skip to main content
10.1145/1362622.1362667acmconferencesArticle/Chapter ViewAbstractPublication PagesscConference Proceedingsconference-collections
research-article

Anomaly detection and diagnosis in grid environments

Published:10 November 2007Publication History

ABSTRACT

Identifying and diagnosing anomalies in application behavior is critical to delivering reliable application-level performance. In this paper we introduce a strategy to detect anomalies and diagnose the possible reasons behind them. Our approach extends the traditional window-based strategy by using signal-processing techniques to filter out recurring, background fluctuations in resource behavior. In addition, we have developed a diagnosis technique that uses standard monitoring data to determine which related changes in behavior may cause anomalies. We evaluate our anomaly detection and diagnosis technique by applying it in three contexts when we insert anomalies into the system at random intervals. The experimental results show that our strategy detects up to 96% of anomalies while reducing the false positive rate by up to 90% compared to the traditional window average strategy. In addition, our strategy can diagnose the reason for the anomaly approximately 75% of the time.

References

  1. "Emulab Tutorial: http://www.emulab.net/tutorial/docwrapper.php3?docname=tutorial.html."Google ScholarGoogle Scholar
  2. G. Allen, W. Benger, T. Goodale, et al., "The Cactus Code: A Problem Solving Environment for the Grid," 9th IEEE International Symposium on High Performance Distributed Computing (HPDC9), 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. G. Allen, D. Angulo, I. Foster, et al., "The Cactus Worm: Experiments with Dynamic Resource Discovery and Allocation in a Grid Environment," University of Chicago, Chicago TR-2001-28, 2001.Google ScholarGoogle Scholar
  4. P. Barford, J. Kline, D. Plonka, et al., "A Signal Analysis of Network Traffic Anomalies," Proceedings of ACM SIGCOMM Internet Measurement Workshop, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. D. Brutlag, "Aberrant Behavior Detection in Time Series for Network Monitoring," Proceedsing of the 14th Systems Administration Conference, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Burgess, "Probabilistic Anomaly Detection in Distributed Computer Networks," Science of Computer Programming, vol. 60, pp. 1--26, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. K. Das, "Protocol Anomaly Detection for Network-based Intrusion Detection," 2001.Google ScholarGoogle Scholar
  8. S. Dash, R. Rengaswamy, and V. Venkatasubramanian, "Fuzzy-logic based trend classification for fault diagnosis of chemical processes," Computers and Chemical Engineering, pp. 347--362, 2002.Google ScholarGoogle Scholar
  9. A. B. Downey, "A Parallel Workload Model and its Implications for Processor Allocation," Cluster Computing, vol. 1, pp. 133--145, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Gunter, M. Rodriguez, B. Tierney, et al., "Dynamic Anomaly Detection of a Wide Area File Transfer Service," Submitted to SC06, 2006.Google ScholarGoogle Scholar
  11. J. M. House, W. Y. Lee, and D. R. Shin, "Classification Techniques for Fault Detection and Diagnosis of an Air-Handling Unit," ASHRAE Transactions, vol. 105, pp. 1987--1997, 1999.Google ScholarGoogle Scholar
  12. A. Igor, B. Constantine, D. E. R, et al., "Frequency domain median-like filter for periodic and quasi-periodic noise removal," International Society for Optical Engineering Proceedings Series, 2002.Google ScholarGoogle Scholar
  13. V. Jacobson and M. J. Karel, "Congestion Avoidance and Control," Proceedings of the SIGCOMM '88 Symposium, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Kano, K. Nagao, S. Hasebe, et al., "Comparison of Statistical Process Monitoring Methods: Application to the Eastman Challenge Problem," Computer and Chemical Engineering, vol. 24, pp. 175--181, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  15. T. Kelly, "Detecting Performance Anomalies in Global Applications," Second USENIX Workshop on Real, Large Distributed Systems (WORLDS 2005), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. K. R. Koch, R. S. Baker, and R. E. Alcouffe, "Solution of the First-order Form of the 3-D Discrete Ordinates Equation on a Massively Parallel Processor," Trans. Amer. Nuc. Soc., vol. 65, 1992.Google ScholarGoogle Scholar
  17. M. V. Mahoney, "Network Traffic Anomaly Detection Based on Packet Bytes," Proc. ACM-SAC, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. S. Minhas and M. R. Reddy, "Neural Network Based Approach for Anomaly Detection in Lungs Region by Electrical Impedance Tomography," Physiological Measurement, vol. 26, pp. 489--502, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  19. A. G. Parlos, K. Kim, and R. Bharadwaj, "Sensorless Detection of Mechanical Faults in Electromechanical Systems," Mechatronics, vol. 13, pp. 357--380, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  20. A. G. Pennington, J. D. Strunk, J. L. Griffin, et al., "Storage-based Intrusion Detection: Watching Storage Activity for Suspicious Behavior," 12th USENIX Security Symposium, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Roughan, T. Griffin, Z. M. Mao, et al., "IP Forwarding Anomalies and Improving Their Detection Using Multiple Data Sources," Proceedings of the ACM SIGCOMM workshop on Network Troubleshooting: research, theory and operation practice meet malfunctioning reality, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. V. A. Siris and F. Papagalou, "Application of anomaly detection algorithms for detecting SYN flooding attacks," Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE, 2004.Google ScholarGoogle Scholar
  23. S. W. Smith, The Scientist and Engineer's Guild to Digital Signal Processing. San Diego, California: California Technical Publishing, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. M. Welzi, Network Congestion Control: Managing Internet Traffic: Wiley, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. B. White, J. Lepreau, L. Stoller, et al., "An Integrated Experimental Environment for Distributed Systems and Networks," 5th Symposium on Operating Systems Design and Implementation (OSDI), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. R. Whiteson, F. Kelso, C. Baumgart, et al., "An Anomaly Detector Applied to a Materials Control and Accounting System," 35th Annual Meeting of the Institute of Nuclear Materials Management, 1994.Google ScholarGoogle Scholar
  27. L. Yang, J. M. Schopf, C. L. Dumitrescu, et al., "Statistical Data Reduction for Efficient Application Performance Monitoring," CCGrid 2006, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. Zhang and F. C. Tsui, "Detection of Outbreaks from Time Series Data Using Wavelet Transform," AMIA Annu Symp Proceeding, 2003.Google ScholarGoogle Scholar
  29. S. Zhang, I. Cohen, M. Goldszmidt, et al., "Ensembles of Models for Automated Diagnosis of System Performance Problems," IEEE Conference on Dependable Systems and Networks (DSN), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Y. Zhou, J. Hahn, and M. S. Mannan, "Fault Detection and Classification in Chemical Processes Based on Neural Networks with Feature Extraction," ISA Transaction, vol. 42, pp. 651--664, 2003.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    SC '07: Proceedings of the 2007 ACM/IEEE conference on Supercomputing
    November 2007
    723 pages
    ISBN:9781595937643
    DOI:10.1145/1362622

    Copyright © 2007 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 10 November 2007

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    SC '07 Paper Acceptance Rate54of268submissions,20%Overall Acceptance Rate1,516of6,373submissions,24%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader