Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD FOR OPERATING A MONITORING ENTITY
Document Type and Number:
WIPO Patent Application WO/2018/133986
Kind Code:
A1
Abstract:
The present invention relates to a method for operating a monitoring entity, 'ME', for a distributed system, said distributed system comprising a plurality of computing devices, said computing devices performing actions, comprising the steps of: Receiving, by said ME, an action message from a computing device, said message comprising information about one or more actions performed by said computing device, Generating, deleting and/or updating, by said ME, one or more nodes of a data structure stored in a memory of said ME, by processing the information of said received message and storing the processed information into said data structure, wherein said data structure represents knowledge about the behavior of said distributed system, and wherein each node specifies a policy by a formula, a node is linked by a trigger to one other node only to specify dependencies between nodes except for nodes with a formula, monitored by said ME, and wherein nodes with the same formula are mutually linked by triggers, Computing verdict information indicating one or more actions violating one or more policies based on the updated state of said data structure.

Inventors:
KLAEDTKE FELIX (DE)
Application Number:
PCT/EP2017/081693
Publication Date:
July 26, 2018
Filing Date:
December 06, 2017
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
NEC LABORATORIES EUROPE GMBH (DE)
International Classes:
G06F11/30; G06F11/07; G06F11/34
Foreign References:
US20150067404A12015-03-05
Other References:
DAVID BASIN ET AL: "Monitoring of Metric First-order Temporal Properties", 1 January 2010 (2010-01-01), XP055142354, Retrieved from the Internet [retrieved on 20140924], DOI: 10.4230/LIPIcs.FSTTCS.2008.1740
DAVID BASIN ET AL: "Policy Monitoring in First-Order Temporal Logic", 15 July 2010, COMPUTER AIDED VERIFICATION, SPRINGER BERLIN HEIDELBERG, BERLIN, HEIDELBERG, PAGE(S) 1 - 18, ISBN: 978-3-642-14294-9, XP019146657
D. BASIN; F. KLAEDTKE; E. ZALINESCU: "Failure-aware Runtime Verification of Distributed Systems", PROCEEDINGS OF THE 35TH IARCS ANNUAL CONFERENCE ON FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE (FSTTCS, 2015
"Lect. Notes Comput., Sci.", vol. 600, 1992, SPRINGER, article "Proceedings of the 1991 REX Workshop on Real Time: Theory in Practice", pages: 74 - 100
D. BASIN; F. KLAEDTKE; E. ZALINESCU: "Failure-aware Runtime Verification of Distributed Systems", FSTTCS, 2015
Attorney, Agent or Firm:
ULLRICH & NAUMANN (DE)
Download PDF:
Claims:
C l a i m s

1. A method for operating a monitoring entity, 'ME', for a distributed system , said distributed system comprising a plurality of computing devices, said computing devices performing actions,

comprising the steps of

Receiving, by said ME, an action message from a computing device, said message comprising information about one or more actions performed by said computing device,

Generating, deleting and/or updating, by said ME, one or more nodes of a data structure stored in a memory of said ME, by

processing the information of said received message and storing the processed information into said data structure, wherein said data structure represents knowledge about the behavior of said distributed system, and wherein

- each node specifies a policy by a formula,

- a node is linked by a trigger to one other node only to specify dependencies between nodes except for nodes with a formula, monitored by said ME, and wherein

- nodes with the same formula are mutually linked by triggers,

Computing verdict information indicating one or more actions violating one or more policies based on the updated state of said data structure.

2. The method according to claim 1 , wherein a time-stamp for a performed action is encoded by said computing device in said action message, and wherein nodes with the same formula are ordered in said data structure according to the time-stamps by said ME.

3. The method according to one of the claims 1 -2, wherein said ME evaluates in part a node's formula by computing its triggers.

4. The method according to claim 3, wherein said ME computes and stores a trigger between a node having a formula with temporal connective between a first subformula and a second subformula, 'temporal node', and a node having said second subformula, 'second trigger', and/or a trigger between said temporal node and a node having said first formula, 'first trigger' depending at least on the temporal connective.

5. The method according to claim 4, wherein said ME computes said triggers depending at least on the temporal connective such that a distance defined at least by said temporal connective is smaller for the first trigger than for said second trigger.

6. The method according to one of the claims 4-5, wherein said ME stores temporarily for a temporal node nodes having said second subformula with Boolean truth value and a time-stamp.

7. The method according to claim 6, wherein said ME stores temporarily for a temporal node the closest node having said second subformula and having provided said Boolean truth value.

8. The method according to one of the claims 1 -7, wherein said ME updates truth values of formulas of nodes along the triggers in the data structure.

9. The method according to one of the claims 1 -8, wherein said ME checks upon receiving said message whether said time-stamp in said received message lies within an incomplete time interval of a node and if yes, said ME generates and stores new nodes for said time-stamp and splits said time-interval at said time- stamp and computes and stores new nodes for said split parts. 10. The method according to one of the claims 1 -9, wherein said action message comprises a sequence number and said ME determines based on sequence numbers if said data structure comprises nodes with time-stamps of a complete interval and then deletes said nodes.

1 1. The method according to claim 10, wherein Boolean values of deleted nodes are stored with other nodes.

12. The method according to one of the claims 1 -1 1 , wherein said data structure stored in said memory is computed by said ME to form a graph, like a directed acyclic graph.

13. Monitoring entity, 'ME', for a distributed system, said distributed system comprising a plurality of computing devices, said computing devices performing actions,

said ME being adapted to perform the steps of

Receiving an action message from a computing device, said message comprising information about one or more actions performed by said computing device,

- Generating, deleting and/or updating one or more nodes of a data structure stored in a memory of said ME, by

processing the information of said received message and storing the processed information into said data structure, wherein said data structure represents knowledge about the behavior of said distributed system, and wherein

- each node specifies a policy by a formula,

- a node is linked by a trigger to one other node only to specify dependencies between nodes except for nodes with a formula, monitored by said ME, and wherein

- nodes with the same formula are mutually linked by triggers,

Computing verdict information indicating one or more actions violating one or more policies based on the updated state of said data structure.

