Pinpoint: Problem determination in large, dynamic internet services

MY Chen, E Kiciman, E Fratkin, A Fox… - … Systems and Networks, 2002 - ieeexplore.ieee.org
Traditional problem determination techniques rely on static dependency models that are
difficult to generate accurately in today's large, distributed, and dynamic application …

Anomaly detection in IP networks

M Thottan, C Ji - IEEE Transactions on signal processing, 2003 - ieeexplore.ieee.org
Network anomaly detection is a vibrant research area. Researchers have approached this
problem using various techniques such as artificial intelligence, machine learning, and state …

Detecting application-level failures in component-based internet services

E Kiciman, A Fox - IEEE transactions on neural networks, 2005 - ieeexplore.ieee.org
Most Internet services (e-commerce, search engines, etc.) suffer faults. Quickly detecting
these faults can be the largest bottleneck in improving availability of the system. We present …

Discovering signature patterns from event logs

RPJC Bose, WMP van der Aalst - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
More and more information about processes is recorded in the form of so-called “event logs”.
High-tech systems such as X-ray machines and high-end copiers provide their …

Adaptive thresholding for proactive network problem detection

M Thottan, C Ji - Proceedings of the IEEE third international …, 1998 - ieeexplore.ieee.org
The detection of network fault scenarios has been achieved using the statistical information
contained in the Management Information Base (MIB) variables. An appropriate subset of …

PeerWatch: a fault detection and diagnosis tool for virtualized consolidation systems

H Kang, H Chen, G Jiang - … of the 7th international conference on …, 2010 - dl.acm.org
Server virtualization is now becoming an effective means to consolidate numerous
applications into a small number of machines. While such a strategy can lead to significant …

[PDF][PDF] Process mining in the large: preprocessing, discovery, and diagnostics

RPJC Bose - 2012 - research.tue.nl
Process mining has made significant progress in less than a decade since its inception.
Process mining techniques attempt to extract non-trivial process related knowledge and …

Pinpointing the subsystems responsible for the performance deviations in a load test

H Malik, B Adams, AE Hassan - 2010 IEEE 21st international …, 2010 - ieeexplore.ieee.org
Large scale systems (LSS) contain multiple subsystems that interact across multiple nodes
in sometimes unforeseen and complicated ways. As a result, pinpointing the subsystems …

Autonomous recovery in componentized internet applications

G Candea, E Kiciman, S Kawamoto, A Fox - Cluster Computing, 2006 - Springer
In this paper we show how to reduce downtime of J2EE applications by rapidly and
automatically recovering from transient and intermittent software failures, without requiring …

Real-time protocol analysis for detecting link-state routing protocol attacks

HY Chang, SF Wu, YF Jou - ACM Transactions on Information and …, 2001 - dl.acm.org
A real-time knowledge-based network intrusion-detection model for a link-state routing
protocol is presented for the OSPF protocol. This model includes three layers: a data …