Mining Techniques For Invariants In Cloud Computing

  • Sadhika K UG Scholar, Department of Computer Science and Engineering, GMR Institute of Technology, Razam
Keywords: Anomaly detection, Invariants, SaaS, Cloud

Abstract

The increasing popularity of Software as a Service (SaaS) stresses the need of solutions to predict failures and avoid service interruptions, which invariably result in SLA violations and severe loss of revenue. A promising approach to continuously monitor the correct functioning of the system is to check the execution conformance to a set of invariants, i.e., properties that must hold when the system is deemed to run correctly. This paper proposes a technique to spot a true anomalies by the use of various data mining techniques like clustering, association rule and decision tree algorithms help in finding the hidden and previously unknown information from the database. We assess the techniques in two invariants’ applications, namely executions characterization and anomaly detection, using the metrics of coverage, recall and precision. In this work two real-world datasets have been used - the publicly available Google datacenter dataset and a dataset of a commercial SaaS utility computing platform - for detecting the anomalies.

References

M. D. Ernst, J. Cockrell, W. G. Griswold, and D. Notkin, Dynamically Discovering Likely Program Invariants to Support Program Evolution, IEEE Trans. Soft. Eng., 27(2001) 99–123.

H. Chen, H. Cheng, G. Jiang, K. Yoshihira, Invariants Based Failure Diagnosis in Distributed Computing Systems, in Proc. 29th IEEE Int. Symp. Reliable Dis. Sys., (2010) 160–166.

G. Jiang, H. Chen, and K. Yoshihira, Modeling and Tracking of Transaction Flow Dynamics for Fault Detection in Complex Systems, IEEE Trans. on Depen. Sec. Com., 3(2006) 312–326.

G. Jiang, H. Chen, and K. Yoshihira, Efficient and scalable algorithms for inferring likely invariants in distributed systems, IEEE Trans. on Data and Knowledge Eng., 19(2007) 1508–1523.

H. Chen, H. Cheng, G. Jiang, and K. Yoshihira, Exploiting Local and Global Invariants for the Management of Large Scale Information Systems, in Proc. 8th IEEE Int. Conference on Data Mining, (2008) 113–122.

F. Frattini, S. Sarkar, J. Khasnabish, and S. Russo, Using Invariants for Anomaly Detection: The Case Study of a SaaS Application, in Proc. 25th Int. Symp. Software Reli. Eng. Work., (2014) 383–388.

X. Chen, C.-D. Lu, and K. Pattabiraman, Failure Analysis of Jobs in Compute Clouds: A Google Cluster Case Study, in Proc. 25th Int. Symp. Soft. Reli. Eng., (2014) 167–177.

C. Pacheco and M. D. Ernst, Eclat: Automatic Generation and Classification of Test Inputs, in Proc. 19th Eur. Conf. Object Oriented Pro., Springer (2005), 504–527.

C. Csallner and Y. Smaragdakis, Dynamically discovering likely interface specifications, in Proc. 28th Int. Conf. Software Eng. (2006) 861–864.

L. Mariani, S. Papagiannakis, and M. Pezzè, Compatibility and regression testing of COTS-component-based software, in Proc. 29th Int. Conf. Soft. Eng. (2007) ACM.

J. Cobb, J. A. Jones, G. M. Kapfhammer, and M. J. Harrold, Dynamic Invariant Detection for Relational Databases, in Proc. 9th Int. Workshop on Dynamic Analysis, ACM (2011) 12–17.

Published
2019-05-30