14. A distributed system comprising a plurality of computing devices, said computing devices performing actions, a monitoring entity, 'ME'

adapted to perform the steps of

Receiving an action message from a computing device, said message comprising information about one or more actions performed by said computing device, Generating, deleting and/or updating one or more nodes of a data structure stored in a memory of said ME, by

processing the information of said received message and storing the processed information into said data structure, wherein said data structure represents knowledge about the behavior of said distributed system, and wherein

- each node specifies a policy by a formula,

- a node is linked by a trigger to one other node only to specify dependencies between nodes except for nodes with a formula, monitored by said ME, and wherein

- nodes with the same formula are mutually linked by triggers,

Computing verdict information indicating one or more actions violating one or more policies based on the updated state of said data structure.

and an operator adapted to provide policies, to receive verdict information of said ME and/or to initiate actions against policy violation based on said verdict information.

15. A non-transitory computer readable medium storing a program causing a computer to execute a method for operating a monitoring entity, 'ME', for a distributed system , said distributed system comprising a plurality of computing devices, said computing devices performing actions,

comprising the steps of

Receiving, by said ME, an action message from a computing device, said message comprising information about one or more actions performed by said computing device,

Generating, deleting and/or updating, by said ME, one or more nodes of a data structure stored in a memory of said ME, by

processing the information of said received message and storing the processed information into said data structure, wherein said data structure represents knowledge about the behavior of said distributed system, and wherein

- each node specifies a policy by a formula, - a node is linked by a trigger to one other node only to specify dependencies between nodes except for nodes with a formula, monitored by said ME, and wherein

- nodes with the same formula are mutually linked by triggers,

- Computing verdict information indicating one or more actions violating one or more policies based on the updated state of said data structure.

Description:
METHOD FOR OPERATING A MONITORING ENTITY

The present invention relates to a method for operating a monitoring entity, 'ME', for a distributed system, said distributed system comprising a plurality of computing devices, said computing devices performing actions.

The present invention further relates to a monitoring entity, 'ME', for a distributed system, said distributed system comprising a plurality of computing devices, said computing devices performing actions.

The present invention further relates to a distributed system comprising a plurality of computing devices. The present invention even further relates to a non-transitory computer readable medium storing a program causing a computer to execute a method for operating a monitoring entity, 'ME'.

Distributed systems, e.g., software-defined networks with switches, firewalls, network controllers or cloud-bases IT systems comprising storage devices like databases, computation devices, front-ends, etc. are more and more widespread and complex, and they can malfunction for many reasons, including malicious components, software bugs, and hardware or network failures. Conventionally monitoring components of the distributed system verify at runtime whether their performed actions comply with given policies is a possibility for debugging and auditing distributed systems, making such a distributed system more robust and secure. Such conventional policies specify, e.g., what actions must and must not be performed by a component of said distributed system, depending on its previously performed actions, and possibly also actions performed by other components. Such conventional policies may express timing constraints on the actions, e.g., the action B must be performed at most 5 milliseconds after the action A. There are known policy specification languages for expressing such kind of policies, which are based on formal languages, e.g., temporal logics and finite- state machines. Conventional runtime-verification methods make different assumptions for a distributed system and handle different specifications, differing in their expressivity. For example, it is assumed that the communication within the distributed system is reliable, e.g. no message is lost and a uniform/negligible delay for messages. Furthermore, based on these assumptions, different soundness and completeness guarantees (false positives and false negatives) of the verdicts describing e.g. when and which action caused a policy violation that the monitoring component outputs are provided. A further conventional runtime-verification method is disclosed in the non-patent literature of D. Basin, F. Klaedtke, and E. Zalinescu, "Failure-aware Runtime Verification of Distributed Systems", in the Proceedings of the 35th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS), 2015.

Conventional runtime-verification methods in general often provide weaker correctness guarantees, make strong assumptions leading to a reduced flexibility in terms of application or are inefficient and lack scalability. Embodiments of the present invention therefore address the problem of increasing scalability, efficiency and speed in particular for computing verdicts while enhancing the flexibility in terms of applications by weaker assumptions for the distributed system. In an embodiment the present invention provides a method for operating a monitoring entity, 'ME', for a distributed system, said distributed system comprising a plurality of computing devices, said computing devices performing actions, comprising the steps of

Receiving, by said ME, an action message from a computing device, said message comprising information about one or more actions performed by said computing device,

Generating, deleting and/or updating, by said ME, one or more nodes of a data structure stored in a memory of said ME, by

processing the information of said received message and storing the processed information into said data structure, wherein said data structure represents knowledge about the behavior of said distributed system, and wherein

- each node specifies a policy by a formula,

- a node is linked by a trigger to one other node only to specify dependencies between nodes except for nodes with a formula, monitored by said ME, and wherein

- nodes with the same formula are mutually linked by triggers,

Computing verdict information indicating one or more actions violating one or more policies based on the updated state of said data structure.

In other words an embodiment of the present invention provides a method for operating a monitoring entity, 'ME', for a distributed system. Said distributed system comprises a plurality of computing devices. Said computing devices perform actions and interact with each other. When said ME receives an action message from a computing device - an action message being a message, data packet or the like comprising information about one or more actions performed by the sending computing device - said ME then processes the information of said received message and stores the processed information into a data structure in a memory of said ME. The data structure represents the "knowledge" of the behavior of said distributed system. The data structure is organized in one or more nodes, wherein each node specifies a policy. This policy is represented by a formula. A node is linked within the data structure by a trigger to one other node only. These triggers between nodes specify dependencies between nodes. Nodes with a formula being monitored may have more than one trigger. Nodes having the same formula may be stored in a doubly-linked list. The ME then checks if an action violates one or more policies - monitored policies - and computes verdict information indicating one or more actions violating one or more policies when checking of the updated data structure has indicated such a violation.

In a further embodiment of the present invention provides a monitoring entity, 'ME', for a distributed system, said distributed system comprising a plurality of computing devices, said computing devices performing actions,

said ME being adapted to perform the steps of Receiving an action message from a computing device, said message comprising information about one or more actions performed by said computing device,

Generating, deleting and/or updating one or more nodes of a data structure stored in a memory of said ME, by

processing the information of said received message and storing the processed information into said data structure, wherein said data structure represents knowledge about the behavior of said distributed system, and wherein

- each node specifies a policy by a formula,

- a node is linked by a trigger to one other node only to specify dependencies between nodes except for nodes with a formula, monitored by said ME, and wherein

- nodes with the same formula are mutually linked by triggers,

Computing verdict information indicating one or more actions violating one or more policies based on the updated state of said data structure.

In a further embodiment the present invention provides a distributed system comprising a plurality of computing devices, said computing devices performing actions, a monitoring entity, 'ME'

adapted to perform the steps of

Receiving an action message from a computing device, said message comprising information about one or more actions performed by said computing device,

Generating, deleting and/or updating one or more nodes of a data structure stored in a memory of said ME, by

processing the information of said received message and storing the processed information into said data structure, wherein said data structure represents knowledge about the behavior of said distributed system, and wherein

- each node specifies a policy by a formula,

- a node is linked by a trigger to one other node only to specify dependencies between nodes except for nodes with a formula, monitored by said ME, and wherein - nodes with the same formula are mutually linked by triggers,

Computing verdict information indicating one or more actions violating one or more policies based on the updated state of said data structure.

and an operator adapted to provide policies, to receive verdict information of said ME and/or to initiate actions against policy violation based on said verdict information.

In other words an embodiment of the present invention provides a distributed system. Said distributed system comprises a plurality of computing devices. Said computing devices perform actions and interact with each other. Further the distributed system comprises a monitoring entity according to an embodiment of the present invention. Further the distributed system comprises an operator. The operator provides the policies for system behaviour. The operator further receives the verdict information computed by the monitoring entity and may then initiate actions against the determined policy violation. The operator may determine itself suitable actions or countermeasures against the policy violation. The operator may also receive from said monitoring entity proposals computed by said monitoring entity or by a recommendation entity for countermeasures or the like. In a further embodiment the present invention provides a non-transitory computer readable medium storing a program causing a computer to execute a method for operating a monitoring entity, 'ME', for a distributed system , said distributed system comprising a plurality of computing devices, said computing devices performing actions,

comprising the steps of

Receiving, by said ME, an action message from a computing device, said message comprising information about one or more actions performed by said computing device,

Generating, deleting and/or updating, by said ME, one or more nodes of a data structure stored in a memory of said ME, by

processing the information of said received message and storing the processed information into said data structure, wherein said data structure represents knowledge about the behavior of said distributed system, and wherein - each node specifies a policy by a formula,

- a node is linked by a trigger to one other node only to specify dependencies between nodes except for nodes with a formula, monitored by said ME, and wherein

- nodes with the same formula are mutually linked by triggers,

Computing verdict information indicating one or more actions violating one or more policies based on the updated state of said data structure.

At least one embodiment of the present invention may have at least one of the following advantages:

enhanced efficiency,

enhanced scalability,

fewer limitations in terms of applications,

high correctness guarantees with fewer system assumptions,

- high flexibility in terms of policies.

The terms "computing device", "computing entity", "component", "system component", "unit", "monitoring entity", "recommendation entity", "storage entity", etc. refer in particular in the claims, preferably in the description each to a device adapted to perform computing and may include but is not limited to a personal computer, a tablet, a mobile phone, a server, or the like and may comprise one or more processors having one or more cores and may be connectable to a memory for storing an application which is adapted to perform corresponding steps of one or more of the embodiments of the present invention. Any application may be software based and/or hardware based installed in the memory on which the processor(s) can work on. The computing devices or computing entities may be adapted in such a way that the corresponding steps to be computed are performed in an optimized way. For instance different steps may be performed in parallel with a single processor on different of its cores. Said devices or entities may each have one or more interfaces to communicate with the environment, e.g. other devices, humans, etc.. Examples for an interface include but are not limited to a keyboard, a mouse, a touchscreen, a USB-Port of Type A, B or C, an Ethernet Port, a PS/2- Port, a SIM-Card-Port, a Bluetooth-Port or the like. An example for a monitoring entity includes but is not linnited to a Security Information und Event Management SIEM entity or a part thereof correlating events from different system components.

The term "distributed system" is to be understood in its broadest sense and refers in particular in the claims, preferably in the specification to a network of interacting computing devices exchanging information, data or the like which perform actions solely and/or together. Examples for a distributed system include but are not limited to a software-defined network with switches, firewalls, network controllers or a cloud-based IT system comprising storage devices like databases, computation devices, front-ends, etc.

The term "network" is to be understood in its broadest sense and refers in particular in the claims, preferably in the specification to at least two computing entities being connected with each other for communication.

The term "message" is to be understood in the most general sense and refers in particular in the claims, preferably in the specification to a data packet or a certain amount of data, which can be sent, exchanged or received, preferably by a computing device.

The term "data" is to be understood in its broadest sense and refers in particular in the claims preferably in the specification to any kind of information or piece of information in a computing device-readable form or format to be transmitted, used, applied and/or received, etc. within a network.

The term "database" is to be understood in the broadest sense and refers in particular the claims, preferably in the specification to a storage entity for storing data in an organized way. For instance a database may be provided in a memory of the storage entity and may be represented as a list of identifier/word tuples where every (file) identifier id,, e I taken form the index set I is associated with j words {W j } j <n„ taken from a word dictionary W.

The term "computer readable medium" may refer to any kind of medium, which can be used together with a computation device or computer and on which information can be stored. Said information may be any kind of data which can be read into a memory of a computer. For example said information may include program code for executing with said computer. Examples of a computer readable medium are tapes, CD-ROMs, DVD-ROMs, DVD-RAMs, DVD-RWs, BluRay, DAT, MiniDisk, solid state disks SSD, floppy disks, SD-cards, CF-cards, memory-sticks, USB-sticks, EPROM, EEPROM or the like.

The term "runtime" refers in particular in the claims, preferably in the specification to a computing entity or computing device on which one or more processes, procedures, methods or the like are at the moment run, being executed, performed, processed, operated or serviced.

The term "signature" is to be understood in its broadest sense and means for example any kind of information, which can be identified or used for identification, like strings, patterns or bit-sequences.

The term "state" refers in particular in the claims, preferably in the specification to a situation, status, condition, etc. of an entity, device, data base or data structure being represented by certain values at a specific point in time.

The term "time-stamp" in to be understood in its broadest sense and refers preferably in the claims, in particular in the specification to timing information specifying one or more time points, or one or more time intervals, complete and/or incomplete. Time-stamps may be provided by logical time, wall-clock time or a combination of logical time and wall-clock time, for example from hybrid clocks or the like.

The term "assigning" with regard to computing entities and computing devices refers in particular in the claims, preferably in the specification to the virtual process of linking the entities together for performing a set of functions which is divided or separated to be performed on the linked entities.

The term "MTL" refers to a real-time logic disclosed in the non-patent literature of R. Alur and T.A. Henzinger, "Logics and models of real time: A survey", in Proceedings of the 1991 REX Workshop on Real Time: Theory in Practice, volume 600 of Lect. Notes Comput, Sci., pages 74-100, Springer, 1992.

The term "action" is to be understood in its broadest sense and refers in particular in the claims, preferably in the specification to any kind of act, activity, operation, performance or the like, for instance concrete steps for (re)assignment of computational resources to other virtual functions like allocating memory, freeing allocated memory, increasing or decreasing priority values for a virtual function on a processor, closing of ports of interfaces of a computing entity or the like.

The term "verdict information" refers in particular in the claims, preferably in the specification to any kind of information or data which can be used to identify or provide a verdict of a policy and/or to initiate countermeasures against a policy violation. For example verdict information is provided in form of a message comprising information when and which action caused a policy violation.

The term "violation" with regard to the term "policy" is to be understood in the broadest sense and refers in particular in the claims, preferably in the specification to any mismatch, non-fulfilment, gap or discrepancy of values with one or more thresholds for parameters defining a policy.

The term "tree structure" or a "tree" refers in particular in the claims, preferably in the specification to an abstract data type or data structure implementing the abstract data type simulating a hierarchical tree structure, with a root value and subtrees of children with a parent node, represented as a set of linked nodes. A tree data structure can be defined recursively (locally) as a collection of nodes - starting at a root node -, where each node is a data structure comprising a value, together with a list of references to nodes - the "child nodes" -, with the constraints that no reference is duplicated, and none points to the root. Some of the nodes in the tree structure may refer to physical or virtual entities or users or the like.

The term "policy" is to be understood in its broadest sense and refers in particular in the claims, preferably in the specification to any kind of data, information, etc. defining certain situations, scenarios, or the like which have to be fulfilled or which must not have to be fulfilled, applied, etc. A policy may be implemented, e.g. using logical comparisons, threshold comparisons with pre-defined parameters, or the like. Examples for a policy for SDN networks include but are not limited to „a request of installing a flow rule by the SDN controller must carried out by the switches within 100ms", or„whenever the master controller is down, the slave controller must take over within 100ms". An example for a policy for cars includes but is not limited to„engine must not start unless the ignition key is inserted and turned to on". An example for a policy for cloud-based systems includes but is not limited to computations must not run longer than 1 minute".

The term "node" is to be understood in its broadest sense and refers in particular in the claims, preferably in the specification to an entry, element, etc. in a data structure representing a policy, rule, etc. by a formula, etc.

The term "trigger" is to be understood in its broadest sense and refers or includes but is not limited in particular in the claims, preferably in the specification to a virtual communication channel, reference, pointer, link or the like in a data structure associating at least two elements or entries in the data structure, e.g. nodes.

The term "formula" is to be understood in its broadest sense and refers in particular in the claims, preferably in the specification to one or more logical expressions of propositions.

The term "sub formula" is to be understood in its broadest sense and refers in particular in the claims, preferably in the specification to propositions of a formula.

The term "evaluation" with regard to the term "node" is to be understood in its broadest sense and refers in particular in the claims, preferably in the specification to a picture, state, result, etc. of the formula associated with the node.

The term "temporal connective" is to be understood in its broadest sense and refers in particular in the claims, preferably in the specification to information, data, expression, semantic or the like making a logical expression time-dependent.

The term "metric constraint" with regard to "formula" is to be understood in its broadest sense and refers in particular in the claims, preferably in the specification to any kind of boundary, border, framework or condition limiting a temporal connective, e.g. in time by specifying a time interval. In other words e.g. the metric constraint specifies nodes being "reachable" by a current node.

The term "graph" is to be understood in its broadest sense and refers in particular in the claims, preferably in the specification to a structure amounting to a set of objects in which some pairs of the objects are in some sense related to or linked with each other.

The term "distance" is to be understood in its broadest sense and refers in particular in the claims, preferably in the specification to a parameter indicating some kind of or sort of virtual space, range, separation, gap, interval, displacement, etc. between two nodes in the data structure being defined for example by underlying structure of the data structure. In particular the term "distance" refers to a temporal distance, e.g. a difference between two time intervals.

