2002 Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings.
DOI: 10.1109/prdc.2002.1185651
|View full text |Cite
|
Sign up to set email alerts
|

Event log based dependability analysis of Windows NT and 2K systems

Abstract: This paper presents a measurement-based dependability study using event logs collected during about 3 years from 133 Windows NT and 2K workstations and servers interconnected through a LAN. We focus on the identification of machine reboots, the classification of their causes, and the evaluation of statistics characterizing the uptimes, downtimes, and the availability of the Windows NT and 2K machines.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 7 publications
0
15
0
Order By: Relevance
“…The past decade has produced several studies in root-cause analysis for Operating Systems (OS) ranging from Guardian OS and Tandem Non-Stop UX OS to VAX/VMS and Windows NT [6,8,10,14,15,16,17]. In this progression, our study of Windows' crash data gauges the evolution of PC reliability.…”
Section: Related Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…The past decade has produced several studies in root-cause analysis for Operating Systems (OS) ranging from Guardian OS and Tandem Non-Stop UX OS to VAX/VMS and Windows NT [6,8,10,14,15,16,17]. In this progression, our study of Windows' crash data gauges the evolution of PC reliability.…”
Section: Related Researchmentioning
confidence: 99%
“…We currently scrape crash dumps, and if user consents usage information such as hardware/software profiles, from users' machines and send corresponding data to our BOINC server. The (15) drawback of this mechanism is that we can only collect crash dumps that are stored in known locations on the user's computer, consequently excluding application crash dumps that are stored in unknown app-specific locations. Numerous people enthusiastically contribute data to projects on BOINC rather than corporations as they favor a research cause.…”
Section: Future Directions: Open Source Data Collection Via Boinc Cramentioning
confidence: 99%
“…Event logs are bene cial for tracking (step-by-step) state changes in the system. is paper focuses on nding causal connections among security event log entries of Microso Windows operating systems (OS) [14]. Identifying a cause and e ect relationship amongst two or more security event log entries can help in determining what problem was identi ed within the system, how it was identi ed, and what remedial action was performed.…”
Section: Introductionmentioning
confidence: 99%
“…Despite the large use of these techniques, several studies recognized the problem of the accuracy of log-based dependability analysis [12], [13]. As a matter of fact, a single tuple may contain events related to different failure manifestations (also known as collisions), or events related to the same failure may be wrongly coalesced in different tuples (also known as truncations).…”
Section: Introductionmentioning
confidence: 99%