Journal of Network and Systems Management最新文献

筛选
英文 中文
Offline and Real-Time Policy-based Management for Virtualized Services: Conflict and Redundancy Detection, and Automated Resolution 基于离线和实时策略的虚拟化服务管理:冲突和冗余检测以及自动解决方案
IF 3.6 3区 计算机科学
Journal of Network and Systems Management Pub Date : 2024-06-12 DOI: 10.1007/s10922-024-09830-y
Hanan Suwi, Nadjia Kara, Omar Abdel Wahab, Claes Edstrom, Yves Lemieux
{"title":"Offline and Real-Time Policy-based Management for Virtualized Services: Conflict and Redundancy Detection, and Automated Resolution","authors":"Hanan Suwi, Nadjia Kara, Omar Abdel Wahab, Claes Edstrom, Yves Lemieux","doi":"10.1007/s10922-024-09830-y","DOIUrl":"https://doi.org/10.1007/s10922-024-09830-y","url":null,"abstract":"<p>Network Function Virtualization (NFV) is a new technology that allows service providers to improve the cost efficiency of network service provisioning. This is accomplished by decoupling the network functions from the physical environment within which they are deployed and converting them into software components that run on top of commodity hardware. Despite its importance, NFV encounters many challenges at the placement, resource management, and adaptation levels. For example, any placement strategy must take into account the minimization of several factors, including those of hardware resource utilization, network bandwidth and latency. Moreover, Virtual Network Functions (VNFs) should continuously be adjusted to keep up with the changes that occur at both the data center and user levels. Over the past few years several efforts have been made to come up with innovative placement, resource management, and readjustment policies. However, a problem arises when these policies exhibit some conflicts and/or redundancies with one another, since the policies are proposed by multiple sources (e.g., service providers, network administrators, NFV-orchestrators and customers). This constitutes a serious problem for the network service as a whole and has several negative impacts such as Service-Level Agreement (SLA) violations and performance degradation. Besides, as conflicts may occur among a set of policies, pairwise detection will not adequate. In this paper, we tackle this problem by defining a conflict and redundancy detection and an automated resolution mechanisms to identify and solve the issues within and between NFV policies. Finally, we integrate a real-time detection component into our solution to provide continuous and comprehensive conflict and redundancy resolution, as new policies are introduced. The experimental results show that the proposed policy detection and resolution tools could rapidly identify, detect and solve conflicts and redundancies among NFV policies and extremely fast than other frameworks. Furthermore, the results show that our solution is efficient even in scenarios that consist of more than 2000 policies. Moreover, our proposed detection mechanisms can detect and solve the conflicts and redundancies for various types of policies such as placement, scaling and migration.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"24 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141501386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Cloud Gaming QoE Estimation by Stacking Learning 通过堆叠学习增强云游戏 QoE 估算
IF 3.6 3区 计算机科学
Journal of Network and Systems Management Pub Date : 2024-06-12 DOI: 10.1007/s10922-024-09836-6
Daniel Soares, Marcos Carvalho, Daniel F. Macedo
{"title":"Enhancing Cloud Gaming QoE Estimation by Stacking Learning","authors":"Daniel Soares, Marcos Carvalho, Daniel F. Macedo","doi":"10.1007/s10922-024-09836-6","DOIUrl":"https://doi.org/10.1007/s10922-024-09836-6","url":null,"abstract":"<p>The Cloud Gaming sector is burgeoning with an estimated annual growth of more than 50%, poised to reach a market value of $22 billion by 2030, and notably, GeForce Now, launched in 2020, reached 20 million users by August 2022. Cloud gaming presents cost-effective advantages for users and developers by eliminating hardware investments and game purchases, reducing development costs, and optimizing distribution efforts. However, it introduces challenges for network operators and providers, demanding low latency and substantial computational power. User satisfaction in cloud gaming depends on various factors, including game content, network type, and context, all shaping Quality of Experience. This study extends prior research, merging datasets from wired and mobile cloud gaming services to create an Expanded stacking model. All data gathering involves actual users engaging in gameplay within a realistic test environment, employing protocols akin to those utilized by the Geforce Now cloud gaming platform. Results indicate significant improvements in QoE estimation across different gaming contexts, highlighting the feasibility of a versatile predictive model for cloud gaming experiences, building upon previous stacking learning approaches.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"86 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141526890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-Based Intrusion Detection for a Secure Internet of Things (IoT) 基于人工智能的入侵检测,实现安全的物联网 (IoT)
