ASSESSING INVARIANT MINING TECHNIQUES FOR CLOUD-BASED UTILITY COMPUTING SYSTEMS

Similar documents
PERSONAL WEB REVISITATION BY CONTEXT AND CONTENT KEYWORDS WITH RELEVANCE FEEDBACK

TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS

OPTIMAL SERVICE PRICING FOR A CLOUD CACHE

Lab Determining Data Storage Capacity

SYSTEM REQUIREMENTS M.APP ENTERPRISE

An Empirical Comparison of Automated Generation and Classification Techniques for Object-Oriented Unit Testing

Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs

Sage 200 Online. System Requirements and Prerequisites

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

escan for Windows: escan System Requirements

Trend Micro Core Protection Module 10.6 SP1 System Requirements

MACHINE LEARNING BASED METHODOLOGY FOR TESTING OBJECT ORIENTED APPLICATIONS

IBM SPSS Text Analytics for Surveys

ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING

F-Secure PSB Getting Started Guide

QUICKBOOKS PRO 2008 INSTALLING QUICKBOOKS PRO AND STUDENT DATA FILES

Extended Program Invariants: Applications in Testing and Fault Localization

Midterm Wednesday Oct. 27, 7pm, room 142

Perceptive Experience Web Scan

Installation Guide for the Workspot Enterprise Connector

A Novel Approach to Unit Testing: The Aspect-Oriented Way

QUICKBOOKS PRO 2009 INSTALLING QUICKBOOKS PRO AND STUDENT DATA FILES

Cloud security is an evolving sub-domain of computer and. Cloud platform utilizes third-party data centers model. An

For Windows (32-bit & 64-bit).

System Requirements 2008 R2

8/3/2017. Contour Assessment for Quality Assurance and Data Mining. Objective. Outline. Tom Purdie, PhD, MCCPM

PCVITA Express Migrator for SharePoint (Lotus Notes Doc Lib) 2011

Minimum System Requirements for Horizon s new Windows Product

Auto Secured Text Monitor in Natural Scene Images

Installing Windows Server Heng Sovannarith

Fiery Network Controller for Xerox WorkCentre 7800 Series. Welcome

The Benefits of Combining Archiving Technologies for Exchange 2003 Migration

Ekran System System Requirements and Performance Numbers

BigDataBench-MT: Multi-tenancy version of BigDataBench

AVA: Supporting Debugging With Failure Interpretations

Automatic Extraction of Abstract-Object-State Machines Based on Branch Coverage

Molecular Devices High Content Screening Computer Specifications

Dynamic Resource Allocation for Distributed Dataflows. Lauritz Thamsen Technische Universität Berlin

Online Optimization of VM Deployment in IaaS Cloud

Hadoop/MapReduce Computing Paradigm

OpenManage Printer Manager FAQ

Leveraging Data Invariants in Model Inference for Test Case Generation

vcdm System Requirements Version 6.4 English

CS 6V Program Analysis I: Dynamic Detection of Likely Invariants and Robust Signatures for Kernel Data Structure.

IBM Terms of Use SaaS Specific Offering Terms. IBM DB2 on Cloud. 1. IBM SaaS. 2. Charge Metrics

Marshal Reporting Console Installation Guide

Service Description. IBM DB2 on Cloud. 1. Cloud Service. 1.1 IBM DB2 on Cloud Standard Small. 1.2 IBM DB2 on Cloud Standard Medium

Adaptive Cluster Computing using JavaSpaces

vcdm System Requirements Version 6.2 English

Stimuli Generation through Invariant Mining for Black-Box Verification

Sage ACT! PRO 2011 System Requirements

Lecture 10. Dynamic Analysis

Multi-tenancy version of BigDataBench

Lightweight Streaming-based Runtime for Cloud Computing. Shrideep Pallickara. Community Grids Lab, Indiana University

theguard! NetworkManager (Version 6.0)

Agenda Computer Hardware Input Devices Output Devices Secondary Storage Computer Software System Software Application Software Working with Windows

VMware Cloud on AWS Technical Deck VMware, Inc.

A Crawljax Based Approach to Exploit Traditional Accessibility Evaluation Tools for AJAX Applications

Double Threshold Based Load Balancing Approach by Using VM Migration for the Cloud Computing Environment

NTP Software QFS End User Support Infrastructure

Adaptive Runtime Verification for Autonomic Communication Infrastructures

Installing and Setting Up the Snap-on EPC. Rev.1.10 (10 Oct 2013) PN EN

PrinterOn Print Delivery Station

Enhancing Cluster Quality by Using User Browsing Time

SQL Diagnostic Manager Management Pack for Microsoft System Center

etrac Guide System Requirements Global DMS, 1555 Bustard Road, Suite 300, Lansdale, PA , All Rights Reserved.

