2023
DOI: 10.48550/arxiv.2301.03797
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Recommending Root-Cause and Mitigation Steps for Cloud Incidents using Large Language Models

Abstract: Incident management for cloud services is a complex process involving several steps and has a huge impact on both service health and developer productivity. On-call engineers require significant amount of domain knowledge and manual effort for root causing and mitigation of production incidents. Recent advances in artificial intelligence has resulted in state-ofthe-art large language models like GPT-3.x (both GPT-3.0 and GPT-3.5), which have been used to solve a variety of problems ranging from question answer… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 37 publications
(70 reference statements)
0
0
0
Order By: Relevance
“…AI-driven security systems can analyze vast amounts of data from cloud environments to identify patterns, detect anomalies, and predict potential security incidents. These systems learn from ongoing activities, continuously improving their detection algorithms and adapting to new threats [24]. This transition is necessitated by the need for more proactive and predictive security measures in cloud environments.…”
Section: Transition To Ai-driven Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…AI-driven security systems can analyze vast amounts of data from cloud environments to identify patterns, detect anomalies, and predict potential security incidents. These systems learn from ongoing activities, continuously improving their detection algorithms and adapting to new threats [24]. This transition is necessitated by the need for more proactive and predictive security measures in cloud environments.…”
Section: Transition To Ai-driven Approachesmentioning
confidence: 99%
“…Unlike traditional security measures, which often rely on predefined rules and signatures, AI-driven systems utilize machine learning algorithms to analyze patterns in data, enabling them to detect anomalies and potential threats that might go unnoticed by conventional methods [22,23]. For example, Ahmad et al [24] highlight AI's ability to detect zero-day attacks, which are new and unknown threats that traditional security measures often fail to recognize. AI systems can identify these threats by analyzing deviations from typical network behavior, making them highly effective in the ever-changing landscape of cybersecurity [12].…”
Section: Comparative Analysis Of Ai-driven and Traditional Security M...mentioning
confidence: 99%