Automated Anomaly and Root Cause Detection in Distributed Systems

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2012 by IJETT Journal
Volume-3 Issue-1                          
Year of Publication : 2012
Authors :  G.D.K.Kishore , Maddali Sravanthi , Kurma Siva Naga Mrudhula , J Sandeep , Kilaru Swapna

Citation 

G.D.K.Kishore , Maddali Sravanthi , Kurma Siva Naga Mrudhula , J Sandeep , Kilaru Swapna. "Automated Anomaly and Root Cause Detection in Distributed Systems". International Journal of Engineering Trends and Technology (IJETT). V3(1):47-52 Jan-Feb 2012. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

It is a challenging issue to identify a defective system in a large scale network. The data collected from the distributed systems for troubleshooting is very huge and may contain noisy data, so manual checking and detecting of the abnormal node is time c onsuming and error prone. In order to solve this, we need to develop an automated system that detects the anomaly. Though the defective node is found it has to be rectified, for this we need to know the root cause of the problem. In this paper we present a n automated mechanism for node level anomaly detection in large - scale systems and the root cause for anomaly. A set of data mining techniques are used here to analyze the collected data and to identify the nodes acting differently from others. We use Indep endent Component Analysis (ICA) for feature extraction. We also present some of the mechanisms needed to know the root cause of the problem. So the results will be abnormal nodes and problem to be rectified in them. These can be validated manually.

References

[1] A. Hyva ?rinen and E. Oja, Independent Component Analysis:Algorithms and Applications,” Neural Networks, vol. 13, nos. 4/5,pp. 411 - 430, 2000.
[2] E. Knorr, R. Ng, and V. Tucakov, “Distance - Based Outliers: Algorithms and Applications,” The VLDB J., vol. 8, no. 3, pp. 237 - 253, 2000.
[3] Roohi Shabrin S., Devi Prasad B., Prabu D., Pallavi R. S., and Revathi P. “ Memory Leak Detection in Distributed System” - World Academy of Science, Engineering and Technology 16 2006. www.waset.org/journals/waset/v16/v16 - 15.pdf
[4] Eric Koskinen andMaurice Herlihy Dreadlocks : Efficient Deadlock Detection www.cl.cam.ac.uk/~ejk39/papers/ dreadlocks - spaa08.pdf

Keywords
node level anomaly identification, large - scale systems, data mining techniques, independent component analysis.