Filters








3,794 Hits in 3.2 sec

Detection of Performance Anomalies in Cloud Services: A Correlation Analysis Approach

Ghodai M. Abdelrahman
2016 International Journal Of Mechanical Engineering And Information Technology  
In this paper, we propose a method for detecting performance anomalies in cloud software services.  ...  Software as a service (SaaS) is getting an increasing potential as a cloud-based option for using software applications in a payper-use manner.  ...  [17] presented a workload-aware online anomaly detection method for enterprise applications.  ... 
doi:10.18535/ijmeit/v4i9.06 fatcat:z45pyklkszdhhlfoc6iocyjome

Context-Enriched and Location-Aware Services

MoonBae Song, Goreti Marreiros, Hoon Ko, Jae-Ho Choi
2012 Journal of Computer Networks and Communications  
The paper titled "Route anomaly detection using a linear route representation" discusses a technique for detecting route anomaly which is a common problem in our daily lives.  ...  Context-enriched and location-aware services (CELAS) effect the current customer-facing mobile applications and web services in our daily lives such as Facebook, Google, and Twitter.  ...  The paper titled "Route anomaly detection using a linear route representation" discusses a technique for detecting route anomaly which is a common problem in our daily lives.  ... 
doi:10.1155/2012/649584 fatcat:lnacwa3advgpdels3s44bxbmtq

PAL

Hiep Nguyen, Yongmin Tan, Xiaohui Gu
2011 Managing Large-scale Systems via the Analysis of System Logs and the Application of Machine Learning Techniques on - SLAML '11  
In this paper, we present a Propagation-aware Anomaly Localization (PAL) system that can pinpoint the source faulty components in distributed applications by extracting anomaly propagation patterns.  ...  Distributed applications running inside cloud are prone to performance anomalies due to various reasons such as insufficient resource allocations, unexpected workload increases, or software bugs.  ...  The authors would like to thank the anonymous reviewers for their insightful comments.  ... 
doi:10.1145/2038633.2038634 fatcat:mtlqk4yqmfb6nntnijxftvnd6m

Performance-Aware Management of Cloud Resources: A Taxonomy and Future Directions [article]

Sara Kardani-Moghaddam, Rajkumar Buyya, Kotagiri Ramamohanarao
2018 arXiv   pre-print
In this paper, we investigate the main requirements and limitations in cloud resource management including a study of the approaches in workload and anomaly analysis in the context of the performance management  ...  Therefore, a continuous monitoring of system attributes and performance metrics provide the raw data for the analysis of problems affecting the performance of the application.  ...  Considering dynamic nature of the applications such as web workloads, Performance-Aware Management of Cloud Resources: A Taxonomy and Future Directions :21 over-provisioning is not avoidable in the fault  ... 
arXiv:1808.02254v1 fatcat:iw4t5vp43jgo3b4kz3j3drk3ia

Mitigating DoS Attacks Using Performance Model-Driven Adaptive Algorithms

Cornel Barna, Mark Shtern, Michael Smit, Vassilios Tzerpos, Marin Litoiu
2014 ACM Transactions on Autonomous and Adaptive Systems  
This paper presents a model-based adaptive architecture and algorithm for detecting DoS attacks at the web application level and mitigating them.  ...  Approaches exist to filter network-level attacks, but application-level attacks are harder to detect at the firewall.  ...  In contrast, the statistical anomaly detection does not require synchronization with the web application, but its detection capabilities are significantly dependent on the selected measures (e.g.  ... 
doi:10.1145/2567926 fatcat:hjoyndiu7vbrnegtm5ngbgv5qe

Application-aware latency monitoring for cloud tenants via CloudWatch+

Dapeng Liu, Dan Pei, Youjian Zhao
2014 10th International Conference on Network and Service Management (CNSM) and Workshop  
A cloud platform equipping with CloudWatch+ can automatically learn and distinguish web-based applications it is hosting, and detect latency anomalies for each application based on its own status.  ...  In this paper, we propose CloudWatch+, a tool that focuses on detecting the latency of web-based applications.  ...  We are grateful for the anonymous reviewers' thorough comments as well as the timely assistances provided by cochairs during our submission.  ... 
doi:10.1109/cnsm.2014.7014143 dblp:conf/cnsm/LiuPZ14 fatcat:42eqbgz5f5blxixf7uozbwkmdm

Semantic-Driven Model Composition for Accurate Anomaly Diagnosis

Saeed Ghanbari, Cristiana Amza
2008 2008 International Conference on Autonomic Computing  
We also show that our semantic-driven modeling approach effectively finds the component containing the root cause of injected anomalies, and avoids false alarms for normal changes in environment or workload  ...  In this paper, we introduce a semantic-driven approach to system modeling for improving the accuracy of anomaly diagnosis.  ...  Acknowledgments We thank the anonymous reviewers for their comments, and acknowledge the generous support of IBM Centre for Advanced Studies (CAS), IBM Research, the Natural Sciences and Engineering Research  ... 
doi:10.1109/icac.2008.33 dblp:conf/icac/GhanbariA08 fatcat:qgfoq75eg5c6xidzogostnvtf4

Configuration-space performance anomaly depiction

Christopher Stewart, Kai Shen, Arun Iyengar, Jian Yin
2008 Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware - LADIS '08  
Complex distributed systems (like those based on J2EE platforms) are designed to perform well for a variety of application workloads and configuration settings.  ...  This short paper describes our research on depicting performance anomaly manifestations over a large execution condition space for distributed systems.  ...  Ming Zhong (currently at Google) helped us in identifying the decision tree classifier for performance anomaly depictions.  ... 
doi:10.1145/1529974.1529987 fatcat:vy5yn232l5dq5jqxmn6de3smky

Context-Awareness to Improve Anomaly Detection in Dynamic Service Oriented Architectures [chapter]

Tommaso Zoppi, Andrea Ceccarelli, Andrea Bondavalli
2016 Lecture Notes in Computer Science  
Revealing anomalies to support error detection in softwareintensive systems is a promising approach when traditional detection mechanisms are considered inadequate or not applicable.  ...  Experimental evaluation shows that the detection accuracy is increased considerably through context-awareness and multiple layers monitoring.  ...  This collides with the increasing interest in using these systems for (safety) critical applications, and raises a call for adequate solutions to monitoring and error detection [1] , [21] .  ... 
doi:10.1007/978-3-319-45477-1_12 fatcat:n6qmnh2o7rh6lnoobwlwl4tnyy

Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change

Ludmila Cherkasova, Kivanc Ozonat, Ningfang Mi, Julie Symons, Evgenia Smirni
2008 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN)  
We propose a novel framework for automated anomaly detection and application change analysis.  ...  The proposed integrated framework provides a simple and powerful solution for anomaly detection and analysis of essential performance changes in application behavior.  ...  Acknowledgements: We would like to thank our HP colleagues from the Diagnostics team: Brent Enck, Dave Gershon, Anupriya Ramraj, Glenna Mayo for their help and useful discussions during this work.  ... 
doi:10.1109/dsn.2008.4630116 dblp:conf/dsn/CherkasovaOMSS08 fatcat:wcif3m6qljgunaxo3cdplyc2ji

MADneSs: a Multi-layer Anomaly Detection Framework for Complex Dynamic Systems

Tommaso Zoppi, Andrea Ceccarelli, Andrea Bondavalli
2019 IEEE Transactions on Dependable and Secure Computing  
Unfortunately, in such systems anomaly detection is often ineffective due to their dynamicity, which implies changes in the services or their expected workload.  ...  After discussing the related challenges, we present MADneSs, an anomaly detection framework tailored for the above systems that includes an adaptive multi-layer monitoring module.  ...  Moreover, the selection of indicators for anomaly detection presents some generically applicable results.  ... 
doi:10.1109/tdsc.2019.2908366 fatcat:nwuilpmpnrhodgnkpx3jy5co3q

Automated anomaly detection and performance modeling of enterprise applications

Ludmila Cherkasova, Kivanc Ozonat, Ningfang Mi, Julie Symons, Evgenia Smirni
2009 ACM Transactions on Computer Systems  
We propose a novel framework for automated anomaly detection and application change analysis.  ...  The proposed integrated framework provides a simple and powerful solution for anomaly detection and analysis of essential performance changes in application behavior.  ...  On the contrary, a workload change (i.e., variations in transaction mix and load) is typical for web-based applications.  ... 
doi:10.1145/1629087.1629089 fatcat:eans2wl5bnfcdgikpknvl2wfte

An online evolutionary approach to developing internet services

Mike Y. Chen, Emre Kiciman, Eric Brewer
2002 Proceedings of the 10th workshop on ACM SIGOPS European workshop: beyond the PC - EW10  
High dependability in Internet services is a difficult challenge: new features are constantly added, the systems are being scaled to support more users, and these systems are subject to unpredictable workloads  ...  Another use of this information is for anomaly detection. For example, different browsing behavior from users of a particular version of web browser might indicate HTML compatibility problems.  ...  In [12] Gaedke presents a model of Web Engineering, evolution of web applications using component-based software, but focuses on component reuse and enabling the web service code to be changed and extended  ... 
doi:10.1145/1133373.1133404 dblp:conf/sigopsE/ChenKB02 fatcat:bmcmblq75rbjbkmnxlyuj6q7fe

Model-based adaptive DoS attack mitigation

Cornel Barna, Mark Shtern, Michael Smit, Vassilios Tzerpos, Marin Litoiu
2012 2012 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)  
This paper presents a model-based adaptive architecture and algorithm for detecting DoS attacks at the web application level and mitigating them.  ...  Approaches exist to filter network-level attacks, but application level attacks are harder to detect at the firewall.  ...  ACKNOWLEDGEMENTS This work was made possible by funding from NSERC, IBM Centers for Advanced Studies Toronto, and Amazon.  ... 
doi:10.1109/seams.2012.6224398 dblp:conf/icse/BarnaSSTL12 fatcat:rnm5kxicbncrvi7dtjxsbrrgrq

Performance Anomaly Detection and Bottleneck Identification

Olumuyiwa Ibidunmoye, Francisco Hernández-Rodriguez, Erik Elmroth
2015 ACM Computing Surveys  
The problem of uncovering and understanding performance anomalies and their causes (bottlenecks) in di↵erent system and application domains is well studied.  ...  Our approach provides an overview of anomaly detection and bottleneck identification research as it relates to the performance of computing systems.  ...  Proposes an online anomaly detection approach for web applications present an incremental clustering algorithm for training workload patterns online, and employ LOF in the recognized workload pattern to  ... 
doi:10.1145/2791120 fatcat:yajvevdzl5h6tc6ii5sjd7qzlm
« Previous Showing results 1 — 15 out of 3,794 results