Abstract
Performing impact analysis involves determining which users are affected by system resource failures. Understanding when users are actually using certain resources allows system administrators to better assess the impact on enterprise operations. This is critical to prioritizing system repair and restoration actions, and allowing users to modify their plans proactively. We present an approach that combines traditional dependency analysis with resource usage information to improve the operational relevance of these assessments. Our approach collects data from end-user systems using common operating system commands, and uses this data to generate dependency and usage pattern information. We tested our approach in a computer lab running applications at various levels of complexity, and demonstrate how our framework can be used to assist system administrators in providing clear and concise impact assessments to executive managers.
Chapter PDF
Similar content being viewed by others
References
Kar, G., Keller, S., Calo, S.: Managing Application Services over Service Provider Networks: Architecture and Dependency Analysis. NOMS (2000)
Singh, A., Koropolu, M., Voruganti, K.: Zodiac: Efficient Impact Analysis for Storage Area Networks. USENIX FAST (2005)
Assistant Secretary of Defense, National Information Infrastructure (ASD-NII): Department of Defense Instruction (DoDI) 8580.1, Information Assurance (IA) in the Defense Acquisition System (2004)
Jobst, D., Preissler, G.: Mapping Clouds of SOA- and Business-related Events for an Enterprise Cockpit in a Java-based Environment. Intl. Symp. JAVA Prog. (2006)
Hanemann, A., Schmitz, D., Sailer, M.: A Framework for Failure Impact Analysis and Recovery with Respect to Service Level Agreements. IEEE SCC (2005)
EMC2|SMARTS Business Impact Manager: http://www.emc.com/products/software/smarts/bim/
IBM Tivoli Application Dependency Discovery Manager. http://www-306.ibm.com/software/tivoli/products/taddm/
Thereska, E., Narayanan, D., Ganger, G.: Towards self-predicting systems: What if you could ask ”what-if”? In: Workshop Database & Expert Systems Applications (2005)
Sitaraman, S., Venkatesan, S.: Forensic Analysis of File System Intrusions using Improved Backtracking. In: IEEE Workshop on IWIA (2005)
Brown, A., Kar, G., Keller, A.: An Active Approach to Characterizing Dynamic Dependencies for Problem Determination in a Distributed Environment. IM (2001)
Ensel, C.: A Scalable Approach to Automated Service Dependency Modeling in Heterogeneous Environments. IEEE EDOC (2001)
Aguilera, M., Mogul, J., Wiener, J., Reynolds, P., Muthitacharoen, A.: Performance Debugging for Distributed Systems of Black Boxes. SOSP (2003)
Mortier, R., Isaacs, R., Barham, P.: Anemone: using end-systems as a rich network management platform. Microsoft Technical Report, MSR-TR-2005-62 (2005)
Chen, M., Kiciman, E., Fratkin, E., Fox, A., Brewer, E.: Pinpoint: Problem Determination in Large, Dynamic Internet Services. DSN (2002)
Kiciman, E., Fox, A.: Detecting Application-Level Failures in Component-Based Internet Services. IEEE Trans. Neural Networks 16(5), 1027–1041 (2005)
Hariri, S., et al.: Impact Analysis of Faults and Attacks in Large-Scale Networks. IEEE Sec. & Priv. Mag., 49–54 (September-October 2003)
Cohen, I., et al.: Capturing, indexing, clustering, and retrieving system history. SOSP (2005)
van der Aalst, W.M.P., et al.: Workflow Mining: A Survey of Issues and Approaches. ACM TKDE 47(2), 237–267 (2003)
Han, J., Kamber, M.: Data Mining: Concepts and Techniques, 2nd edn. Morgan-Kaufmann, San Francisco (2006)
Witten, I., Frank, E.: Data Mining: Practical machine learning tools and techniques, 2nd edn. Morgan Kaufmann, San Francisco (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 IFIP International Federation for Information Processing
About this paper
Cite this paper
Moss, M., Pu, C. (2007). Assessing Operational Impact in Enterprise Systems by Mining Usage Patterns. In: Clemm, A., Granville, L.Z., Stadler, R. (eds) Managing Virtualization of Networks and Services. DSOM 2007. Lecture Notes in Computer Science, vol 4785. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75694-1_14
Download citation
DOI: https://doi.org/10.1007/978-3-540-75694-1_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-75693-4
Online ISBN: 978-3-540-75694-1
eBook Packages: Computer ScienceComputer Science (R0)