skip to main content
10.1145/1387269.1387294acmconferencesArticle/Chapter ViewAbstractPublication PagesicpsConference Proceedingsconference-collections
research-article

Anomaly-based fault detection in pervasive computing system

Published:06 July 2008Publication History

ABSTRACT

The increased complexity of hardware and software resources and the asynchronous interaction among components (such as servers, end devices, network, services and software) make fault detection and recovery very challenging. In this paper, we present innovative concepts for fault detection, root cause analysis and self-healing architectures analyzing the duration of pattern transition sequences during an execution window. In this approach, all interactions among components of Pervasive Computing Systems (PCS) are monitored and analyzed. We use three-dimensional array of features to capture spatial and temporal variability to be used by an anomaly analysis engine to immediately generate an alert when abnormal behavior pattern is captured indicating some kind of software or hardware failure. The main contributions of this paper include the innovative analysis methodology and feature selection to detect and identify anomalous behavior. Evaluating the effectiveness of this approach to detect faults injected asynchronously shows a detection rate of above 99.9% with no occurrences of false alarms for a wide range of scenarios.

References

  1. M. Bang, A. Larsson and H. Eriksson, "NOSTOS: A paper-based ubiquitous computing healthcare environment to support data capture and collaboration," in Proc. 2003 AMIA Annual Symp., Washington, DC, pp. 46--50, 2003.Google ScholarGoogle Scholar
  2. S. Reinhardt and S. Mukherjee, "Transient fault detection via simultaneous multithreading," Pro. of the 27th annual international symposium on Computer architecture, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Wood, ""Data Integrity Concepts, Features, and Technology," " White paper, Tandem Division, Compaq Computer Corporation.Google ScholarGoogle Scholar
  4. G. A. C. Reis, J. Chang, N. Vachharajani, R. Rangan, and D.I. August, "SWIFT: software implemented fault tolerance" Code Generation and Optimization pp. 243 -- 254, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. T. M. Khoshgoftaar, and E. B. Allen, "Controlling overfitting in software quality models: experiments with regression trees and classification" IEEE METRICS, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. E. B. Allen, T. M. Khoshgoftaar, and J. Deng, "Using regression trees to classify fault-prone software modules Reliability," IEEE Trans. on Comp., vol. 51, pp. 455--462, 2002.Google ScholarGoogle Scholar
  7. T. M. Khoshgoftaar and N. Seliya, "Fault Prediction Modeling for Software Quality Estimation: Comparing Commonly Used Techniques", Empirical Software Engineering, vol. 8, pp. 255--283, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. T. M. Khoshgoftaar and D. L. Lanning, "A neural network approach for early detection of program modules having high risk in the maintenance phase," Journal of Systems and Software, vol. 29, pp. 85--91, Apr. 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. P. Nikora and J. C. Munson, "Developing fault predictors for evolving software systems", Proc. of The Ninth International Software Metrics Symposium, 2003 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. T. S. Y. Ping, and H. Muller, "Predicting fault proneness using OO metrics", An industrial case study Proc. of The Sixth European Conference on Software Maintenance and Reengineering, pp. 99--107, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. G. P. Beaumont, "Statistical Tests: An Introduction with Minitab Commentary", Prentice Hall, 1996.Google ScholarGoogle Scholar
  12. C. Ebert, "Classification techniques for metric-based software development", Software Quality Journal, vol. 5, pp. 255--272, Dec. 1996.Google ScholarGoogle ScholarCross RefCross Ref
  13. E. B. Allen, T. M. Khoshgoftaar, W. D. Jones, and J. P. Hudepohl, "Accuracy of software quality models", Annals of Software Engineering," vol. 9, pp. 103--116, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. F. Fioravanti and P. Nesi, "A study on fault-proneness detection of object-oriented systems", Proc. on Software Maintenance and Reengineering, pp. 121--130, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. L. C. Briand, J. Wust, J. W. Daly, and D. V. Porter, "Exploring the relationship between design measures and software quality in object-oriented systems", The Journal of Systems and Software, vol. 51, pp. 245--273, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R. Takahashi, Y. Muraoka and Y. Nakamura, "Building software quality classification trees: Approach, experimentation, evaluation", In Proceedings of the Eighth International Symposium on Software Reliability Engineering, IEEE Computer Society, pp. 222--233, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. I. C. Forman George, "Learning From Little: Comparison of Classifiers given Little Training", ECML/PKDD, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. G. Forman, "An extensive empirical study of feature selection metrics for text classification," Journal of Machine Learning Research pp. 1289--1305, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. TPC-W. http://www.tpc.org/tpcw, April 2005.Google ScholarGoogle Scholar
