Kohyarnejadfard et al., 2019 - Google Patents
System performance anomaly detection using tracing data analysisKohyarnejadfard et al., 2019
View PDF- Document ID
- 1562301765067236054
- Author
- Kohyarnejadfard I
- Shakeri M
- Aloise D
- Publication year
- Publication venue
- Proceedings of the 2019 5th International Conference on Computer and Technology Applications
External Links
Snippet
In recent years, distributed systems have become increasingly complex as they grow in both scale and functionality. Such complexity makes these systems prone to performance anomalies. Efficient anomaly detection frameworks enable rapid recovery mechanisms to …
- 238000001514 detection method 0 title abstract description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3495—Performance evaluation by tracing or monitoring for systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3065—Monitoring arrangements determined by the means or processing involved in reporting the monitored data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/875—Monitoring of systems including the internet
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/14—Fourier, Walsh or analogous domain transformations, e.g. Laplace, Hilbert, Karhunen-Loeve, transforms
- G06F17/141—Discrete Fourier transforms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/30144—Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/86—Event-based monitoring
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ikram et al. | Improving accuracy of intrusion detection model using PCA and optimized SVM | |
Wang et al. | FD4C: Automatic fault diagnosis framework for Web applications in cloud computing | |
Deshmukh et al. | Improving classification using preprocessing and machine learning algorithms on NSL-KDD dataset | |
Kohyarnejadfard et al. | System performance anomaly detection using tracing data analysis | |
Cabau et al. | Malware classification based on dynamic behavior | |
Falor et al. | A deep learning approach for detection of SQL injection attacks using convolutional neural networks | |
Iliou et al. | Detection of advanced web bots by combining web logs with mouse behavioural biometrics | |
Dasgupta et al. | Towards auto-remediation in services delivery: Context-based classification of noisy and unstructured tickets | |
Kistijantoro | Vitality based feature selection for intrusion detection | |
CN109145030A (en) | A kind of detection method and device of abnormal data access | |
Masabo et al. | Big data: deep learning for detecting malware | |
Oh et al. | Advanced insider threat detection model to apply periodic work atmosphere | |
Mamidanna et al. | Detecting an insider threat and analysis of XGBoost using hyperparameter tuning | |
Alguliyev et al. | Hybridisation of classifiers for anomaly detection in big data | |
Guan et al. | Malware system calls detection using hybrid system | |
Afroz et al. | A two layer machine learning system for intrusion detection based on random forest and support vector machine | |
Jere et al. | Principal component properties of adversarial samples | |
Simao et al. | A technique to reduce the test case suites for regression testing based on a self-organizing neural network architecture | |
Sushmakar et al. | An unsupervised based enhanced anomaly detection model using features importance | |
Lou et al. | An anomaly detection method for cloud service platform | |
Mao et al. | Centrality metrics of importance in access behaviors and malware detections | |
Moshiri et al. | Malware classification framework for dynamic analysis using information theory | |
Werner et al. | Towards computational performance engineering for unsupervised concept drift detection—complexities, benchmarking, performance analysis | |
Kotenko et al. | Anomaly Detection in Container Systems: Using Histograms of Normal Processes and an Autoencoder | |
Halawa et al. | Supervised Performance Anomaly Detection in HPC Data Centers |