Anomaly detection and diagnosis for cloud services: Practical experiments and lessons learned

被引:46
作者
Sauvanaud, Carla [1 ]
Kaaniche, Mohamed [1 ]
Kanoun, Karama [1 ]
Lazri, Kahina [2 ]
Silvestre, Guthemberg Da Silva [3 ]
机构
[1] Univ Toulouse, CNRS, LAAS, Toulouse, France
[2] Orange Labs, 38 Rue Gen Leclerc, F-92130 Issy Les Moulineaux, France
[3] ENAC, 7 Ave Edouard Belin,CS 54005, F-31055 Toulouse 4, France
关键词
Anomaly detection; System monitoring; Machine learning; Fault injection; SLA; Diagnosis; Virtualization;
D O I
10.1016/j.jss.2018.01.039
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The dependability of cloud computing services is a major concern of cloud providers. In particular, anomaly detection techniques are crucial to detect anomalous service behaviors that may lead to the violation of service level agreements (SLAs) drawn with users. This paper describes an anomaly detection system (ADS) designed to detect errors related to the erroneous behavior of the service, and SLA violations in cloud services. One major objective is to help providers to diagnose the anomalous virtual machines (VMs) on which a service is deployed as well as the type of error associated to the anomaly. Our ADS includes a system monitoring entity that collects software counters characterizing the cloud service, as well as a detection entity based on machine learning models. Additionally, a fault injection entity is integrated into the ADS for the training the machine learning models. This entity is also used to validate the ADS and to assess its anomaly detection and diagnosis performance. We validated our ADS with two case studies deployments: a NoSQL database, and a virtual IP Multimedia Subsystem developed implementing a virtual network function. Experimental results show that our ADS can achieve a high detection and diagnosis performance. (c) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:84 / 106
页数:23
相关论文
共 64 条
[1]   CARDWATCH: A neural network based database mining system for credit card fraud detection [J].
Aleskerov, E ;
Freisleben, B ;
Rao, B .
PROCEEDINGS OF THE IEEE/IAFE 1997 COMPUTATIONAL INTELLIGENCE FOR FINANCIAL ENGINEERING (CIFER), 1997, :220-226
[2]  
[Anonymous], 1999, Technometrics, DOI DOI 10.2307/1269742
[3]  
[Anonymous], 2005, P 28 AUSTR CS C
[4]  
[Anonymous], 2008, WILEY ONLINE LIB
[5]  
[Anonymous], 2009, P HOTCLOUD
[6]  
[Anonymous], 2010, P 1 ACM S CLOUD COMP, DOI DOI 10.1145/1807128.1807152
[7]   Basic concepts and taxonomy of dependable and secure computing [J].
Avizienis, A ;
Laprie, JC ;
Randell, B ;
Landwehr, C .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) :11-33
[8]  
Berral JosepLl., 2010, e-Energy'10. (Passau, P215
[9]  
Bhat AmjadHussain., 2013, International Journal of Application or Innovation in Engineering Management (IJAIEM), V2, P56
[10]   The use of the area under the roc curve in the evaluation of machine learning algorithms [J].
Bradley, AP .
PATTERN RECOGNITION, 1997, 30 (07) :1145-1159