Skip to main content

An Active Approach for Automatic Rule Discovery in Rule-Based Monitoring Systems

  • Conference paper
  • First Online:
Trustworthy Computing and Services (ISCTCS 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 520))

Included in the following conference series:

  • 898 Accesses

Abstract

In large-scale cloud service datacenters, there always have a monitoring center in charge of the health status of all system components. When faults occur, it should react rapidly and notify managers to avoid further lose. The most popular solution for fault detection in enterprise environments is rule-based detection. And to our knowledge, there exists a limitation for the existing rule-based solution that rules are always configured by managers relying on experiences, which is wildly inaccurate and wastes lots of labor. We present a methodology that can discover monitoring rules automatically and accurately in this paper. And through our experiment, we demonstrate it correct and effective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Arthur, D., Vassilvitskii, S.: k-means ++: the advantages of careful seeding. In: Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 1027–1035. Society for Industrial and Applied Mathematics (2007)

    Google Scholar 

  2. Barham, P., Isaacs, R., Mortier, R., Narayanan, D.: Magpie: online modelling and performance-aware systems. In: HotOS, pp. 85–90 (2003)

    Google Scholar 

  3. Chen, M.Y., Kiciman, E., Fratkin, E., Fox, A., Brewer, E.: Pinpoint: problem determination in large, dynamic internet services. In: DSN 2002 Proceedings.of the 2002 International Conference on Dependable Systems and Networks, pp. 595–604. IEEE (2002)

    Google Scholar 

  4. Denison, D., Mallick, B., Smith, A.: Automatic bayesian curve fitting. J. R. Stat. Soc.: Series B (Stat. Methodol.) 60(2), 333–350 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  5. Foundation, W.: Curve fitting. http://en.wikipedia.org/wiki/Curvefitting

  6. Frey, B.J., Dueck, D.: Clustering by passing messages between data points. Science 315(5814), 972–976 (2007)

    Article  MATH  MathSciNet  Google Scholar 

  7. Id´e, T., Kashima, H.: Eigenspace-based anomaly detection in computer systems. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 440–449. ACM (2004)

    Google Scholar 

  8. Kanungo, T., Mount, D.M., Netanyahu, N.S., Piatko, C.D., Silverman, R., Wu, A.Y.: An efficient k-means clustering algorithm: analysis and implementation. IEEE Trans. Pattern Anal Mach. Intell. 24(7), 881–892 (2002)

    Article  Google Scholar 

  9. Tan, P.-N., Steinbach, M., Kumar, V.: Cluster analysis: basic concepts and algorithms. In: Tan, P.-N., Steinbach, M., Kumar, V. (eds.) Introduction to Data Mining, pp. 487–568. Addison-Wesley, New York (2006)

    Google Scholar 

Download references

Acknowledgment

This work is supported by the National Key Technology R&D Program (Grant NO. 2012BAH17FOl) and NSFC-NSF International Cooperation Project (Grant NO. 61361126011).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhongzhi Luan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ding, C., Zeng, M., Wang, K., Pei, P., Luan, Z., Qian, D. (2015). An Active Approach for Automatic Rule Discovery in Rule-Based Monitoring Systems. In: Yueming, L., Xu, W., Xi, Z. (eds) Trustworthy Computing and Services. ISCTCS 2014. Communications in Computer and Information Science, vol 520. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47401-3_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-47401-3_40

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-47400-6

  • Online ISBN: 978-3-662-47401-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics