ABSTRACT
The increased complexity of hardware and software resources and the asynchronous interaction among components (such as servers, end devices, network, services and software) make fault detection and recovery very challenging. In this paper, we present innovative concepts for fault detection, root cause analysis and self-healing architectures analyzing the duration of pattern transition sequences during an execution window. In this approach, all interactions among components of Pervasive Computing Systems (PCS) are monitored and analyzed. We use three-dimensional array of features to capture spatial and temporal variability to be used by an anomaly analysis engine to immediately generate an alert when abnormal behavior pattern is captured indicating some kind of software or hardware failure. The main contributions of this paper include the innovative analysis methodology and feature selection to detect and identify anomalous behavior. Evaluating the effectiveness of this approach to detect faults injected asynchronously shows a detection rate of above 99.9% with no occurrences of false alarms for a wide range of scenarios.
- M. Bang, A. Larsson and H. Eriksson, "NOSTOS: A paper-based ubiquitous computing healthcare environment to support data capture and collaboration," in Proc. 2003 AMIA Annual Symp., Washington, DC, pp. 46--50, 2003.Google Scholar
- S. Reinhardt and S. Mukherjee, "Transient fault detection via simultaneous multithreading," Pro. of the 27th annual international symposium on Computer architecture, 2000. Google ScholarDigital Library
- A. Wood, ""Data Integrity Concepts, Features, and Technology," " White paper, Tandem Division, Compaq Computer Corporation.Google Scholar
- G. A. C. Reis, J. Chang, N. Vachharajani, R. Rangan, and D.I. August, "SWIFT: software implemented fault tolerance" Code Generation and Optimization pp. 243 -- 254, 2005. Google ScholarDigital Library
- T. M. Khoshgoftaar, and E. B. Allen, "Controlling overfitting in software quality models: experiments with regression trees and classification" IEEE METRICS, 2001. Google ScholarDigital Library
- E. B. Allen, T. M. Khoshgoftaar, and J. Deng, "Using regression trees to classify fault-prone software modules Reliability," IEEE Trans. on Comp., vol. 51, pp. 455--462, 2002.Google Scholar
- T. M. Khoshgoftaar and N. Seliya, "Fault Prediction Modeling for Software Quality Estimation: Comparing Commonly Used Techniques", Empirical Software Engineering, vol. 8, pp. 255--283, 2003. Google ScholarDigital Library
- T. M. Khoshgoftaar and D. L. Lanning, "A neural network approach for early detection of program modules having high risk in the maintenance phase," Journal of Systems and Software, vol. 29, pp. 85--91, Apr. 1995. Google ScholarDigital Library
- A. P. Nikora and J. C. Munson, "Developing fault predictors for evolving software systems", Proc. of The Ninth International Software Metrics Symposium, 2003 Google ScholarDigital Library
- T. S. Y. Ping, and H. Muller, "Predicting fault proneness using OO metrics", An industrial case study Proc. of The Sixth European Conference on Software Maintenance and Reengineering, pp. 99--107, 2002. Google ScholarDigital Library
- G. P. Beaumont, "Statistical Tests: An Introduction with Minitab Commentary", Prentice Hall, 1996.Google Scholar
- C. Ebert, "Classification techniques for metric-based software development", Software Quality Journal, vol. 5, pp. 255--272, Dec. 1996.Google ScholarCross Ref
- E. B. Allen, T. M. Khoshgoftaar, W. D. Jones, and J. P. Hudepohl, "Accuracy of software quality models", Annals of Software Engineering," vol. 9, pp. 103--116, 2000. Google ScholarDigital Library
- F. Fioravanti and P. Nesi, "A study on fault-proneness detection of object-oriented systems", Proc. on Software Maintenance and Reengineering, pp. 121--130, 2001. Google ScholarDigital Library
- L. C. Briand, J. Wust, J. W. Daly, and D. V. Porter, "Exploring the relationship between design measures and software quality in object-oriented systems", The Journal of Systems and Software, vol. 51, pp. 245--273, 2000. Google ScholarDigital Library
- R. Takahashi, Y. Muraoka and Y. Nakamura, "Building software quality classification trees: Approach, experimentation, evaluation", In Proceedings of the Eighth International Symposium on Software Reliability Engineering, IEEE Computer Society, pp. 222--233, 1997. Google ScholarDigital Library
- I. C. Forman George, "Learning From Little: Comparison of Classifiers given Little Training", ECML/PKDD, 2004. Google ScholarDigital Library
- G. Forman, "An extensive empirical study of feature selection metrics for text classification," Journal of Machine Learning Research pp. 1289--1305, 2003. Google ScholarDigital Library
