Data Stream Mining Based-Outlier Prediction for Cloud Computing

被引:1
作者
Souiden, Imen [1 ]
Brahmi, Zaki [2 ,3 ]
Lafi, Lamine [1 ,2 ,3 ]
机构
[1] Kairouan Univ, ISIGK, Kairouan, Tunisia
[2] Sousse Univ, ISITcom, Sousse, Tunisia
[3] Sousse Univ, ISSAT, Sousse, Tunisia
来源
DIGITAL ECONOMY: EMERGING TECHNOLOGIES AND BUSINESS INNOVATION, ICDEC 2017 | 2017年 / 290卷
关键词
Data stream mining; Outlier detection; Cloud computing;
D O I
10.1007/978-3-319-62737-3_11
中图分类号
F [经济];
学科分类号
02 ;
摘要
The cloud computing is the dream of computing used as utility that became true. It is currently emerging as a hot topic due to the important services it provides. Ensuring high quality services is a challenging task especially with the considerable increase of the user's requests coming continuously in real time to the data center servers and consuming its resources. Abnormal users requests may contribute to the system failure. Thus, it's crucial to detect these abnormalities for further analysis and prediction. To do that, we propose the use of the outlier detection techniques in the context of the data stream mining due to the similarity between the nature of the data streams and the users requests which require analysis and mining in real time. The main contribution of this paper consists of: first, the formulation of the users requests as well as the server state as a stream of data. This data is generated from CSG(+) a cloud stream generator that we extended from CSG [1]. Second, the creation of a framework for the detection of the abnormal users requests in terms of the CPU and memory by using AnyOut and MCOD algoithms implemented within MOA (Massive Online Analysis) (http://moa.cms.waikato.ac.nz/) framework. Third, the comparison between them in this context.
引用
收藏
页码:131 / 142
页数:12
相关论文
共 22 条
[1]  
[Anonymous], 1980, IDENTIFICATION OUTLI, DOI DOI 10.1007/978-94-015-3994-4
[2]  
Assent Ira, 2012, Database Systems for Advanced Applications. Proceedings of the 17th International Conference, DASFAA 2012, P228, DOI 10.1007/978-3-642-29038-1_18
[3]  
Bhaduri K., 2011, 2011 IEEE International Conference on Data Mining Workshops, P137, DOI 10.1109/ICDMW.2011.62
[4]  
Cao L, 2014, INT CONF HIGH VOLTA
[5]  
Hassen F. B., 2016, 1 INT C DIG EC EM TE
[6]  
Kale A., 2015, WIREL PERSONAL COMMU, V110
[7]  
Karimian S. H., 2012, 16 CSI INT S ART INT
[8]   Efficient and flexible algorithms for monitoring distance-based outliers over data streams [J].
Kontaki, Maria ;
Gounaris, Anastasios ;
Papadopoulos, Apostolos N. ;
Tsichlas, Kostas ;
Manolopoulos, Yannis .
INFORMATION SYSTEMS, 2016, 55 :37-53
[9]  
Lin F., 2010, Journal of convergence information technology, V5, P66
[10]   Incremental local outlier detection for data streams [J].
Pokrajac, Dragojub ;
Lazarevic, Aleksandar ;
Latecki, Longin Jan .
2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, :504-515