Interactivity Anomaly Detection in Remote Work Scenarios Using LSTM

被引:0
作者
Arellano-Uson, Jesus [1 ]
Magana, Eduardo [1 ,2 ]
Morato, Daniel [1 ,2 ]
Izal, Mikel [1 ,2 ]
机构
[1] Univ Publ Navarra, Dept Elect Elect & Commun Engn, Arrosadia Campus, Pamplona 31006, Spain
[2] Inst Smart Cities, Pamplona 31006, Spain
关键词
Remote work; interactivity time; anomaly detection; LSTM; cloud-based interactive applications; remote desktop; QoE; PERFORMANCE;
D O I
10.1109/ACCESS.2024.3372405
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, there has been a notable surge in the utilization of remote desktop services, largely driven by the emergence of new remote work models introduced during the pandemic. These services cater to interactive cloud-based applications (CIAs), whose core functionality operates in the cloud, demanding strict end-user interactivity requirements. This boom has led to a significant increase in their deployment, accompanied by a corresponding increase in associated maintenance costs. Service administrators aim to guarantee a satisfactory Quality of Experience (QoE) by monitoring metrics like interactivity time, particularly in cloud environments where variables such as network performance and shared resources come into play. This paper analyses anomaly detection state of the art and proposes a novel system for detecting interactivity time anomalies in cloud-based remote desktop environments. We employ an automatic model based on LSTM neural networks that achieves an accuracy of up to 99.97%.
引用
收藏
页码:34402 / 34416
页数:15
相关论文
共 55 条
[1]   Working in Virtual Teams: A Systematic Literature Review and a Bibliometric Analysis [J].
Abarca, Victor M. Garro ;
Palos-Sanchez, Pedro R. ;
Rus-Arias, Enrique .
IEEE ACCESS, 2020, 8 :168923-168940
[2]  
Aggarwal C., 2018, Neural Networks and Deep Learning, DOI 10.1007/978-3-319-94463-0
[3]   Unsupervised real-time anomaly detection for streaming data [J].
Ahmad, Subutai ;
Lavin, Alexander ;
Purdy, Scott ;
Agha, Zuha .
NEUROCOMPUTING, 2017, 262 :134-147
[4]   A survey of network anomaly detection techniques [J].
Ahmed, Mohiuddin ;
Mahmood, Abdun Naser ;
Hu, Jiankun .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 :19-31
[5]   Methods for Objective and Subjective Evaluation of Zero-Client Computing [J].
Alali, Fatma ;
Adams, Tasha A. ;
Foley, Rider W. ;
Kilper, Dan ;
Williams, Ronald D. ;
Veeraraghavan, Malathi .
IEEE ACCESS, 2019, 7 :94569-94582
[6]  
[Anonymous], 2021, Cloud Gaming Market by offering (Infrastructure and Gaming Platform Service), Device Type (Smartphones, Tablets, Gaming Consoles, PCs & Laptops, Smart TVs, and HMDs), and Solution (File streaming and video streaming): Global Opportunity Analysis and Industry Forecast, 2021-2030
[7]   Protocol-agnostic method for monitoring interactivity time in remote desktop services [J].
Arellano-Uson, Jesus ;
Magana, Eduardo ;
Morato, Daniel ;
Izal, Mikel .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (13) :19107-19135
[8]  
Ba J, 2014, ACS SYM SER
[9]  
Bartik A., 2020, SSRN Electron. J., V7422
[10]  
Berryman A., 2010, Proceedings of the 2010 IEEE 2nd International Conference on Cloud Computing Technology and Science (CloudCom 2010), P480, DOI 10.1109/CloudCom.2010.106