- TPC-W. http://www.tpc.org/tpcw, April 2005.Google Scholar
- J. Ray, J. C. Hoe and B. Falsafi, "Dual use of superscalar datapath for transient-fault detection and recovery", In Proceedings of the 34th annual ACM/IEEE international symposium on Microarchitecture. IEEE Computer Society, pp. 214--224, 2001. Google ScholarDigital Library
- G. A. Reis, J. Chang, N. Vachharajani, R. Rangan, D. I. August and S. S. Mukherjee, "Software - controlled fault tolerance," ACM Transactions on Architecture and Code Optimization, vol. V, No. N, pp. 1--28, 2005. Google ScholarDigital Library
- N. OH, P. P. SHIRVANI, and E. J. MCCLUSKEY, "Error detection by duplicated instructions in super-scalar processors", In IEEE Trans. on Reliability vol. 51, pp. 63--75. March 2002.Google ScholarCross Ref
- G. A. Reis, J. Chang, N. Vachharajani, R. Rangan, D. I. August and S.S. Mukherjee, "Design and evaluation of hybrid fault-detection systems", 32nd International Symposium on Computer Architecture, 2005. Google ScholarDigital Library
- N. Ye and Q. Chen, "An Anomaly Detection Technique Based on Chi-Square Statistic," Quality and Reliablility Engineering International, vol. 17, pp. 105--112, 2001.Google ScholarCross Ref
- A. Lazarevic, V. Kumar and J. Srivastava, "Intrusion Detection: A Survey", Springer US, vol. 5, 2006.Google Scholar
- I. Cohen, S. Zhang, M. Goldszmidt, J. Symons, T. Kelly and A. Fox, "Capturing, indexing, clustering, and retrieving system history," ACM SOSP 2005. Google ScholarDigital Library
- R. Maxion and K. M. C. Tand, "Anomaly Detection in Embedded Systems," IEEE Transactions on Computers, vol. 51, pp. 108--120, 2002. Google ScholarDigital Library
- T. Lane and C. E. Brodie, "Temporal Sequence Learning and Data Reduction for Anomaly Detection," ACM Trans. on Information and System Security, vol. 2, pp. 295--331, 1999. Google ScholarDigital Library
- S. Fayssal and S. Hariri "Anomaly-based Protection Approach Against Wireless Network Attacks", In Proc., IEEE International Conference on Pervasive Service, 2007.Google Scholar
- J. R. Quinlan, "Induction of decision trees", Machine Learning, pp. 1:81--106, 1986. Google ScholarDigital Library
- H. Chen, S. Hariri. and F. Rasal, "An Innovative Self-Configuration Approach for Networked Systems and Applications", presented at 4th ACS/IEEE International Conference on Computer Systems and Applications, 2006. Google ScholarDigital Library
- S. Dharmapurikar, P. Krishnamurthy and D. E. Taylor, " Longest Prefix Matching Using Bloom Filters", ACM SIGCOMM'03, Karlsruhe, Germany, August 25-29, 2003. Google ScholarDigital Library
- C. Marceau, "Characterizing the Behavior of a Program Using Multiple-Length N-grams," In New Security Paradigms Workshop, Cork, Ireland, 2000. Google ScholarDigital Library
- M. Christodorescu and S. Jha, "Static Analysis of Executables to Detect Malicious Patterns", In USENIX Security Symposium, Washington, D.C., 2003. Google ScholarDigital Library
- R. Vargiya and P. Chan, "Boundary Detection in Tokenizing Network Application Payload for Anomaly Detection", on Data Mining for Computer Security (DMSEC), 2003.Google Scholar
- K. Wang, J. J. Parekh and S. J. Stolfo "Anagram: A Content Anomaly Detector Resistant To Mimicry Attack", In Proceedings of the Ninth International Symposium on Recent Advances in Intrusion Detection 2006. Google ScholarDigital Library
- Byoung uk Kim, S. Hariri "Anomaly-based Fault Detection System in Distributed Systems", 5th IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, 2007 Google ScholarDigital Library
- A. Partow, " http://www.partow.net/programming/hashfunctions/#Available," HashFunctions.Google Scholar
Index Terms
- Anomaly-based fault detection in pervasive computing system
Recommendations
A Consensus Novelty Detection Ensemble Approach for Anomaly Detection in Activities of Daily Living
AbstractA new approach to creating an ensemble of novelty detection algorithms is proposed in this paper. The novelty detection process identifies new or unknown data by detecting if a test data differs significantly from the data available ...
Highlights- An ensemble approach is proposed for novelty detection algorithms.
- The proposed ...
Textures of optical flow for real-time anomaly detection in crowds
AVSS '11: Proceedings of the 2011 8th IEEE International Conference on Advanced Video and Signal Based SurveillanceAutomated visual surveillance of crowds is a rapidly growing area of research. In this paper we focus on motion representation for the purpose of abnormality detection in crowded scenes. We propose a novel visual representation called textures of ...
Comments