Further features, advantages and further embodiments are described or may become apparent in the following: A time-stamp for a performed action may encoded by said computing device in said action message, and wherein nodes with the same formula may be ordered in said data structure according to the time-stamps by said ME. This may provide the advantage of enhancing the efficiency. For example, lookups whether a node exists, can be done by starting from any node: If an associated time interval of the current node is bigger than a time interval of the node to be looked up, the node's predecessor defined by the corresponding trigger is set as starting node and then the search along the data structure, i.e. the triggers, is continued from there. Analogously, if the time interval is smaller, the node's successor is set as starting node and then the search is continued from there. The ordering and the pointers to a node's successor and predecessor can be used for an efficient navigation through the nodes of the data structure. Updating the data structure can also be done efficiently. For example, for deleting a node, only respective pointers of the node and its neighbors need to be adjusted. Such updates may be performed when propagating truth values and when a new message is received by the ME.

Said ME may evaluate in part a node's formula by computing its triggers. This may enable an easy and efficient evaluation of the nodes for the ME when checking for policy violations. For instance outgoing triggers enables showing where a truth values needs to be propagated to. Implicit outgoing triggers can be determined from the explicit outgoing triggers since the nodes to which the outgoing trigger points to is available by the triggers mutually linking nodes. Further updating explicit triggers can be done efficiently when deleting or removing a node. Said ME may compute and store a trigger between a node having a formula with temporal connective between a first subformula and a second subformula, 'temporal node', and a node having said second subformula, 'second trigger', and/or a trigger between said temporal node and a node having said first formula, 'first trigger' depending at least on the temporal connective. This may provide the advantage of further enhancing the efficiency.

Said ME may compute said triggers depending at least on the temporal connective such that a distance defined at least by said temporal connective is smaller for the first trigger than for the said second trigger. This may enable an efficient updating of the data structure by said ME.

Said ME may store temporarily for a temporal node nodes having said second subformula with true Boolean truth value and a time-stamp. This provides soundness with respect to the logic semantic since the propagation of this value to the temporal node would not be sound. Otherwise, the ME may output false positives and/or false negatives. Furthermore, it is more efficient of having these pending anchors instead of keeping mutually linked nodes. The invariants of the data structure can also be easier maintained. Said ME may store temporarily for a temporal node the closest node being a node having said second subformula and having provided said Boolean truth value. This enables them to ignore other nodes that are "further away". Thus, the efficiency may be further enhanced.

Said ME may update truth values of formulas of nodes along the triggers in the data structure. This enables an efficient updating.

Said ME may check upon receiving said message whether said time-stamp in said received message lies within an incomplete time interval of a node and if yes, said ME may compute and store new nodes for said time-stamp and splits said time- interval at said time-stamp and may generate and store new nodes for said split parts. This enables adding of time points in an efficient way. Said action message may comprise a sequence number and said ME determines based on sequence numbers if said data structure comprises nodes with time- stamps of a complete interval, said nodes are deleted. This saves computational resources for storing the data structure. Boolean values of deleted nodes may be stored with other nodes. This ensures soundness of the semantic of the logic.

Said data structure stored in said memory may be computed by said ME to form a graph like a directed acyclic graph. This may provide an efficient structure for organizing the data for the data structure.

There are several ways how to design and further develop the teaching of the present invention in an advantageous way. To this end it is to be referred to the patent claims subordinate to the independent claims on the one hand and to the following explanation of further embodiments of the invention by way of example, illustrated by the figure on the other hand. In connection with the explanation of the further embodiments of the invention by the aid of the figure, generally further embodiments and further developments of the teaching will be explained. In the drawings Fig. 1 shows a systenn according to an embodiment of the present invention;

Fig. 2 shows part of the method according to an embodiment of the present invention;

Fig. 3 shows steps of a method according to an embodiment of the present invention;

Fig. 4 shows a data structure according to an embodiment of the present invention;

Fig. 5 shows an updated data structure of figure 4;

Fig. 6 shows and updated data structure of figure 5;

Fig. 7 shows the steps of a method according to an embodiment of the present invention; and

Fig. 8 shows steps of a method according to an embodiment of the present invention.

Fig. 1 shows a system according to an embodiment of the present invention.

In Fig. 1 a system architecture is shown with a monitoring component M which supervises system components C1 , C2, C3 etc.

The system components C1 , C2, C3, ... are instrumented such that they inform the monitoring component M about their performed actions. The monitoring component M checks at runtime the compliance of the component's behaviour, i.e., the actions performed by the components C1 , C2, C3, with respect to a given policy. Alternatively, the actions can be logged and the monitoring component M can inspect these logs later. In case of a violation of a policy the monitoring component M outputs a verdict V. The verdicts V may inform the system administrator or a dedicated system component about the violations. Depending on the kind of violation, the system administrator or the component may take appropriate countermeasures, for example, by reconfiguring or updating the system component C1 , C2, C3, or it may even terminate some of the system components C1 , C2, C3.

The messages MSG sent to the monitoring component M comprise an unambiguous description of the performed action and a timestamp, the latter e.g. in form of a logical time, wall-clock time, or a combination of both, i.e. timestamps from hybrid clocks, describing when the action was performed and how it relates time-wise to other actions. Furthermore, the messages MSG could be encrypted and could include signatures and hashes to prevent tampering. A verdict V describes e.g., when and which action caused the policy violation.

In the following, it is assumed that policies are given as formulas of the real-time logic MTL. The grammar of MTL is given by: spec ::= TRUE

I P

I (NOT spec)

I {spec OR spec)

I ( spec SINCE/ spec)

I {spec UNTIL/ spec)

Here, p ranges over the set of propositions, which describe actions or properties of actions. Furthermore, / specifies a relative time period. For example, the formula (p UNTIL(0,3s] q) is true at time t if the proposition p is true at any time from t onwards untili e proposition q is true. In addition, the time s where q is true must satisfy the metric constraint, provided by the interval (0,3s], relative to the time t, i.e., q must be true within 0 and 3 seconds, where 0 is excluded and 3 included. Variants and extensions to the real-time logic MTL and also other policy specification languages could be used. For instance, a freeze quantifier, as disclosed in the non-patent literature of D. Basin, F. Klaedtke, and E. Zalinescu, „Runtime Verification of Temporal Properties over Out-of-order Data streams", In the Proceedings of the 29th International Conference on Computer Aided Verification (CAV), which is herein incorporated by reference, to reason about data values can be used as extension of the above core policy specification language.

Fig. 2 shows part of the method according to an embodiment of the present invention.

In Fig. 2 a format of the message MSG sent by the system components to the monitoring component M is shown. In detail the monitoring component M receives messages MSG from the system components C1 , C2, C3, .... Such a message MSG describes the action performed by the component C1 , C2, C3, .... Examples of actions are the sending or receiving of a message to and from another system component C1 , C2, C3, or an update of the component's state such as increasing a counter, opening a file, etc. In addition, a message MSG may include an identifier of the system component C1 , C2, C3, ... and when the action was performed, i.e., a timestamp. Furthermore, a message MSG may comprise a sequence number, i.e., the number of performed actions of the system component C1 , C2, C3, ... up to the specified time. Additional information like signatures and/or hashes could also be included in a message MSG. Their validity can then be checked by the monitoring component M.

Fig. 3 shows steps of a method according to an embodiment of the present invention.

In Fig. 3 a loop of steps of the monitoring component is shown which are continuously executed.

In a first step S1 the monitoring component M receives a message from a system component C1 informing about a performed action and its timing information.

In a second step S2 the monitoring component M splits an incomplete interval if present and creates nodes for the message timestamp and also for the split intervals, provided that they are incomplete. Even further triggers are adjusted and added.

In the third step S3 truth values are propagated along the triggers in the data structure and in the fourth step S4 one or more verdicts are outputted.

In the following the steps S2 and S3 are described in detail: The step S2 comprises several substeps S2a-S2e. In substep S2a the monitoring component M determines the incomplete interval comprising the timestamp of the received message MSG for splitting the incomplete interval. Here, the monitoring component M can, e.g. maintain an ordered list or a search tree of incomplete intervals, and lookup the interval comprising the timestamp of the message MSG received. With reference to the following Fig. 4, incomplete intervals of the data structure according to Fig. 4 are the intervals (8,10) and (10, * ). In the update of the data structure from Fig. 4 to Fig. 5, it is assumed that the received message MSG has the timestamp 9. Hence, the determined incomplete interval in this substep is (8,10). In a next substep S2b the monitoring component M splits the incomplete interval determined in substep S2a. The split depends on the message's timestamp. Furthermore, the monitoring component M determines the intervals that are complete, i.e., the incomplete intervals that are guaranteed to not comprise a timestamp of any message received and processed by the monitoring component M in a later loop of Fig. 3.

In the non-patent literature of D. Basin, F. Klaedtke, E. Zalinescu, "Failure-aware Runtime Verification of Distributed Systems" (FSTTCS 2015), which is herein incorporated by reference, is described, e.g., how the complete intervals can be determined through sequence numbers of messages. Not only intervals resulting from the split can be complete. With reference to Fig. 4 the intervals (8,9) and (9,10) resulting from splitting the interval (8,10) at 9 are assumed to be complete in the running example, i.e., the monitoring component M will not receive messages MSG with a timestamp in (8,10) in later loop iterations. Furthermore, the monitoring component M does not know in this example whether it will receive further messages MSG with a timestamp in the incomplete interval (10, * ). Hence, the incomplete interval (10, * ) remains incomplete. In a next substep S2c the monitoring component M removes the nodes of the complete intervals from the data structure. With reference to Fig. 4 no nodes are removed in this running example, since the incomplete interval (10, * ) remains incomplete. In a next substep S2d the monitoring component M splits the nodes of the interval determined in substep S2a. With reference to Fig. 4 the split of the interval (8,10) at time 9 only results in the singleton {9} and the newly created nodes are all for the timestamp 9, since the intervals (8,9) and (9,10) are complete. If the intervals (8,9) and (9,10) would not be complete, the split of the interval (8,10) would result in the intervals (8,9), {9}, and (9,10). Furthermore, the resulting updated data structure would comprise nodes for all these three intervals.

In a next substep S2e the monitoring component M adjusts the explicit triggers of the nodes in the data structure and maintains the invariants of the data structure. This adjustment includes in particular outgoing triggers of newly created nodes for the intervals from substep S2d and triggers from existing nodes to the newly created nodes. The adjusted explicit triggers are inherited from the triggers of the nodes of the split interval. A node with no explicit or implicit ingoing triggers is assigned to its corresponding Boolean truth values. Furthermore, newly created nodes also inherit pending nodes, which may propagate their Boolean truth value true in the step S3 to the newly created node. With reference to Fig. 4, the explicit trigger from the anchor node q for the split interval (8,10) to the temporal node at timestamp 6 results in an explicit trigger from the newly created anchor node q for the timestamp 9 to the temporal node at timestamp 6. Furthermore, the newly created continuation node q for the timestamp 9 inherits the explicit trigger from the continuation node q for the split interval (8,10).

Step S3 may be performed recursively together with steps S1 and S2 or operations of step S3 may be performed repeatedly:

• If a root node evaluates to a Boolean truth value and the root node corresponds to a timestamp, the monitoring component M generates the corresponding verdict information, which is output in step S4. Otherwise, Boolean truth values for root nodes for an incomplete interval are stored by the monitoring component M and these truth values possibly result in verdicts or at least verdict information that are output in later iterations of steps S1 -S4.

