structure of talk workload sensitive timing behavior
play

Structure of Talk Workload-sensitive Timing Behavior Anomaly - PDF document

Workload-sensitive Timing Behavior Anomaly Detection in Large Software Systems Workload-sensitive Timing Behavior Anomaly Detection in Large Software Systems Structure of Talk Workload-sensitive Timing Behavior Anomaly Detection 1 Motivation


  1. Workload-sensitive Timing Behavior Anomaly Detection in Large Software Systems Workload-sensitive Timing Behavior Anomaly Detection in Large Software Systems Structure of Talk Workload-sensitive Timing Behavior Anomaly Detection 1 Motivation in Large Software Systems Diploma Thesis 2 Foundations Hypothesis & Goals 3 André van Hoorn Results 4 Abteilung Software Engineering Fakultät II - Department für Informatik Conclusions 5 November 8, 2007 Related Work 6 André van Hoorn Diploma Thesis November 8, 2007 1/ 42 André van Hoorn Diploma Thesis November 8, 2007 2/ 42 Workload-sensitive Timing Behavior Anomaly Detection in Large Software Systems Workload-sensitive Timing Behavior Anomaly Detection in Large Software Systems Motivation Foundations Motivation Structure 1 Motivation Availability of Enterprise Information Systems (e.g. banking 2 Foundations & online shopping systems) is critical QoS requirement 3 Hypothesis & Goals Anomaly detection is means for failure detection and dia- gnosis to improve availability Results 4 Existing anomaly detection approaches based on timing behavior do not explicitly consider varying workload Conclusions 5 Related Work 6 André van Hoorn Diploma Thesis November 8, 2007 3/ 42 André van Hoorn Diploma Thesis November 8, 2007 4/ 42 Workload-sensitive Timing Behavior Anomaly Detection in Large Software Systems Workload-sensitive Timing Behavior Anomaly Detection in Large Software Systems Foundations Foundations Performance Metrics and Scalability Performance Metrics and Scalability Performance Workload and Scalability Nominal Capacity Throughput 1 Time Behavior Workload a b Response Time Amount of work currently reque- a() Usable Capacity Time interval elapsed between sted from or processed by a sy- Knee Capacity b() issued request and respective stem response Execution Time Response Time Execution Time Response Time Characteristics Workload Execution Time = Response Time Workload intensity Throughput Service demand characteristics Rate at which a system (re- source) handles tasks Scalability (Client-/Server-side) “ability of a system to continue to meet Think Time, . . . its response time or throughput objecti- Workload 2 Resource Utilization ves as the [workload] increases” [SW01] Figure: Operation timing metrics. The capacity of a system [Jai91]. André van Hoorn Diploma Thesis November 8, 2007 5/ 42 André van Hoorn Diploma Thesis November 8, 2007 6/ 42

  2. Workload-sensitive Timing Behavior Anomaly Detection in Large Software Systems Workload-sensitive Timing Behavior Anomaly Detection in Large Software Systems Foundations Foundations Workload Characterization Anomaly Detection A Hierarchical Workload Model Anomaly Detection Business Level Motivation : Availability important QoS attribute 3. User Level Session Layer [ MIO87 ] MTTF Availability = MTTF + MTTR 2. Application Level Functional Layer Goal : Improve availability by reduction of repair times 1. Protocol Level HTTP Request Layer Strategy : Use unusual behavior as indicator for failures Resource Level Common approach for software systems : Figure: A hierarchical workload model [MAR + 00]. Build model of “normal behavior” (based on set of monitored parameters, e.g. time behavior) Monitor current behavior Session [MAFM99] Detect deviations “Consecutive and related requests issued by the same user” André van Hoorn Diploma Thesis November 8, 2007 7/ 42 André van Hoorn Diploma Thesis November 8, 2007 8/ 42 Workload-sensitive Timing Behavior Anomaly Detection in Large Software Systems Workload-sensitive Timing Behavior Anomaly Detection in Large Software Systems Foundations Foundations Probability and Statistics Probability and Statistics Descriptive Statistics Parametric Distribution Families (Examples) Λ Λ (x| 0, 1) N(x| 1, 1) Λ (x| 0.7, 0.5 2 ) Λ N(x| −1, 0.9 2 ) Λ (x| 2, 0, 1) N(x| 1, 0.8 2 ) Statistics Minimum, maximum Sample mean, Sample variance Density Density p -Quantile x p : x p = min { x | F ( x ) ≥ p } 1.–3. Quartiles: x 0 . 25 , x 0 . 5 (Median), x 0 . 75 Mode, Skewness, . . . Other distribution characteristics: −4 −3 −2 −1 0 1 2 3 4 0 1 2 3 4 5 6 7 8 9 uni-/bi-/multimodal x x (a)symmetric Normal Distribution Log-normal Distribution left-/right-skewed 2-parameter: N ( µ, σ 2 ) 2-parameter: Λ( µ, σ 2 ) 3-parameter: Λ( τ, µ, σ 2 ) André van Hoorn Diploma Thesis November 8, 2007 9/ 42 André van Hoorn Diploma Thesis November 8, 2007 10/ 42 Workload-sensitive Timing Behavior Anomaly Detection in Large Software Systems Workload-sensitive Timing Behavior Anomaly Detection in Large Software Systems Hypothesis & Goals Hypothesis & Goals Structure Hypothesis 1 Motivation Assuming that varying workload implies 2 Foundations varying response times: 3 Hypothesis & Goals Hypothesis Novel workload-sensitive anomaly detection based on 4 Results response times realizable if varying workload intensity has Conclusions characteristic impact on response time distributions 5 Related Work 6 André van Hoorn Diploma Thesis November 8, 2007 11/ 42 André van Hoorn Diploma Thesis November 8, 2007 12/ 42

  3. Workload-sensitive Timing Behavior Anomaly Detection in Large Software Systems Workload-sensitive Timing Behavior Anomaly Detection in Large Software Systems Hypothesis & Goals Hypothesis & Goals Project Goals I Project Goals I 1 Probabilistic Workload Driver 1 Probabilistic Workload Driver Develop application-generic methodology for generating Develop application-generic methodology for generating realistic user behavior (e.g. based on probabilistic model) realistic user behavior (e.g. based on probabilistic model) 2 Case Study with Response Time Analysis 2 Case Study with Response Time Analysis Apply & evaluate workload generation technique Apply & evaluate workload generation technique Obtain workload-dependent response times Obtain workload-dependent response times from sample application from sample application Statistically analyze impact of workload on response times Statistically analyze impact of workload on response times 3 Workload-Sensitive Anomaly Detection Prototype 3 Workload-Sensitive Anomaly Detection Prototype Compute degree of anomaly for operation executions Compute degree of anomaly for operation executions Implementation of workload-sensitive AD prototype Implementation of workload-sensitive AD prototype André van Hoorn Diploma Thesis November 8, 2007 13/ 42 André van Hoorn Diploma Thesis November 8, 2007 13/ 42 Workload-sensitive Timing Behavior Anomaly Detection in Large Software Systems Workload-sensitive Timing Behavior Anomaly Detection in Large Software Systems Hypothesis & Goals Results Probabilistic Workload Driver Project Goals I Structure Motivation 1 2 Foundations 1 Probabilistic Workload Driver Performance Metrics and Scalability Develop application-generic methodology for generating Workload Characterization realistic user behavior (e.g. based on probabilistic model) Anomaly Detection 2 Case Study with Response Time Analysis Probability and Statistics Apply & evaluate workload generation technique 3 Hypothesis & Goals Obtain workload-dependent response times from sample application 4 Results Statistically analyze impact of workload on response times Probabilistic Workload Driver 3 Workload-Sensitive Anomaly Detection Prototype Case Study with Response Time Analysis Compute degree of anomaly for operation executions Workload-sensitive Anomaly Detection Prototype Implementation of workload-sensitive AD prototype 5 Conclusions 6 Related Work André van Hoorn Diploma Thesis November 8, 2007 13/ 42 André van Hoorn Diploma Thesis November 8, 2007 14/ 42 Workload-sensitive Timing Behavior Anomaly Detection in Large Software Systems Workload-sensitive Timing Behavior Anomaly Detection in Large Software Systems Results Results Probabilistic Workload Driver Probabilistic Workload Driver Probabilistic Workload Driver – Approach Application Model Challenge : Generate valid sessions Constraint : Realistic behavior (not: “capture & replay”) Session layer mo- Approach : dels allowed se- 1 Workload configuration data model separated into quences of service Application Model calls in a session User Behavior Model Protocol layer con- User Behavior Mix Workload Intensity tains all protocol- 2 High-level design specific (e.g. HTTP) Iterative execution model request details Figure: Sample application model illustrating separation Session model composition semantics into session and protocol layer. 3 Implementation: Markov4JMeter (JMeter extension) André van Hoorn Diploma Thesis November 8, 2007 15/ 42 André van Hoorn Diploma Thesis November 8, 2007 16/ 42

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend