PreprintPDF Available

Performance Anomaly and Change Point Detection For Large-Scale System Management

Authors:
Preprints and early-stage research may not have been peer reviewed yet.

Abstract

The presentation starts with the short overview of the classical SPC based anomaly detection techniques and tools including MASF [1]; SETDS, Exception Value (EV) meta-metric based Change Point Detection [2]; Control Chart [3]; business driven massive prediction [4] and methods of using them to manage large-scale systems such as on-prem servers fleet or massive clouds. Then the presentation will be focusing on modern techniques of anomaly and normality detection, such as, deep learning and entropy-based anomalous pattern detections.
 
Performance Anomaly and Change Point Detection
For Large-Scale System Management
 !
"#
$ !%&"$&
ABSTRACT
"""'"("("')
"  &&    !"  *  ""&
"&+ "   &  ,- ./01 2
3&" 4 " 546 ""& !" "
 2""& .01   .701 ! "
("  ("  "&  .0    "  )
 "  " "&" *"  &
 ""(" 8"" ("& $ "
" "" ' !" )&   "
"&+ " ) *  * ""&
 &  "" "  "*!"
 """&$
KEYWORDS
*  ""&1  &"    ""&1
! " (" )"&1 *" ")&"1
&&$
1INTRODUCTION
 "" &""  &  &*
    ")&"  """      ("*
"  9  "+ "  "  )'
&":
3&"!" "" )&  "
&  " ' ' )" (" "
9""&")""("$
")"(&"!"") "
  (";,< """ ""
! ")  " &" " "
&(""&$
""  " "  ("  "&"    &  !"
""""&":
&  3&"    "  2""&
*"526'&  !" "'
,-  "  5&  &"  
" " ) & " ")&"
" ""6$
* ( 9 "$$   
'!""($"&"&
'"$
# "  2("  "&  !"  
"" *  &"" ! "
 *" ")&"    &"
") )"&$
"""&+ "  &=" 
="'  5""  "6    "*!"
!&"*$
2Statistical Exception and
Trend Detection System
(SETDS)
2 "* .0 )  &
>"  ""&  &("
!"*&($  &"  
 3&" 4 " 546 !"
";  "    4  !"&"
;"  ""&      *"  &*
,""& &*    
")&"""$
" - " /$  " ( * ' 2
*9"      !* /?@
'""  &"' ":!""
 ")""&";" " "&" A*
& $
/
 
 !
- "/:B" !"($B "&""

"3&" 4 "546.0'& !&* 
 * &" 5 "6 " && "
 * *  C""&"!"'"" &
5B<;<<6"& ""
  "  )    *$  "  &
'( * ' " ''""**
"*      '"  "  "
""$ " 4   "  ""& 
&"  !*( "DEV(t)=0E"+ 
'""Ft’ ""&"$
"&!" """&"&""'
&    )  "    &"      "
 "&"  $ B   !" ) "
&  "' !    &
"&& "")"&'- "$
- ":"'")"&&:
!"*($)&"""&"
(""4!"G "")"&& !"
 && "  " " && *
! ""&$ & !"("
!* !  "" " !* &"
")&"  5"$$ B "  -$/6 
! ""& 5"$$  !" )& "; "
 -$/ "& &6$ #  "    " 
&!*&&") "  !" ) *"
 "    .0  "  '  *
& !  *&""!* 2 
 & ) * /?@'""    
 9"("") " 5
*"6$
3Anomaly Detection by
Neural Network
  ""&  ! !*    *   "
*"  ")&"    5"$$    ""
C""'" &<!&
' " *& ")"&6 &  !" " !*
=" ="'$-$7'")"! !*
 " H *" &"  &   
'  "  "  '    -$/    7
&"": <5" & &"6
<  D8E 5& !" !&G!
""6$#*"'*""&&-$
/$     "  &&  D&'!*  E  <  '
"! / &'"()<
"")"'"""&)
"")"&$
&*2" "("
&"  "  "      "    '
&"&*  "  ""    "" "  "  "
 * !*!" >"   &" 
<   <    D8E    "  D  "&E "
="&"9&"&*$
")"&&!"">)"" "
!*  &"   ) ' >"
 "  "! " !*
C"&"!*"'*")"& &
"*" '*&"""$
 
- "7:2""<"=" ="'2""&
D=E5<6
4 Entropy-based Method of Anomaly
Detection
"'&"")>")
( !G"&  & ) " ""$ -
"3"  &  !" "(" & "
("G " !" " & !G"&
5I6  *("("*)"$
"  "" &   ""&  
!"(  )   *"  )  !G"&  !*  "  "
"* ) "& !G"& !*  " )'
) .J0:
¿xi
xavg
xi
xavg
ln ¿
nIC=1
nln
(
n
)
i=1
n
¿
6
"")"!G"&"("":
nIC=9"!&""K&"
 !")!"(5"$$ *6
3 " " "& ( " )" "( 5"$$ 
&"& 6
" """(5"$$ *6
" niC ( " (" ) /$DE"  
&""* !&" 5"$$ )  I  G 
" &  !" )  "  "  6
/&"""$-"3")
"  I    "  !"(  )    
*)""nIC !"
 !" &")&"'""'
"!""&"""""("*)"$
& " ""I&"")*
'")"&$
REFERENCES
./0 L"C"* # 9"  "  $ /MMJ$ MASF - Multivariate
Adaptive Statistical Filtering.   &$  )   "
," ""I $//$
.0  !$@$ Exception Based Modeling and Forecasting$
&$) "," ""I $
.70  !$/7$Review of IT Control Chart$L =
AM@A4$=//=("!"/7$
.0  ! " $ /?$ Systems and methods for modeling
computer resource metrics$"/7A?MA$
.J0  "  <!9$  //. Quantifying Imbalance in Computer
Systems$&$) "," ""I 
/
ResearchGate has not been able to resolve any citations for this publication.
ResearchGate has not been able to resolve any references for this publication.