN-13 978-3-319-61334-5 / 9783319613345
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 4,1 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Jürgen Sieben

eBook Download (2023)
Rheinwerk Computing (Verlag)
CHF 87,80
Eine kompakte Einführung

von Brendan Burns; Joe Beda; Kelsey Hightower; Lachlan Evenson

eBook Download (2023)
dpunkt (Verlag)
CHF 38,95
Grundlagen, Menschen, Prozesse, Techniken

von Jochen Ludewig; Horst Lichter

eBook Download (2023)
dpunkt (Verlag)
CHF 48,75