• If a non-root node evaluates to a Boolean truth value, the truth value is propagated along the non-root nodes' explicit and implicit triggers to its parent nodes. For maintaining the invariants of the data structure, some of the explicit triggers may be adjusted. Furthermore in some cases the propagation of a Boolean truth value along a trigger may be postponed. In particular, postponing the propagation of the Boolean truth value true from an anchor node to a temporal node results in pending anchors as described further below.

• A node that has propagated its Boolean truth value to all its parent nodes is removed from the data structure. This removal is also recursive, i.e., a child node with only explicit and implicit triggers to removed nodes is also removed.

In the following Fig. 4-7 the steps of Fig. 3 are explained with reference to an example data structure.

Fig. 4 shows a data structure according to an embodiment of the present invention.

In Fig. 4 an example of a graph structure for computation of a verdict is shown. For computing verdicts V, the monitoring component M maintains a graph structure as data structure, which is updated whenever receiving a message MSG from a system component C1 , C2, C3. Non-graph-based representations, i.e. data structures are also possible. Fig. 4 shows components of said graph structure. Each node comprises or is associated with a formula, and a timestamp or an incomplete interval. In Fig. 4, these components are shown on the x-axis and y- axis, respectively.

Nodes have triggers, pointing to other nodes. They specify dependencies between nodes and represent the partial evaluation of a node's truth value. Nodes with the same formula can be identified by an implicit doubly-linked list that is ordered increasingly by the timestamps and incomplete intervals. Said doubly linked list is implicitly included in the data structure by nodes with the same formula having triggers to each other. Incomplete intervals are non-overlapping and timestamps of time points are not included in any incomplete interval. Implicit triggers indicated by dashed lines in Fig. 4 are not part of the maintained data structure. Analogously, the timeline in the lower part of Fig. 4 is not part of the data structure, which is given through the timestamps and incomplete intervals of the nodes. In Fig. 4 different kinds of nodes are shown, depending on the nodes' formula and their subformulas and superformulas:

• A node is called a "leaf if its formula is TRUE or a proposition p.

• A node is called a "root" if its formula is the monitored formula.

· A node is called a "Boolean node" if its formula's main connective is NOT or

OR.

• A node is called a "temporal node" if its formula's main connective is a temporal connective (SINCE or UNTIL).

• A node is called an "anchor node" if its formula is the second subformula of the formula of a temporal node.

• A node is called a "continuation node" if its formula is the first subformula of the formula of a temporal node. If a root evaluates to a Boolean truth value and the root corresponds to a timestamp, the monitoring component generates - as already mentioned above - corresponding verdict information. Otherwise, Boolean truth values for roots for an incomplete interval are stored by the monitoring component and these truth values may result in verdict information that are output later.

If a non-root node evaluates to a Boolean truth value, the truth value is propagated - as already mentioned above - along the nodes' explicit and implicit triggers to its parent nodes. The propagation of a Boolean truth value along a trigger may be postponed, and may result in so-called pending anchors as described below.

Each node, except the roots, has a single outgoing trigger. A Boolean node e.g. with the formula (p OR q) has at most two incoming triggers, namely one trigger from a node with the formula p and one trigger from a node with the formula q. The timestamps or intervals of these nodes are the same. If the node with the formula p or q has already a Boolean truth value, then the node does not exist anymore and its truth value has been propagated to the node with the formula (p OR q).

The triggers of a temporal node are distinguished between triggers from anchor nodes and trigger from continuation nodes: The data structure comprises a trigger from an anchor node to the temporal node that is "furthest away" in distance, the distance being dependent on the temporal connective, its metric constraint, and the timestamps or incomplete intervals of the nodes. For example, in Fig. 4, the anchor node with the formula q and incomplete interval (8,10) has a trigger to the temporal node with the timestamp 6. The other triggers of this anchor node to the temporal nodes with the timestamps 7 and 8, and the incomplete interval (8,10) are implicit. The data structure further comprises a trigger from a continuation node to the temporal node that is "closest" in terms of the above-mentioned distance.

Furthermore, a temporal node might store or in other words may be associated with the above-mentioned pending anchors. A pending anchor is an anchor node with a timestamp and the Boolean truth value "true". The propagation of this truth value to the temporal node is however not sound with respect to the logic's semantic. In particular, the metric constraint is satisfiable but not valid. Such a situation may arise in Fig. 4 when looking at the node with timestamp 6, the metric constraint +3 seconds with regard to the interval (8,10): The metric constraint is partially valid for the interval (8,9] but not valid for the interval (9,10). These pending anchors are not represented in the doubly-linked list of the anchor node's formula.

A temporal node also stores the closest anchor node that has propagated the Boolean truth value "true" to the node. Anchor nodes that are "further away" in terms of distance than this valid anchor node can be ignored for the temporal node. The shown numbers of the temporal nodes in Fig. 4 indicate the number of the pending anchors (+x) and whether the temporal node has a valid anchor or not. In the graph structure shown in Fig. 4, there are no non-pending anchors (+0), and the temporal nodes at the timestamps 7 and 8, and also the incomplete interval (8,10) have all the same valid anchor at time 10.

All together the triggers of a temporal node, i.e. explicit, implicit and pending triggers describe the partial evaluation of a temporal node. This partial evaluation can be represented as a Boolean combination of the source nodes, i.e. anchor nodes and continuation nodes. The data structure of this Boolean combination is also not stored in the data structure and left implicit. When a node thas propagated its Boolean truth value to all its parent nodes said node is removed from the data structure. This removal is also recursive, i.e., a child node with only explicit and implicit triggers to removed nodes is also removed.

Fig. 5 shows an updated data structure of Fig. 4.

In Fig. 5 and updated graph structure for a new time point with timestamp 9 is shown.

