Computer Science ›› 2021, Vol. 48 ›› Issue (1): 295-300.doi: 10.11896/jsjkx.191200186

• Information Security • Previous Articles     Next Articles

Anomaly Judgment of Directly Associated Nodes Under Cloud Computing Environment

LEI Yang, JIANG Ying   

  1. Yunnan Key Lab of Computer Technology Application,Kunming 650500,China
    Faculty of Information Engineering and Automation,Kunming University of Science and Technology,Kunming 650500,China
  • Received:2019-12-31 Revised:2020-06-13 Online:2021-01-15 Published:2021-01-15
  • About author:LEI Yang,born in 1992,postgraduate,is a member of China Computer Federation.His main research interests include cloud computing and big data analysis.
    JIANG Ying,born in 1974,Ph.D,professor,Ph.D supervisor,is a senior member of China Computer Federation.Her main research interests include software quality assurance and testing,cloud computing,big data analysis and intelligent software engineering.
  • Supported by:
    National Natural Science Foundation of China(61462049,61063006,60703116) and Key Project of Yunnan Applied Basic Research(2017FA033).

Abstract: Currently,more and more users deploy their services on cloud computing environment.Due to the services diversity and dynamic deployment,the anomalies will be occurred on nodes under cloud computing environment.The impact of anomaly nodes on associated nodes are usually neglected in the traditional node anomaly detection methods,which will result in anomaly propagation and nodes failure.In this paper,a method of anomaly judgment for directly associated nodes under cloud computing environment is proposed.At first,the Agent is deployed on each node and the running data of nodes are collected through the Agent at specific time intervals.The node relationship graph is established based on the relationship between the nodes.Secondly,the anomaly detection model is trained by the running data.Then the weights and comprehensive scores of the running data is calculated.The anomaly of the single node is judged by the sliding time window-based method.Finally,other nodes affected by the anomaly nodes are found through the normalized mutual information in the case of a single node anomaly.In this paper,the relevant experiments are carried out on the cloud computing platform.In order to simulate all kinds of anomaly situations,the anomaly conditions are injected during the experiment and the state of nodes under the injection anomaly is observed.The validity of single node and directly associated node of anomaly judgment method was verified by experiments.The experimental results showed that the accuracy and specificity of the method in this paper are better than other methods about single node anomaly judgment.Under the multi-node structure,the method of this paper could find the directly associated anomaly node with the higheraccuracy and stability.

Key words: Anomaly judgment, Cloud computing environment, Directly associated nodes, Normalized mutual information, Single node

CLC Number: 

