Detecting Anomalous Behavior of Black-Box Services Modeled with Distance-Based Online Clustering. Gulenko, A., Schmidt, F., Acker, A., Wallschläger, M., Kao, O., & Liu, F. In 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), pages 912–915, July, 2018. ISSN: 2159-6190doi abstract bibtex Reliable deployment of services is especially challenging in virtualized infrastructures, where the deep tech-nological stack and the multitude of components necessitate automatic anomaly detection and remediation mechanisms. Traditional monitoring solutions observe the system and generate alarms when the collected metrics exceed predefined thresholds. The fixed thresholds rely on expert knowledge and can lead to numerous false alarms, while abnormal behavior that spans over multiple metrics, components, or system layers, may not be detected. We propose to use an unsupervised online clustering algorithm to create a model of the normal behavior of each monitored component with minimal human interaction and no impact on the monitored system. When an anomaly is detected, a human administrator or automatic remediation system can subsequently revert the component into a normal state. An experimental evaluation resulted in a high accuracy of our approach, indicating that it is suitable for anomaly detection in productive systems.
@inproceedings{gulenko_detecting_2018,
title = {Detecting {Anomalous} {Behavior} of {Black}-{Box} {Services} {Modeled} with {Distance}-{Based} {Online} {Clustering}},
doi = {10.1109/CLOUD.2018.00134},
abstract = {Reliable deployment of services is especially challenging in virtualized infrastructures, where the deep tech-nological stack and the multitude of components necessitate automatic anomaly detection and remediation mechanisms. Traditional monitoring solutions observe the system and generate alarms when the collected metrics exceed predefined thresholds. The fixed thresholds rely on expert knowledge and can lead to numerous false alarms, while abnormal behavior that spans over multiple metrics, components, or system layers, may not be detected. We propose to use an unsupervised online clustering algorithm to create a model of the normal behavior of each monitored component with minimal human interaction and no impact on the monitored system. When an anomaly is detected, a human administrator or automatic remediation system can subsequently revert the component into a normal state. An experimental evaluation resulted in a high accuracy of our approach, indicating that it is suitable for anomaly detection in productive systems.},
booktitle = {2018 {IEEE} 11th {International} {Conference} on {Cloud} {Computing} ({CLOUD})},
author = {Gulenko, Anton and Schmidt, Florian and Acker, Alexander and Wallschläger, Marcel and Kao, Odej and Liu, Feng},
month = jul,
year = {2018},
note = {ISSN: 2159-6190},
keywords = {Anomaly detection, Cloud computing, Data collection, Data models, Measurement, Monitoring, Virtual machine monitors, anomaly detection, cloud computing, machine learning, service virtualization},
pages = {912--915},
}
Downloads: 0
{"_id":"2kydfLJjEDL7Q8FHS","bibbaseid":"gulenko-schmidt-acker-wallschlger-kao-liu-detectinganomalousbehaviorofblackboxservicesmodeledwithdistancebasedonlineclustering-2018","author_short":["Gulenko, A.","Schmidt, F.","Acker, A.","Wallschläger, M.","Kao, O.","Liu, F."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Detecting Anomalous Behavior of Black-Box Services Modeled with Distance-Based Online Clustering","doi":"10.1109/CLOUD.2018.00134","abstract":"Reliable deployment of services is especially challenging in virtualized infrastructures, where the deep tech-nological stack and the multitude of components necessitate automatic anomaly detection and remediation mechanisms. Traditional monitoring solutions observe the system and generate alarms when the collected metrics exceed predefined thresholds. The fixed thresholds rely on expert knowledge and can lead to numerous false alarms, while abnormal behavior that spans over multiple metrics, components, or system layers, may not be detected. We propose to use an unsupervised online clustering algorithm to create a model of the normal behavior of each monitored component with minimal human interaction and no impact on the monitored system. When an anomaly is detected, a human administrator or automatic remediation system can subsequently revert the component into a normal state. An experimental evaluation resulted in a high accuracy of our approach, indicating that it is suitable for anomaly detection in productive systems.","booktitle":"2018 IEEE 11th International Conference on Cloud Computing (CLOUD)","author":[{"propositions":[],"lastnames":["Gulenko"],"firstnames":["Anton"],"suffixes":[]},{"propositions":[],"lastnames":["Schmidt"],"firstnames":["Florian"],"suffixes":[]},{"propositions":[],"lastnames":["Acker"],"firstnames":["Alexander"],"suffixes":[]},{"propositions":[],"lastnames":["Wallschläger"],"firstnames":["Marcel"],"suffixes":[]},{"propositions":[],"lastnames":["Kao"],"firstnames":["Odej"],"suffixes":[]},{"propositions":[],"lastnames":["Liu"],"firstnames":["Feng"],"suffixes":[]}],"month":"July","year":"2018","note":"ISSN: 2159-6190","keywords":"Anomaly detection, Cloud computing, Data collection, Data models, Measurement, Monitoring, Virtual machine monitors, anomaly detection, cloud computing, machine learning, service virtualization","pages":"912–915","bibtex":"@inproceedings{gulenko_detecting_2018,\n\ttitle = {Detecting {Anomalous} {Behavior} of {Black}-{Box} {Services} {Modeled} with {Distance}-{Based} {Online} {Clustering}},\n\tdoi = {10.1109/CLOUD.2018.00134},\n\tabstract = {Reliable deployment of services is especially challenging in virtualized infrastructures, where the deep tech-nological stack and the multitude of components necessitate automatic anomaly detection and remediation mechanisms. Traditional monitoring solutions observe the system and generate alarms when the collected metrics exceed predefined thresholds. The fixed thresholds rely on expert knowledge and can lead to numerous false alarms, while abnormal behavior that spans over multiple metrics, components, or system layers, may not be detected. We propose to use an unsupervised online clustering algorithm to create a model of the normal behavior of each monitored component with minimal human interaction and no impact on the monitored system. When an anomaly is detected, a human administrator or automatic remediation system can subsequently revert the component into a normal state. An experimental evaluation resulted in a high accuracy of our approach, indicating that it is suitable for anomaly detection in productive systems.},\n\tbooktitle = {2018 {IEEE} 11th {International} {Conference} on {Cloud} {Computing} ({CLOUD})},\n\tauthor = {Gulenko, Anton and Schmidt, Florian and Acker, Alexander and Wallschläger, Marcel and Kao, Odej and Liu, Feng},\n\tmonth = jul,\n\tyear = {2018},\n\tnote = {ISSN: 2159-6190},\n\tkeywords = {Anomaly detection, Cloud computing, Data collection, Data models, Measurement, Monitoring, Virtual machine monitors, anomaly detection, cloud computing, machine learning, service virtualization},\n\tpages = {912--915},\n}\n\n\n\n","author_short":["Gulenko, A.","Schmidt, F.","Acker, A.","Wallschläger, M.","Kao, O.","Liu, F."],"key":"gulenko_detecting_2018","id":"gulenko_detecting_2018","bibbaseid":"gulenko-schmidt-acker-wallschlger-kao-liu-detectinganomalousbehaviorofblackboxservicesmodeledwithdistancebasedonlineclustering-2018","role":"author","urls":{},"keyword":["Anomaly detection","Cloud computing","Data collection","Data models","Measurement","Monitoring","Virtual machine monitors","anomaly detection","cloud computing","machine learning","service virtualization"],"metadata":{"authorlinks":{}},"html":""},"bibtype":"inproceedings","biburl":"https://bibbase.org/zotero/mh_lenguyen","dataSources":["iwKepCrWBps7ojhDx"],"keywords":["anomaly detection","cloud computing","data collection","data models","measurement","monitoring","virtual machine monitors","anomaly detection","cloud computing","machine learning","service virtualization"],"search_terms":["detecting","anomalous","behavior","black","box","services","modeled","distance","based","online","clustering","gulenko","schmidt","acker","wallschläger","kao","liu"],"title":"Detecting Anomalous Behavior of Black-Box Services Modeled with Distance-Based Online Clustering","year":2018}