IF 3.6 3区 计算机科学
Journal of Network and Systems Management Pub Date : 2024-06-09 DOI: 10.1007/s10922-024-09829-5
Reham Aljohani, Anas Bushnag, Ali Alessa
{"title":"AI-Based Intrusion Detection for a Secure Internet of Things (IoT)","authors":"Reham Aljohani, Anas Bushnag, Ali Alessa","doi":"10.1007/s10922-024-09829-5","DOIUrl":"https://doi.org/10.1007/s10922-024-09829-5","url":null,"abstract":"<p>The increasing use of intelligent devices connected to the internet has contributed to the introduction of a new paradigm: the Internet of Things (IoT). The IoT is a set of devices connected via the internet that cooperate to achieve a specific goal. Smart cities, smart airports, smart transportation, smart homes, and many applications in the medical and educational fields all use the IoT. However, one major challenge is detecting malicious intrusions on IoT networks. Intrusion Detection Systems (IDSs) should detect these types of intrusions. This work proposes an effective model for detecting malicious IoT activities using machine learning techniques. The ToN-IoT dataset, which consists of seven connected devices (subdatasets), is used to construct an IoT network. The proposed model is a multilevel classification model. The first level distinguishes between attack and normal network activities. The second level is to classify the types of detected attacks. The experimental results prove the effectiveness of the proposed model in terms of time and classification performance metrics. The proposed model and seven baseline techniques in the literature are compared. The proposed model outperformed the baseline techniques in all subdatasets except for the Garage Door dataset.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"5 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141501338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Scheduling of Charger-UAV in Wireless Rechargeable Sensor Networks: Social Group Optimization Based Approach 无线充电式传感器网络中充电器-无人机的高效调度:基于社会群体优化的方法
IF 3.6 3区 计算机科学
Journal of Network and Systems Management Pub Date : 2024-06-05 DOI: 10.1007/s10922-024-09833-9
Sk Md Abidar Rahaman, Md Azharuddin, Pratyay Kuila
{"title":"Efficient Scheduling of Charger-UAV in Wireless Rechargeable Sensor Networks: Social Group Optimization Based Approach","authors":"Sk Md Abidar Rahaman, Md Azharuddin, Pratyay Kuila","doi":"10.1007/s10922-024-09833-9","DOIUrl":"https://doi.org/10.1007/s10922-024-09833-9","url":null,"abstract":"<p>Wireless power transfer (WPT) technology enables the replenishment of rechargeable battery energy by the sensor nodes (SNs) in wireless rechargeable sensor networks (WRSNs). The deployment of unmanned aerial vehicles (UAVs) as flying chargers to replenish battery energy is established as an emerging technique, especially in harsh environments. The UAV is also operated by limited battery power and, hence, is also power-constrained. Therefore, the UAV has to timely return to the depot to be fully recharged for the next cycle. The SNs should also be timely recharged before they completely deplete their energy. The design of an efficient charging schedule for the charger-UAV for WRSNs is challenging due to the above-mentioned constraints. Moreover, the problem is non-deterministic polynomial hard (NP-hard). This paper addresses the problem of scheduling the charger-UAV to replenish the energy of SNs in WRSNs. A population-based, nature-inspired algorithm, social group optimization (SGO), is employed to design an efficient charging schedule. The flying energy of the UAV is considered to ensure that the UAV will safely and timely return back to the depot. The fitness function is designed with a novel reward-based approach. The proposed work is extensively simulated, and performance comparisons are done along with statistical analysis.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"20 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141526891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EDaTAD: Energy-Aware Data Transmission Approach with Decision-Making for Fog Computing-Based IoT Applications EDaTAD:为基于雾计算的物联网应用提供具有决策功能的节能数据传输方法
IF 3.6 3区 计算机科学
Journal of Network and Systems Management Pub Date : 2024-06-03 DOI: 10.1007/s10922-024-09828-6
Ali Kadhum Idrees, Tara Ali-Yahiya, Sara Kadhum Idrees, Raphael Couturier
{"title":"EDaTAD: Energy-Aware Data Transmission Approach with Decision-Making for Fog Computing-Based IoT Applications","authors":"Ali Kadhum Idrees, Tara Ali-Yahiya, Sara Kadhum Idrees, Raphael Couturier","doi":"10.1007/s10922-024-09828-6","DOIUrl":"https://doi.org/10.1007/s10922-024-09828-6","url":null,"abstract":"<p>In the fog computing-based Internet of Things (IoT) architecture, the sensor devices represent the basic elements needed to sense the surrounding environment. They gather and send a huge amount of data to the fog gateway and then to the cloud due to their use in various real-world IoT applications. This would lead to high data traffic, increased energy consumption, and slow decisions at the fog gateway. Therefore, it is important to reduce the transmitted data to save energy and provide an accurate decision regarding the safety and health of the building’s environment. This paper suggests an energy-aware data transmission approach with decision-making (EDaTAD) for Fog Computing-based IoT applications. It works on two-level nodes in the fog computing-based TI architecture: sensor devices and fog gateways. The EDaTAD implements a Lightweight Redundant Data Removing (LiReDaR) algorithm at the sensor device level to lower the gathered data before sending it to the fog gateway. In the fog gateway, a decision-making model is proposed to provide suitable decisions to the monitoring staff in remote monitoring applications. Finally, it executes a Data Set Redundancy Elimination (DaSeRE) approach to discard the repetitive data sets before sending them to the cloud for archiving and further analysis. EDaTAD outperforms other methods in terms of transmitted data, energy consumption, and data accuracy. Furthermore, it assesses the risk efficiently and provides suitable decisions while decreasing the latency time.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"71 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141258114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-Aware Microservice-Based Application Deployment in UAV-Based Networks for Rural Scenarios 面向农村场景的无人机网络中基于能量感知的微服务应用部署
IF 3.6 3区 计算机科学
Journal of Network and Systems Management Pub Date : 2024-05-31 DOI: 10.1007/s10922-024-09825-9
Diego Ramos-Ramos, Alejandro González-Vegas, Javier Berrocal, Jaime Galán-Jiménez
{"title":"Energy-Aware Microservice-Based Application Deployment in UAV-Based Networks for Rural Scenarios","authors":"Diego Ramos-Ramos, Alejandro González-Vegas, Javier Berrocal, Jaime Galán-Jiménez","doi":"10.1007/s10922-024-09825-9","DOIUrl":"https://doi.org/10.1007/s10922-024-09825-9","url":null,"abstract":"<p>Yearly, the rates of Internet penetration are on the rise, surpassing 80% in developed nations. Despite this progress, over two billion individuals in rural and low-income regions face a complete absence of Internet access. This lack of connectivity hinders the implementation of vital services like remote healthcare, emergency assistance, distance learning, and personal communications. To bridge this gap and bring essential services to rural populations, this paper leverages Unmanned Aerial Vehicles (UAVs). The proposal introduces a UAV-based network architecture and an energy-efficient algorithm to deploy Internet of Things (IoT) applications. These applications are broken down into microservices, strategically distributed among a subset of UAVs. This approach addresses the limitations associated with running an entire IoT application on a single UAV, which could lead to suboptimal outcomes due to battery and computational constraints. Simulation results conducted in a realistic scenario underscore the effectiveness of the proposed solution. The evaluation includes assessing the percentage of IoT requests successfully served to users in the designated area and reducing the energy consumption required by UAVs during the handling of such requests.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"33 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141190342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile-Aware Service Function Chain Intelligent Seamless Migration in Multi-access Edge Computing 多接入边缘计算中的移动感知服务功能链智能无缝迁移
IF 3.6 3区 计算机科学
Journal of Network and Systems Management Pub Date : 2024-05-18 DOI: 10.1007/s10922-024-09820-0
Lingyi Xu, Wenbin Liu, Zhiwei Wang, Jianxiao Luo, Jinjiang Wang, Zhi Ma
{"title":"Mobile-Aware Service Function Chain Intelligent Seamless Migration in Multi-access Edge Computing","authors":"Lingyi Xu, Wenbin Liu, Zhiwei Wang, Jianxiao Luo, Jinjiang Wang, Zhi Ma","doi":"10.1007/s10922-024-09820-0","DOIUrl":"https://doi.org/10.1007/s10922-024-09820-0","url":null,"abstract":"<p>With the improvement of service delay and quality requirements for new applications such as unmanned driving, internet of vehicles, and virtual reality, the deployment of network services is gradually moving from the cloud to the edge. This transition has led to the emergence of multi-access edge computing (MEC) architectures such as distributed micro data center and fog computing. In the MEC environment, network infrastructure is distributed around users, allowing them to access the network nearby and move between different service coverage locations. However, the high mobility of users can significantly affect service orchestration and quality, and even cause service interruption. How to respond to user mobility, dynamically migrate user services, and provide users with a continuous and seamless service experience has become a huge challenge. This paper studies the dynamic migration of service function chain (SFC) caused by user mobility in MEC environments. First, we model the SFC dynamic migration problem in mobile scenarios as an integer programming problem with the goal of optimizing service delay, migration success rate, and migration time. Based on the above model, we propose a deep reinforcement learning-driven SFC adaptive dynamic migration optimization algorithm (DRL-ADMO). DRL-ADMO can perceive the underlying network resources and SFC migration requests, intelligently decide on the migration paths of multiple network functions, and adaptively allocate bandwidth, achieving parallel and seamless SFC migration. Performance evaluation results show that compared with existing algorithms, the proposed algorithm can optimize 7% service delay and 20% migration success rate at the cost of sacrificing a small amount of migration time.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"139 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141061137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building a Comprehensive Intent-Based Networking Framework: A Practical Approach from Design Concepts to Implementation 构建基于意图的综合网络框架:从设计概念到实施的实用方法
IF 3.6 3区 计算机科学
Journal of Network and Systems Management Pub Date : 2024-05-03 DOI: 10.1007/s10922-024-09819-7
Henry Yu, Hesam Rahimi, Christopher Janz, Dong Wang, Zhen Li, Chungang Yang, Yehua Zhao
{"title":"Building a Comprehensive Intent-Based Networking Framework: A Practical Approach from Design Concepts to Implementation","authors":"Henry Yu, Hesam Rahimi, Christopher Janz, Dong Wang, Zhen Li, Chungang Yang, Yehua Zhao","doi":"10.1007/s10922-024-09819-7","DOIUrl":"https://doi.org/10.1007/s10922-024-09819-7","url":null,"abstract":"<p>Intent-Based Networking (IBN) is an important step towards achieving network automation. Many challenges of today’s complex network management systems can be tackled by the solutions proposed by IBN. However, although IBN has gained a lot of attention from the academic and industrial community in the second half of the last decade leading to many scientific publications and research papers, there has been little effort made on proposing a comprehensive framework for IBN, which converts system-level IBN concepts and theories into a fully featured software implementation. This paper presents such framework. Its implementation is standards-based and open-source. The framework can be used to facilitate and validate novel research ideas and test cases. The paper discusses relevant IBN design concepts and theories, how the framework’s software architecture is derived from those concepts, and the technical and implementation details on key IBN aspects and features including Intent life-cycle, Intent definition and translation, Intent orchestration, and Intent assurance using closed-loops. We also demonstrate a real intent-based use case realized by the framework in order to show and validate the proof-of-concept (PoC). The Future work of this project is also discussed.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"63 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140883169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Initialization Functions for Metaheuristic-Based Online Virtual Network Embedding 基于元搜索的在线虚拟网络嵌入的新初始化函数
IF 3.6 3区 计算机科学
Journal of Network and Systems Management Pub Date : 2024-04-30 DOI: 10.1007/s10922-024-09822-y
Javier Rubio-Loyola, Christian Aguilar-Fuster
{"title":"Novel Initialization Functions for Metaheuristic-Based Online Virtual Network Embedding","authors":"Javier Rubio-Loyola, Christian Aguilar-Fuster","doi":"10.1007/s10922-024-09822-y","DOIUrl":"https://doi.org/10.1007/s10922-024-09822-y","url":null,"abstract":"<p>Virtual network embedding (VNE) is the process of allocating resources in a substrate (i.e. physical) network to support virtual networks optimally. The VNE problem is an NP-hard problem that has been studied for more than a decade in the continuous seek to maximize the revenue of physical infrastructures with more efficient VNE solutions. Metaheuristics have been widely used in online VNE as they incorporate mechanisms to avoid local optimum solutions, explore larger search spaces, and keep acceptable execution times. All metaheuristic optimization algorithms require initialization for which the vast majority of online VNE solutions implement random initialization. This paper proposes three novel initialization functions namely, Initialization Based on Node Selection (IFNS), Initialization Function Based on Community Detection (IFCD), and Initialization Function Based on Previous Solutions (IFPS), intending to enhance the performance of the online VNE process. Through simulation, our initialization functions have been proven to enhance the acceptance rate, revenue, and revenue-to-cost metrics of the VNE process. The enhancements achieved by our initialization functions are statistically significant and their implementation does not add computational overhead to the classic VNE approaches.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"9 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140838155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SampleHST-X: A Point and Collective Anomaly-Aware Trace Sampling Pipeline with Approximate Half Space Trees SampleHST-X:具有近似半空间树的点和集体异常感知跟踪采样管道
IF 3.6 3区 计算机科学
Journal of Network and Systems Management Pub Date : 2024-04-16 DOI: 10.1007/s10922-024-09818-8
Alim Ul Gias, Yicheng Gao, Matthew Sheldon, José A. Perusquía, Owen O’Brien, Giuliano Casale
{"title":"SampleHST-X: A Point and Collective Anomaly-Aware Trace Sampling Pipeline with Approximate Half Space Trees","authors":"Alim Ul Gias, Yicheng Gao, Matthew Sheldon, José A. Perusquía, Owen O’Brien, Giuliano Casale","doi":"10.1007/s10922-024-09818-8","DOIUrl":"https://doi.org/10.1007/s10922-024-09818-8","url":null,"abstract":"<p>The storage requirement for distributed tracing can be reduced significantly by sampling only the anomalous or interesting traces that occur rarely at runtime. In this paper, we introduce an unsupervised sampling pipeline for distributed tracing that ensures high sampling accuracy while reducing the storage requirement. The proposed method, SampleHST-X, extends our recent work SampleHST. It operates based on a budget which limits the percentage of traces to be sampled while adjusting the storage quota of normal and anomalous traces depending on the size of this budget. The sampling process relies on accurately defining clusters of normal and anomalous traces by leveraging the distribution of mass scores, which characterize the probability of observing different traces, obtained from a forest of Half Space Trees (HST). In our experiments, using traces from a cloud data center, SampleHST yields 2.3<span>(times)</span> to 9.5<span>(times)</span> better sampling performance. SampleHST-X further extends the SampleHST approach by incorporating a novel class of Half Space Trees, namely Approximate HST, that uses approximate counters to update the mass scores. These counters significantly reduces the space requirement for HST while the sampling performance remains similar. In addition to this extension, SampleHST-X includes a Family of Graph Spectral Distances (FGSD) based trace characterization component, which, in addition to point anomalies, enables it to sample traces with collective anomalies. For such traces, we observe that the SampleHST-X approach can yield 1.2<span>(times)</span> to 19<span>(times)</span> better sampling performance.</p>","PeriodicalId":50119,"journal":{"name":"Journal of Network and Systems Management","volume":"4 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140563545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信