  • TP311
[1] LEE J.A View of Cloud Computing [J].Communications of the ACM,2013,53(4):50-58.
[2] WANG T,ZHANG W B,XUN J W,et al.A Survey of Fault Detection for Distributed Software Systems with Statistical Monitoring in Cloud Computing [J].Chinese Journal of Computers,2017,40(2):397-413.
[3] FU S.Performance Metric Selection for AutonOMic AnomalyDetection on Cloud Computing Systems[C]//2011 IEEE Global Telecommunications Conference-GLOBECOM 2011.Kathmandu:IEEE,2011:1-5.
[4] LIN M,CHEN S.An Efficient Anomaly Detection Framework for Cloud Computing Environment [J].Journal of Computers,2015,10(3):155-165.
[5] GUAN Q,FU S.Adaptive Anomaly Identification by Exploring Metric Subspace in Cloud Computing Infrastructures[C]//2013 IEEE 32nd International Symposium on Reliable Distributed Systems.Braga:IEEE,2013:205-214.
[6] LAN Z,ZHENG Z,LI Y.Toward Automated Anomaly Identification in Large-scale Systems [J].IEEE Transactions on Parallel and Distributed Systems,2010,21(2):174-187.
[7] KANG H,CHEN H,JIANG G.PeerWatch:A Fault Detection and Diagnosis Tool for Virtualized Consolidation Systems[C]//Proceedings of the 7th International Conference on Autonomic Computing.ACM,2010:119-128.
[8] LI Y,LAN Z.A Scalable,Non-Parametric Method for Detecting Performance Anomaly in Large Scale Computing[J].IEEE Transactions on Parallel and Distributed Systems,2015,27(7):1902-1914.
[9] PERTET S,GANDHI R,NARASIMHAN P.FingerpointingCorrelated Failures in Replicated Systems [C]//Proceedings of the Second Workshop on Tackling Computer Systems Problems with Machine Learning.2007:220-230.
[10] KASICK M P,TAN J,GANDHI R,et al.Black-Box Problem Diagnosis in Parallel File Systems[C]//8th USENIX Conference on File and Storage Technologies.San Jose:USENIX Association,2010:23-26.
[11] QIANG C.Research on Cloud Computing Resource Manage-ment Model Based on Multi-Agent System[C]//2016 12th International Conference on Computational Intelligence and Security.Wuxi:IEEE,2016:378-381.
[12] ALHAMAZANI K,RANJAN R,MITRA K,et al.Clams:Cross-layer Multi-cloud Application Monitoring-as-a-service Framework[C]//2014 IEEE International Conference on Services Computing.Anchorage:IEEE,2014:283-290.
[13] REDDY P V V,RAJAMANI L.Performance Comparison ofDifferent Operating Systems in the Private Cloud with KVM hypervisor using SIGAR framework[C]//2015 International Conference on Communication,Information and Computing Technology(ICCICT).Mumbai:IEEE,2015:1-6.
[14] WANG X,HUANG S,FU S,et al.Characterizing Workload of Web Applications on Virtualized Servers[C]//Architectural Support for Programming Languages and Operating Systems.2014:98-108.
[15] WANG D Q,WANG X X.Large Data Optimization ParticleSwarm Clustering Algorithm Based on Cloud Storage [J].Electronic Design Engineering,2017,25(2):26-30.
[16] LEI Y,JIANG Y.Anomaly Judgment for Nodes Based on Agent under Cloud Environment[C]//2019 IEEE International Conference on Computer Science and Educational Informatization(CSEI).Kunming:IEEE,2019:161-167.
[17] REN T.Research on Virtual Machine Anomaly Detection System Oriented IaaS[D].Chongqing:Chongqing University,2014.
[18] JIANG M,MUNAWAR M A,REIDEMEISTER T,et al.Automatic Fault Detection and Diagnosis in Complex Software Systems by Information-theoretic monitoring[C]//2009 IEEE/IFIP International Conference on Dependable Systems & Networks.Lisbon:IEEE,2009:285-294.
[19] O'DRISCOLL A,DAUGELAITE J,SLEATOR R D.‘Big data',Hadoop and cloud computing in genomics[J].Journal of biomedical informatics,2013,46(5):774-781.
[20] LIU C C,JIANG Y.Fault Detection Method for Cloud Computing Using Improved Fuzzyk Nearest Neighbor[J].Journal of Chinese Computer Systems,2018,39(10):159-164.
[1] GENG Hai-jun, WANG Wei, YIN Xia. Single Node Failure Routing Protection Algorithm Based on Hybrid Software Defined Networks [J]. Computer Science, 2022, 49(2): 329-335.
[2] DU Yan-ming, XIAO Jian-hua. Workflow Scheduling Strategy with Multi-QoS Constraint Based on Priority in Cloud Environment [J]. Computer Science, 2019, 46(10): 128-134.
[3] CHEN Gan-lang, YAN Fei-long and PAN Jia-hui. Study on Fast Incremental Clustering Algorithm for High Complexity Dynamic Data in Cloud Computing Environment [J]. Computer Science, 2018, 45(2): 287-290.
[4] LIU Gang, ZHOU Heng, LIANG Xiao-geng and WANG Ming-jing. Image Registration Algorithm for Infrared and Visible Light Based on Non-subsampled Contourlet Transform [J]. Computer Science, 2016, 43(11): 313-316.
[5] . Telecommunications Network Capability Services Model Based on Mashup Technology in Cloud Computing Environment [J]. Computer Science, 2012, 39(1): 32-36.
[6] . [J]. Computer Science, 2008, 35(6): 175-177.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!