Kohyarnejadfard et al., 2019 - Google Patents

System performance anomaly detection using tracing data analysis

Kohyarnejadfard et al., 2019

View PDF
Document ID
1562301765067236054
Author
Kohyarnejadfard I
Shakeri M
Aloise D
Publication year
Publication venue
Proceedings of the 2019 5th International Conference on Computer and Technology Applications

External Links

Snippet

In recent years, distributed systems have become increasingly complex as they grow in both scale and functionality. Such complexity makes these systems prone to performance anomalies. Efficient anomaly detection frameworks enable rapid recovery mechanisms to …
Continue reading at publications.polymtl.ca (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3495Performance evaluation by tracing or monitoring for systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3409Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/875Monitoring of systems including the internet
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/14Fourier, Walsh or analogous domain transformations, e.g. Laplace, Hilbert, Karhunen-Loeve, transforms
    • G06F17/141Discrete Fourier transforms
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • G06F17/30144Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30386Retrieval requests
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/86Event-based monitoring

Similar Documents

Publication Publication Date Title
Ikram et al. Improving accuracy of intrusion detection model using PCA and optimized SVM
Wang et al. FD4C: Automatic fault diagnosis framework for Web applications in cloud computing
Deshmukh et al. Improving classification using preprocessing and machine learning algorithms on NSL-KDD dataset
Kohyarnejadfard et al. System performance anomaly detection using tracing data analysis
Cabau et al. Malware classification based on dynamic behavior
Falor et al. A deep learning approach for detection of SQL injection attacks using convolutional neural networks
Iliou et al. Detection of advanced web bots by combining web logs with mouse behavioural biometrics
Dasgupta et al. Towards auto-remediation in services delivery: Context-based classification of noisy and unstructured tickets
Kistijantoro Vitality based feature selection for intrusion detection
CN109145030A (en) A kind of detection method and device of abnormal data access
Masabo et al. Big data: deep learning for detecting malware
Oh et al. Advanced insider threat detection model to apply periodic work atmosphere
Mamidanna et al. Detecting an insider threat and analysis of XGBoost using hyperparameter tuning
Alguliyev et al. Hybridisation of classifiers for anomaly detection in big data
Guan et al. Malware system calls detection using hybrid system
Afroz et al. A two layer machine learning system for intrusion detection based on random forest and support vector machine
Jere et al. Principal component properties of adversarial samples
Simao et al. A technique to reduce the test case suites for regression testing based on a self-organizing neural network architecture
Sushmakar et al. An unsupervised based enhanced anomaly detection model using features importance
Lou et al. An anomaly detection method for cloud service platform
Mao et al. Centrality metrics of importance in access behaviors and malware detections
Moshiri et al. Malware classification framework for dynamic analysis using information theory
Werner et al. Towards computational performance engineering for unsupervised concept drift detection—complexities, benchmarking, performance analysis
Kotenko et al. Anomaly Detection in Container Systems: Using Histograms of Normal Processes and an Autoencoder
Halawa et al. Supervised Performance Anomaly Detection in HPC Data Centers