Descriptions for CIS Classes (Fall 2017)

Seqrite Endpoint Security

AxoNet Software GmbH Installation and Operation of asanetwork Network Manager Version 2.5 or later

Results and Discussions on Transaction Splitting Technique for Mining Differential Private Frequent Itemsets

Book Xpress Quick Startup Guide

Supporting Operating System Kernel Data Disambiguation using Points-to Analysis

The onprom Toolchain for Extracting Business Process Logs using Ontology-based Data Access

Enhancing Cluster Quality by Using User Browsing Time

Infrequent Weighted Itemset Mining Using SVM Classifier in Transaction Dataset

Mitrefinch. Infrastructure Requirements

Anonymization Mechanism for Privacy-Preserving Location Monitoring System in WSN

MYOB Enterprise Solutions System Requirement Guidelines. Wednesday 21 st March 2012 Version 2.6

Decomposed Process Mining with DivideAndConquer

Agile Platform 6.0 System Requirements

NTP Software VFM Recovery Portal

Verizon SiteAdvisor Powered by McAfee. Installation Guide for Home Users

McAfee Virtual Network Security Platform 8.4 Revision A

vcdm System Requirements Version 6.6 English

IBM Terms of Use SaaS Specific Offering Terms. IBM DB2 on Cloud. 1. IBM SaaS. 2. Charge Metrics. 3. Charges and Billing

Finding Hubs and authorities using Information scent to improve the Information Retrieval precision

Twitter data Analytics using Distributed Computing

ABSTRACT I. INTRODUCTION

Cooperative Caching in Wireless P2P Networks. Aseel Nadhum Kadhum The Islamic University College

davidklee.net gplus.to/kleegeek linked.com/a/davidaklee

BEAWebLogic. Platform. 8.1 Supported Configurations: Microsoft Windows x64

Client Server Protocol Implementation

Cloud Computing Security: From Single to Multi-Clouds

Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for Electronic Health Cloud

Automatic Identification of Common and Special Object-Oriented Unit Tests

VMware Infrastructure 3 Primer Update 2 and later for ESX Server 3.5, ESX Server 3i version 3.5, VirtualCenter 2.5

MACHINE LEARNING FOR SOFTWARE MAINTAINABILITY

ibench: Quantifying Interference in Datacenter Applications

Perceptive TransForm. Technical Specifications. Version: 8.x Compatible with ImageNow 6.5.x to 6.7.x and Perceptive Content 7.x

Heuristics-based Parameter Generation for Java Methods

Transcription:

ASSESSING INVARIANT MINING TECHNIQUES FOR CLOUD-BASED UTILITY COMPUTING SYSTEMS

ABSTRACT Likely system invariants model properties that hold in operating conditions of a computing system. Invariants may be mined offline from training datasets, or inferred during execution. Scientific work has shown that invariants mining techniques support several activities, including capacity planning and detection of failures, anomalies and violations of Service Level Agreements. However their practical application by operation engineers is still a challenge..

We aim to fill this gap through an empirical analysis of three major techniques for mining invariants in cloud-based utility computing systems: clustering, association rules, and decision list. The experiments use independent datasets from real-world systems: a Google cluster, whose traces are publicly available, and a Softwareas-a-Service platform used by various companies worldwide. We assess the techniques in two invariants applications, namely executions characterization and anomaly detection, using the metrics of coverage, recall and precision.

EXISTING SYSTEM While previous scientific work has shown that invariant mining techniques may be beneficial for the above goals, practitioners face several problems, including (i) how to select a proper technique for their analysis goals, (ii) how many invariants are needed, and (iii) what accuracy they can expect. We cope with the challenge of filling the gap between past studies and the concrete usage of likely system invariants by operations engineers of cloud-based utility computing systems. By empirically analyzing and comparing techniques to mine invariants, we contribute to gain quantitative insights into advantages and limits of such techniques, providing operation engineers with practical usage implications and a heuristic to select a set of invariants from a dataset

DISADVANTAGES It is very hard for human operators to detect application problems in real time.

PROPOSED SYSTEM The study focuses on three techniques: two unsupervised, namely clustering and association rules, and one supervised, de-cision list. They are applied to two independent datasets collected in real-world systems: a cluster operated by Google, whose traces from about 12,500 machines are publicly available, and a SaaS platform in use by various medium- to large-scale consumer pack-aged goods (CPG) companies worldwide. The datasets comprise 679,984 executions (correct and anomalous) of batch units of work, namely jobs and transactions. We explore the use of the techniques for two typical applica-tions of invariant-based analysis, namely executions

ADVANTAGES Accuracy and completeness of invariant-based anomaly detection. A well tuned approach can reach good completeness at an accuracy

HARDWARE REQUIREMENTS System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Floppy Drive : 1.44 Mb. Monitor : 15 VGA Colour. Mouse : Logitech. Ram : 512 Mb.

SOFTWARE REQUIREMENTS Operating system Coding Language : Windows XP/7. : ASP.net, C#.net /java

CONCLUSION Likely System Invariants can be mined for a variety of service computing systems, including cloud systems, web service infrastructures, datacenters, enterprise systems, IT services and utility computing systems, network services, distributed sys-tems. They represent operational abstractions of normal system dynamics. The identification and the analysis of their violations support a range of operational activities, such as runtime anomaly detection, post mortem troubleshooting, capacity planning. In this work we have used two real-world datasets - the publicly available Google datacenter dataset and a dataset of a commercial SaaS utility computing platform - for assessing and comparing three techniques for invariant mining.

REFERENCE [1] M. D. Ernst, J. Cockrell, W. G. Griswold, and D. Notkin, Dynamically Discovering Likely Program Invariants to Support Program Evolution, IEEE Trans. on Software Engineering, vol. 27, pp. 99 123, 2001. [2] C. Pacheco and M. D. Ernst, Eclat: Automatic Generation and Classi-fication of Test Inputs, in Proc. 19th European Conference on Object-Oriented Programming (ECOOP), pp. 504 527, Springer, 2005. [3] C. Csallner and Y. Smaragdakis, Dynamically discovering likely inter-face specifications, in Proc. 28th Int. Conference on Software Engineer-ing (ICSE), pp. 861 864, ACM, 2006.