2019
DOI: 10.1609/aaai.v33i01.33019428
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection Using Autoencoders in High Performance Computing Systems

Abstract: Anomaly detection in supercomputers is a very difficult problem due to the big scale of the systems and the high number of components. The current state of the art for automated anomaly detection employs Machine Learning methods or statistical regression models in a supervised fashion, meaning that the detection tool is trained to distinguish among a fixed set of behaviour classes (healthy and unhealthy states).

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
90
0
2

Year Published

2019
2019
2021
2021

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 160 publications
(107 citation statements)
references
References 12 publications
0
90
0
2
Order By: Relevance
“…Moreover, in [25], [26], [27] several Convolutional Neural Network (CNNs) anomaly detection techniques were proposed. Additionally, several deep learning formulation for network anomaly detection employ the intelligent scheme of Stacked Autoencoders (SAE) [28], [29], [30]. Despite the fact that deep learning architectures are demanding, since a great amount of data and internal iterations are required, these methods usually outperform traditional supervised and unsupervised intrusion detection approaches.…”
Section: B Network Traffic Anomaly Detectionmentioning
confidence: 99%
“…Moreover, in [25], [26], [27] several Convolutional Neural Network (CNNs) anomaly detection techniques were proposed. Additionally, several deep learning formulation for network anomaly detection employ the intelligent scheme of Stacked Autoencoders (SAE) [28], [29], [30]. Despite the fact that deep learning architectures are demanding, since a great amount of data and internal iterations are required, these methods usually outperform traditional supervised and unsupervised intrusion detection approaches.…”
Section: B Network Traffic Anomaly Detectionmentioning
confidence: 99%
“…Given a set of features, K-means aims to partition data points into K-clusters. The underlying rationale is that each data point in a cluster is more similar to points of its own cluster than to points from other clusters [38].  Deep learning: these algorithms reproduce the structure and the functions of biological neural networks [39].…”
Section: A Machine Learning and Its Applicationsmentioning
confidence: 99%
“…To minimize the requirement of prior knowledge, machine learning techniques, especially autoencoder-based architectures, are widely applied to equipment AD for machines in various domains. Borghesi et al [ 17 ] adopted a set of general autoencoders to learn normal behaviors of high performance computing systems and exploits learned autoencoders to identify abnormal behaviors. Oh and Yun [ 18 ] specifically used the residual error of a general autoencoder to identify the anomaly in a surface-mounted device (SMD) machine.…”
Section: Introductionmentioning
confidence: 99%