2015 11th European Dependable Computing Conference (EDCC) 2015
DOI: 10.1109/edcc.2015.22
|View full text |Cite
|
Sign up to set email alerts
|

Data Stream Clustering for Online Anomaly Detection in Cloud Applications

Abstract: This paper introduces a new approach for the online detection of performance anomalies in cloud virtual machines (VMs). It is designed for cloud infrastructure providers to detect during runtime unknown anomalies that may still be observed in complex modern systems hosted on VMs. The approach is drawn on data stream clustering of per-VM monitoring data and detects at a fine granularity where anomalies occur. It is design to be independent of the types of applications deployed over VMs. Moreover it deals with r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 32 publications
(57 reference statements)
0
4
0
Order By: Relevance
“…Besides, this work particularly focuses on the identification of anomalous behaviors from monitoring data of VMs OSs such as CPU consumption, disk I/O, and free memory. As seen in previous researches [10]- [16], these data are well suited to reflect the behavior of a computing system. With respect to the machine learning models that we aim to build for detection (in our case, classifiers), samples of labeled monitoring data are needed to train them to discern different VNF behaviors.…”
Section: A Detection Approachmentioning
confidence: 88%
“…Besides, this work particularly focuses on the identification of anomalous behaviors from monitoring data of VMs OSs such as CPU consumption, disk I/O, and free memory. As seen in previous researches [10]- [16], these data are well suited to reflect the behavior of a computing system. With respect to the machine learning models that we aim to build for detection (in our case, classifiers), samples of labeled monitoring data are needed to train them to discern different VNF behaviors.…”
Section: A Detection Approachmentioning
confidence: 88%
“…In that scenario, the models from supervised learning would detect the most common anomalies. As for the outputs of the models from unsupervised learning (e.g., based on the clustering of observations like in our previous work Sauvanaud et al (2015a)), they would be considered on periods during which the models from supervised learning would not detect any anomaly, and possibly missing some unknown ones.…”
Section: Limitationmentioning
confidence: 99%
“…Unsupervised learning does not require such knowledge and enables the detection of unknown anomalies. While our ADS can work with both algorithms, as shown in our previous work Sauvanaud et al (2015a), in this paper we focus on supervised algorithms. Since a cloud service is mostly exhibiting a normal behavior during runtime, we developed fault injection tools for two goals: i) to inject anomalies during the training phase of machine learning models and collect data of both normal behaviors and anomalies, ii) to assess the anomaly detection and diagnosis efficiency of our ADS during a validation phase in presence of anomalies.…”
Section: Introductionmentioning
confidence: 99%
“…Sauvanaud, etc. exploit the dynamic index set both to update anomaly class and to compute the classification of the mean value adapting the changing of data distribution [18]. Fu, etc.…”
Section: Introductionmentioning
confidence: 99%