In detail in case the monitoring component M receives a message MSG with the timestamp t then the nodes with the incomplete interval I comprising t are split. In particular, new nodes with the timestamp t are computed. If the two halves of I, split at t, are incomplete, new nodes for these incomplete intervals are also computed. Whether these intervals are incomplete can, e.g. be determined by the sequence numbers of the messages as e.g. disclosed in the non-patent literature of D. Basin, F. Klaedtke, and E. Zaiinescu, "Failure-aware Runtime Verification of Distributed Systems", in the Proceedings of the 35th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS), 2015. From the ingoing and outgoing explicit triggers of the split nodes, the explicit triggers for the newly created or computed nodes are created such that the invariants are maintained, which means in particular that computed new nodes have to be correctly placed with regard to time within the organisation of the data structure and explicit triggers have to be updated if needed.

Furthermore, when receiving a message MSG it may be inferred that an interval K already contained in the data structure is complete, no further messages MSG with timestamps in this interval will be received by the monitoring component M. In this case the nodes with the interval K are deleted. However, according to the logic's semantics, it might be necessary to propagate Boolean truth values from these nodes. For example, when deleting an anchor node with the interval K, the Boolean truth value "false" is propagated to temporal nodes with intervals different from K.

Fig. 5 now shows the updated graph structure, originating from the graph structure shown in Figure 4, where the monitoring component M received a message MSG with the timestamp 9. In this example the two intervals when splitting the incomplete interval (8,10) at 9 are complete and the proposition p and q are true at time 9. Hence, the two corresponding leaves are marked with the Boolean truth value true.

Fig. 6 shows an updated data structure of Fig. 5. In Fig. 6 an updated graph structure after the propagation of truth value is shown.

In detail in case a received message MSG describes that a proposition p at a time t has the Boolean truth value b, then the monitoring component M updates the graph structure by initiating a propagation from the node with the proposition p and the timestamp t. If this node does not exist, the data structure is not updated.

The truth value is propagated along the explicit and implicit triggers from a node including also a Boolean node with a formula with main connective NOT, also complementing the truth value. Furthermore, a propagation to a temporal node may be postponed, based on the semantics of the logic. For instance, it can be the case that an anchor node becomes a pending anchor node of a temporal node. Such a postponed propagation may continue later when splitting incomplete intervals and creating the respective nodes.

The propagation updates the explicit triggers and maintains the invariants of the data structure. In case a Boolean truth value is propagated to a root node with a timestamp, the monitoring component M outputs a corresponding verdict V for the truth value. If a Boolean truth value is propagated to a root node with an incomplete interval, the monitoring component M does not directly output a verdict V. Instead, it outputs a corresponding verdict V whenever it receives a message MSG with a timestamp in this interval. Fig. 6 shows now part of the graph structure, resulting from the graph structure in Figure 5, when propagating the Boolean truth value true from the two leaves with the timestamp 9 and the propositions p and q, respectively. The monitoring component M also outputs the verdicts V true for the timestamps 6, 7, 8, and 9. Fig. 7 shows steps of a method according to an embodiment of the present invention.

In Fig. 7 a method for operating a monitoring entity,' ME', for a distributed system is shown, said distributed system comprising a plurality of computing devices, said computing devices performing actions,

comprising the steps of

a) Receiving, by said ME, an action message from a computing device, said message comprising information about one or more actions performed by said computing device, b) Generating, deleting and/or updating, by said ME, one or more nodes of a data structure stored in a memory of said ME, by

processing the information of said received message and storing the processed information into said data structure, wherein said data structure represents knowledge about the behavior of said distributed system, and wherein

- each node specifies a policy by a formula,

- a node is linked by a trigger to one other node only to specify dependencies between nodes except for nodes with a formula, monitored by said ME, and wherein

- nodes with the same formula are mutually linked by triggers,

c) Computing verdict information indicating one or more actions violating one or more policies based on the updated state of said data structure.

Fig. 8 shows steps of a method according to an embodiment of the present invention.

In Fig. 8 steps for policy checking are shown. It is assumed that the system administrator specifies the system/security policies, deploys the monitoring component in an IT system and the system components C1 , C2, ... so that they send messages MSG to the monitoring component M describing their performed actions.

In a first step T1 the monitoring component M runs in parallel to the other system components C1 , C2, C3, ... and checks policy compliance at runtime. Whenever a system component C1 , C2, ... performs an action, the system component informs the monitoring component M in a second step T2 via message passing about the performed action.

Whenever the monitoring component receives a message in a third step T3 from a system component C1 , C2, C3, it updates its state in a forth step T4 and computes in a fifth step T5 the verdicts, i.e. the monitoring component's data structure comprising of nodes with triggers and doubly-linked lists is updated by adding new time points and propagating Boolean truth values. Furthermore the monitoring component M outputs the computed verdicts, i.e. policy violations in a sixth step T6.

In summary at least one embodiment of the present invention may enable or provide an optimized graph structure for the verdict computation of a monitoring component M. In particular, nodes of the same formula may be represented implicitly in a doubly-linked list and each node may point explicitly to only one node. The other outgoing pointers of a node are implicit. Efficient update operations, i.e. adding a new time point to the data structure and propagating Boolean truth values up of the graph structure that maintain the necessary invariants are enabled. In particular, for the propagation of Boolean truth values, a node does not store its partial valuation explicitly. Instead, a node's partial evaluation can be computed by its explicit and implicit pointers.

At least one embodiment of the present invention may have, provide or enable at least one of the following:

enhanced efficiency for checking compliance of distributed systems at runtime,

- enhanced scalability,

enhanced flexibility in terms of policy specification language and applications,

strong correctness guarantees, and/or

fewer assumptions/ boundary conditions enhancing the flexibility.

Many modifications and other embodiments of the invention set forth herein will come to mind to the one skilled in the art to which the invention pertains having the benefit of the teachings presented in the foregoing description and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.