Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1387269.1387294acmconferencesArticle/Chapter ViewAbstractPublication PagesicpsConference Proceedingsconference-collections
research-article

Anomaly-based fault detection in pervasive computing system

Published: 06 July 2008 Publication History

Abstract

The increased complexity of hardware and software resources and the asynchronous interaction among components (such as servers, end devices, network, services and software) make fault detection and recovery very challenging. In this paper, we present innovative concepts for fault detection, root cause analysis and self-healing architectures analyzing the duration of pattern transition sequences during an execution window. In this approach, all interactions among components of Pervasive Computing Systems (PCS) are monitored and analyzed. We use three-dimensional array of features to capture spatial and temporal variability to be used by an anomaly analysis engine to immediately generate an alert when abnormal behavior pattern is captured indicating some kind of software or hardware failure. The main contributions of this paper include the innovative analysis methodology and feature selection to detect and identify anomalous behavior. Evaluating the effectiveness of this approach to detect faults injected asynchronously shows a detection rate of above 99.9% with no occurrences of false alarms for a wide range of scenarios.

References

[1]
M. Bang, A. Larsson and H. Eriksson, "NOSTOS: A paper-based ubiquitous computing healthcare environment to support data capture and collaboration," in Proc. 2003 AMIA Annual Symp., Washington, DC, pp. 46--50, 2003.
[2]
S. Reinhardt and S. Mukherjee, "Transient fault detection via simultaneous multithreading," Pro. of the 27th annual international symposium on Computer architecture, 2000.
[3]
A. Wood, ""Data Integrity Concepts, Features, and Technology," " White paper, Tandem Division, Compaq Computer Corporation.
[4]
G. A. C. Reis, J. Chang, N. Vachharajani, R. Rangan, and D.I. August, "SWIFT: software implemented fault tolerance" Code Generation and Optimization pp. 243 -- 254, 2005.
[5]
T. M. Khoshgoftaar, and E. B. Allen, "Controlling overfitting in software quality models: experiments with regression trees and classification" IEEE METRICS, 2001.
[6]
E. B. Allen, T. M. Khoshgoftaar, and J. Deng, "Using regression trees to classify fault-prone software modules Reliability," IEEE Trans. on Comp., vol. 51, pp. 455--462, 2002.
[7]
T. M. Khoshgoftaar and N. Seliya, "Fault Prediction Modeling for Software Quality Estimation: Comparing Commonly Used Techniques", Empirical Software Engineering, vol. 8, pp. 255--283, 2003.
[8]
T. M. Khoshgoftaar and D. L. Lanning, "A neural network approach for early detection of program modules having high risk in the maintenance phase," Journal of Systems and Software, vol. 29, pp. 85--91, Apr. 1995.
[9]
A. P. Nikora and J. C. Munson, "Developing fault predictors for evolving software systems", Proc. of The Ninth International Software Metrics Symposium, 2003
[10]
T. S. Y. Ping, and H. Muller, "Predicting fault proneness using OO metrics", An industrial case study Proc. of The Sixth European Conference on Software Maintenance and Reengineering, pp. 99--107, 2002.
[11]
G. P. Beaumont, "Statistical Tests: An Introduction with Minitab Commentary", Prentice Hall, 1996.
[12]
C. Ebert, "Classification techniques for metric-based software development", Software Quality Journal, vol. 5, pp. 255--272, Dec. 1996.
[13]
E. B. Allen, T. M. Khoshgoftaar, W. D. Jones, and J. P. Hudepohl, "Accuracy of software quality models", Annals of Software Engineering," vol. 9, pp. 103--116, 2000.
[14]
F. Fioravanti and P. Nesi, "A study on fault-proneness detection of object-oriented systems", Proc. on Software Maintenance and Reengineering, pp. 121--130, 2001.
[15]
L. C. Briand, J. Wust, J. W. Daly, and D. V. Porter, "Exploring the relationship between design measures and software quality in object-oriented systems", The Journal of Systems and Software, vol. 51, pp. 245--273, 2000.
[16]
R. Takahashi, Y. Muraoka and Y. Nakamura, "Building software quality classification trees: Approach, experimentation, evaluation", In Proceedings of the Eighth International Symposium on Software Reliability Engineering, IEEE Computer Society, pp. 222--233, 1997.
[17]
I. C. Forman George, "Learning From Little: Comparison of Classifiers given Little Training", ECML/PKDD, 2004.
[18]
G. Forman, "An extensive empirical study of feature selection metrics for text classification," Journal of Machine Learning Research pp. 1289--1305, 2003.
[19]
TPC-W. http://www.tpc.org/tpcw, April 2005.
[20]
J. Ray, J. C. Hoe and B. Falsafi, "Dual use of superscalar datapath for transient-fault detection and recovery", In Proceedings of the 34th annual ACM/IEEE international symposium on Microarchitecture. IEEE Computer Society, pp. 214--224, 2001.
[21]
G. A. Reis, J. Chang, N. Vachharajani, R. Rangan, D. I. August and S. S. Mukherjee, "Software - controlled fault tolerance," ACM Transactions on Architecture and Code Optimization, vol. V, No. N, pp. 1--28, 2005.
[22]
N. OH, P. P. SHIRVANI, and E. J. MCCLUSKEY, "Error detection by duplicated instructions in super-scalar processors", In IEEE Trans. on Reliability vol. 51, pp. 63--75. March 2002.
[23]
G. A. Reis, J. Chang, N. Vachharajani, R. Rangan, D. I. August and S.S. Mukherjee, "Design and evaluation of hybrid fault-detection systems", 32nd International Symposium on Computer Architecture, 2005.
[24]
N. Ye and Q. Chen, "An Anomaly Detection Technique Based on Chi-Square Statistic," Quality and Reliablility Engineering International, vol. 17, pp. 105--112, 2001.
[25]
A. Lazarevic, V. Kumar and J. Srivastava, "Intrusion Detection: A Survey", Springer US, vol. 5, 2006.
[26]
I. Cohen, S. Zhang, M. Goldszmidt, J. Symons, T. Kelly and A. Fox, "Capturing, indexing, clustering, and retrieving system history," ACM SOSP 2005.
[27]
R. Maxion and K. M. C. Tand, "Anomaly Detection in Embedded Systems," IEEE Transactions on Computers, vol. 51, pp. 108--120, 2002.
[28]
T. Lane and C. E. Brodie, "Temporal Sequence Learning and Data Reduction for Anomaly Detection," ACM Trans. on Information and System Security, vol. 2, pp. 295--331, 1999.
[29]
S. Fayssal and S. Hariri "Anomaly-based Protection Approach Against Wireless Network Attacks", In Proc., IEEE International Conference on Pervasive Service, 2007.
[30]
J. R. Quinlan, "Induction of decision trees", Machine Learning, pp. 1:81--106, 1986.
[31]
H. Chen, S. Hariri. and F. Rasal, "An Innovative Self-Configuration Approach for Networked Systems and Applications", presented at 4th ACS/IEEE International Conference on Computer Systems and Applications, 2006.
[32]
S. Dharmapurikar, P. Krishnamurthy and D. E. Taylor, " Longest Prefix Matching Using Bloom Filters", ACM SIGCOMM'03, Karlsruhe, Germany, August 25-29, 2003.
[33]
C. Marceau, "Characterizing the Behavior of a Program Using Multiple-Length N-grams," In New Security Paradigms Workshop, Cork, Ireland, 2000.
[34]
M. Christodorescu and S. Jha, "Static Analysis of Executables to Detect Malicious Patterns", In USENIX Security Symposium, Washington, D.C., 2003.
[35]
R. Vargiya and P. Chan, "Boundary Detection in Tokenizing Network Application Payload for Anomaly Detection", on Data Mining for Computer Security (DMSEC), 2003.
[36]
K. Wang, J. J. Parekh and S. J. Stolfo "Anagram: A Content Anomaly Detector Resistant To Mimicry Attack", In Proceedings of the Ninth International Symposium on Recent Advances in Intrusion Detection 2006.
[37]
Byoung uk Kim, S. Hariri "Anomaly-based Fault Detection System in Distributed Systems", 5th IEEE/ACIS International Conference on Software Engineering Research, Management and Applications, 2007
[38]
A. Partow, " http://www.partow.net/programming/hashfunctions/#Available," HashFunctions.

Cited By

View all
  • (2021)SoK: Autonomic Cybersecurity - Securing Future Disruptive Technologies2021 IEEE International Conference on Cyber Security and Resilience (CSR)10.1109/CSR51186.2021.9527908(66-72)Online publication date: 26-Jul-2021
  • (2018)Autonomic Secure HPC Fabric Architecture2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA)10.1109/AICCSA.2018.8612872(1-4)Online publication date: Oct-2018
  • (2012)A Novel Self-Adaptive Fault-Tolerant Mechanism and Its Application for a Dynamic Pervasive Computing EnvironmentProceedings of the 2012 IEEE 15th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops10.1109/ISORCW.2012.19(48-52)Online publication date: 11-Apr-2012
  • Show More Cited By

Index Terms

  1. Anomaly-based fault detection in pervasive computing system

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ICPS '08: Proceedings of the 5th international conference on Pervasive services
    July 2008
    202 pages
    ISBN:9781605581354
    DOI:10.1145/1387269
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 July 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. abnormality detection
    2. faults
    3. interaction analysis
    4. pattern profiling
    5. performance objectives

    Qualifiers

    • Research-article

    Conference

    ICPS08
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 23 of 34 submissions, 68%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)SoK: Autonomic Cybersecurity - Securing Future Disruptive Technologies2021 IEEE International Conference on Cyber Security and Resilience (CSR)10.1109/CSR51186.2021.9527908(66-72)Online publication date: 26-Jul-2021
    • (2018)Autonomic Secure HPC Fabric Architecture2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA)10.1109/AICCSA.2018.8612872(1-4)Online publication date: Oct-2018
    • (2012)A Novel Self-Adaptive Fault-Tolerant Mechanism and Its Application for a Dynamic Pervasive Computing EnvironmentProceedings of the 2012 IEEE 15th International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops10.1109/ISORCW.2012.19(48-52)Online publication date: 11-Apr-2012
    • (2010)Pattern analysis in real time with smart power sensor2010 IEEE Aerospace Conference10.1109/AERO.2010.5446819(1-8)Online publication date: Mar-2010
    • (2009)A Framework for Error-Tolerant Scheme in Pervasive ComputingProceedings of the 2009 International Conference on Education Technology and Computer10.1109/ICETC.2009.60(65-68)Online publication date: 17-Apr-2009

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media