Failure Archaeology and Anomaly Detection for Mid-Sized Internet Sites
نویسندگان
چکیده
Mid-sized Internet sites have enough complexity to be failure prone, but do not have enough resources to create the resilient architectures used by large Internet sites. In this paper, we characterize failures seen in mid-sized Internet sites and evaluate the use of (i) visualization techniques to assist humans in pinpointing failures and (ii) statistical learning techniques for automated failure prediction, detection, and localization. Analysis of failure reports and HTTP request logs shows that anomalies experienced by mid-sized sites are often caused by single page bugs that can affect many other pages on the site. These anomalies can be classified as short-term outages or volume traffic anomalies. We evaluate the statistical learning techniques of Principal Component Analysis and Naive Bayes. PCA is best at detecting short-term anomalies and the wide variations in traffic that often precede them, as well as localizing failures to specific pages. A well-trained Naive Bayes algorithm can detect longerterm volume anomalies. When applying these techniques to realworld web request traffic, all of the human-detected failures are labeled as anomalous. Our techniques also detected other traffic irregularities that had not been explained to us by the administrators, suggesting that these techniques would be useful in the future.
منابع مشابه
Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
Today, the use of the Internet and Internet sites has been an integrated part of the people’s lives, and most activities and important data are in the Internet websites. Thus, attempts to intrude into these websites have grown exponentially. Intrusion detection systems (IDS) of web attacks are an approach to protect users. But, these systems are suffering from such drawbacks as low accuracy in ...
متن کاملA Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
متن کاملInternet Anomaly Detection based on Complex Network Path
Detecting the anomaly behaviors such as network failure or Internet intentional attack in the large-scale Internet is a vital but challenging task. While numerous techniques have been developed based on Internet traffic in past years, anomaly detection for structured datasets by complex network have just been of focus recently. In this paper, a anomaly detection method for large-scale Internet ...
متن کاملA Study on Cultural Changes in Hourand Region,Based on Spatial Distribution Analysis of the Chalcolithic Sites in Relation to the Environmental and Geographical Factors
Aims & Backgrounds:The present article introduces a model for distribution of the Chalcolithic sites in Houran located in the eastern part of Azerbaijan. The main aim of this research is to show how environmental and geographic factors could influence site selection and how it can determine a model for settlement pattern in a specific region. Hence, seventeen sites dated back to the Chalcolithi...
متن کامل3D Gabor Based Hyperspectral Anomaly Detection
Hyperspectral anomaly detection is one of the main challenging topics in both military and civilian fields. The spectral information contained in a hyperspectral cube provides a high ability for anomaly detection. In addition, the costly spatial information of adjacent pixels such as texture can also improve the discrimination between anomalous targets and background. Most studies miss the wort...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004