2018
DOI: 10.1016/j.jss.2018.01.039
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly detection and diagnosis for cloud services: Practical experiments and lessons learned

Abstract: HAL is a multidisciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L'archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d'enseignement et de recherche français ou étrangers, des labora… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 55 publications
(26 citation statements)
references
References 45 publications
(58 reference statements)
0
23
0
Order By: Relevance
“…This is mainly due to the versatility of this kind of methods and the increasing availability of data from which they can learn from, in a continuous manner [3]. Most of the approaches to anomaly detection address the associated challenges by feeding ML models with counters like CPU utilization, memory contention and network-related metrics [12,31,34]. Others include also system-level and/or application-level event logs in the analysis to increase the amount of features and facilitate the extraction of relevant patterns [8,35].…”
Section: Related Workmentioning
confidence: 99%
“…This is mainly due to the versatility of this kind of methods and the increasing availability of data from which they can learn from, in a continuous manner [3]. Most of the approaches to anomaly detection address the associated challenges by feeding ML models with counters like CPU utilization, memory contention and network-related metrics [12,31,34]. Others include also system-level and/or application-level event logs in the analysis to increase the amount of features and facilitate the extraction of relevant patterns [8,35].…”
Section: Related Workmentioning
confidence: 99%
“…In [2], the authors presented their anomaly detection approach for cloud services. They deployed a cloud application which consisted of several services on several VMs and each VM ran a specific service.…”
Section: Related Workmentioning
confidence: 99%
“…Data processing tasks Data processing helps us to detect and diagnose anomalies. Carla et al defined an anomaly as the part of the system state that may lead to an SLAV [2]. We use the same definition of anomaly as stated in Carla's work.…”
Section: Data Processingmentioning
confidence: 99%
See 1 more Smart Citation
“…Extensive studies have been done to resolve performance problems in distributed systems such as anomaly detection [6]- [8], root cause analysis [2], [9]- [11]. In these studies, the researchers need to deploy their own microservice benchmarks and inject some faults into these systems in order to get abnormal cases.…”
Section: Introductionmentioning
confidence: 99%