Online Anomaly Detection Based on Monitoring Traces
نویسندگان
چکیده
In modern days, customers expect that Web services work reliably and are available around the clock. A system failure can have a significant negative impact on a company’s reputation and economical success. This makes it necessary to continuously monitor software systems in order to detect problems of arising failures early. Existing anomaly detection approaches are taking up this challenge by analyzing aggregated data. Unfortunately, they can suffer from the flaw of averages and are not able to associate an anomaly with individual requests for root cause analysis. In light of this observation, we introduce an anomaly detection approach that operates on raw and non-aggregated data. This allows us to precisely identify abnormal requests and differentiate them based on various attributes (e.g., business transactions, user location and server). Subsequently, the individual requests can be further analyzed to get a deeper understanding of an anomaly’s root cause. We integrated our approach into inspectIT and successfully identified anomalies introduced in an e-commerce reference application.
منابع مشابه
Behavior-Based Online Anomaly Detection for a Nationwide Short Message Service
As fraudsters understand the time window and act fast, real-time fraud management systems becomes necessary in Telecommunication Industry. In this work, by analyzing traces collected from a nationwide cellular network over a period of a month, an online behavior-based anomaly detection system is provided. Over time, users' interactions with the network provides a vast amount of usage data. Thes...
متن کاملHyperion: High Volume Stream Archival for Retrospective Querying
Network monitoring systems that support data archival and after-the-fact (retrospective) queries are useful for a multitude of purposes, such as anomaly detection and network and security forensics. Data archival for such systems, however, is complicated by (a) data arrival rate, which may be hundreds of thousands of packets per second per link, and (b) the need for online indexing of this data...
متن کاملP3CA: Private Anomaly Detection Across ISP Networks
Detection of malicious traffic in the Internet would be much easier if ISP networks shared their traffic traces. Unfortunately, state-ofthe-art anomaly detection algorithms require detailed traffic information which is considered extremely private by operators. To address this, we propose an algorithm that allows ISPs to cooperatively detect anomalies without requiring them to reveal private tr...
متن کاملOnline Monitoring and Fault Diagnosis of Multivariate-attribute Process Mean Using Neural Networks and Discriminant Analysis Technique
In some statistical process control applications, the process data are not Normally distributed and characterized by the combination of both variable and attributes quality characteristics. Despite different methods which are proposed separately for monitoring multivariate and multi-attribute processes, only few methods are available in the literature for monitoring multivariate-attribute proce...
متن کاملA Framework for Studying New Approaches to Anomaly Detection
In this work, we describe a new framework for an anomaly-based intrusion detection system using system call traces. System calls provide an interface between an application and the operating system’s kernel. Since a program frequently requests services via system calls, a trace of these system calls provides a rich profile of program behavior. But we need to use efficient and effective methods ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Softwaretechnik-Trends
دوره 36 شماره
صفحات -
تاریخ انتشار 2016