2016 IEEE 9th International Conference on Cloud Computing (CLOUD) 2016
DOI: 10.1109/cloud.2016.0136
|View full text |Cite
|
Sign up to set email alerts
|

TaskInsight: A Fine-Grained Performance Anomaly Detection and Problem Locating System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(8 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…If corresponding back-end server has enough available memory, then load balancer sends a signal to the agent in order to set a new thread pool size. However, memory utilization is a low level metric that cannot be used as an actual pointer to the overload condition, because some other resource may be the cause of bottleneck even on efficient memory utilization, hence it has been reported in [3] that resource level metrics are too coarse to locate the overload condition. Moreover, resource level metrics are not directly related to end user experience, thus memory-utilization metric does not provide reliable response-time outage [4].…”
Section: Related Workmentioning
confidence: 99%
“…If corresponding back-end server has enough available memory, then load balancer sends a signal to the agent in order to set a new thread pool size. However, memory utilization is a low level metric that cannot be used as an actual pointer to the overload condition, because some other resource may be the cause of bottleneck even on efficient memory utilization, hence it has been reported in [3] that resource level metrics are too coarse to locate the overload condition. Moreover, resource level metrics are not directly related to end user experience, thus memory-utilization metric does not provide reliable response-time outage [4].…”
Section: Related Workmentioning
confidence: 99%
“…Chan et al [89] define the model with rules based on machine learning, Song et al [15] rely on manual models. Zhang et al [16] employ unsupervised clustering on black-box tasks to induce normal resource usage behavior patterns from historical data. Monni et al [17,18] develop a technique for energy-based anomaly detection using Restricted Boltzmann Machines (RBMs) [18] and acknowledge how their technique can be used to detect collective anomalies and failures in software systems.…”
Section: Detection Based On Normal Behavior Modelingmentioning
confidence: 99%
“…However, most of them are computationally . By contrast, scalable algorithms have also been proposed to facilitate the anomaly detection in cloud computing, e.g., implementing a probabilistic approach to detect abnormal software systems [46], adopting Holt-Winters forecasting to identify a violation in application metrics [30], and implementing a clustering method to find the anomalous application threads [63]. A common issue of these scalable techniques is that they require low-level access to application level information, while our approach only targets general performance metrics that can be obtained via sampling the state of the system.…”
Section: Anomaly Detectionmentioning
confidence: 99%