  20. J. Ray, J. C. Hoe and B. Falsafi, "Dual use of superscalar datapath for transient-fault detection and recovery", In Proceedings of the 34th annual ACM/IEEE international symposium on Microarchitecture. IEEE Computer Society, pp. 214--224, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. G. A. Reis, J. Chang, N. Vachharajani, R. Rangan, D. I. August and S. S. Mukherjee, "Software - controlled fault tolerance," ACM Transactions on Architecture and Code Optimization, vol. V, No. N, pp. 1--28, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. N. OH, P. P. SHIRVANI, and E. J. MCCLUSKEY, "Error detection by duplicated instructions in super-scalar processors", In IEEE Trans. on Reliability vol. 51, pp. 63--75. March 2002.Google ScholarGoogle ScholarCross RefCross Ref
  23. G. A. Reis, J. Chang, N. Vachharajani, R. Rangan, D. I. August and S.S. Mukherjee, "Design and evaluation of hybrid fault-detection systems", 32nd International Symposium on Computer Architecture, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. N. Ye and Q. Chen, "An Anomaly Detection Technique Based on Chi-Square Statistic," Quality and Reliablility Engineering International, vol. 17, pp. 105--112, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  25. A. Lazarevic, V. Kumar and J. Srivastava, "Intrusion Detection: A Survey", Springer US, vol. 5, 2006.Google ScholarGoogle Scholar
  26. I. Cohen, S. Zhang, M. Goldszmidt, J. Symons, T. Kelly and A. Fox, "Capturing, indexing, clustering, and retrieving system history," ACM SOSP 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. R. Maxion and K. M. C. Tand, "Anomaly Detection in Embedded Systems," IEEE Transactions on Computers, vol. 51, pp. 108--120, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. T. Lane and C. E. Brodie, "Temporal Sequence Learning and Data Reduction for Anomaly Detection," ACM Trans. on Information and System Security, vol. 2, pp. 295--331, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. S. Fayssal and S. Hariri "Anomaly-based Protection Approach Against Wireless Network Attacks", In Proc., IEEE International Conference on Pervasive Service, 2007.Google ScholarGoogle Scholar
  30. J. R. Quinlan, "Induction of decision trees", Machine Learning, pp. 1:81--106, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. H. Chen, S. Hariri. and F. Rasal, "An Innovative Self-Configuration Approach for Networked Systems and Applications", presented at 4th ACS/IEEE International Conference on Computer Systems and Applications, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. S. Dharmapurikar, P. Krishnamurthy and D. E. Taylor, " Longest Prefix Matching Using Bloom Filters", ACM SIGCOMM'03, Karlsruhe, Germany, August 25-29, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. C. Marceau, "Characterizing the Behavior of a Program Using Multiple-Length N-grams," In New Security Paradigms Workshop, Cork, Ireland, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. M. Christodorescu and S. Jha, "Static Analysis of Executables to Detect Malicious Patterns", In USENIX Security Symposium, Washington, D.C., 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. R. Vargiya and P. Chan, "Boundary Detection in Tokenizing Network Application Payload for Anomaly Detection", on Data Mining for Computer Security (DMSEC), 2003.Google ScholarGoogle Scholar
  36. K. Wang, J. J. Parekh and S. J. Stolfo "Anagram: A Content Anomaly Detector Resistant To Mimicry Attack", In Proceedings of the Ninth International Symposium on Recent Advances in Intrusion Detection 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Byoung uk Kim, S. Hariri "Anomaly-based Fault Detection System in Distributed Systems", 5th IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, 2007 Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. A. Partow, " http://www.partow.net/programming/hashfunctions/#Available," HashFunctions.Google ScholarGoogle Scholar

Index Terms

  1. Anomaly-based fault detection in pervasive computing system

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ICPS '08: Proceedings of the 5th international conference on Pervasive services
      July 2008
      202 pages
      ISBN:9781605581354
      DOI:10.1145/1387269

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 6 July 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate23of34submissions,68%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader