Module, p.63 ,
uniform" min="0" max="5000 ,
<sip:[$my_dn]@[local_ip]:[local_port];transport=[transport];ob>; +sip.ice;reg-id=1;+sip.instance= REGISTER sip:[$peer_dn]@[service ,
[local_port];transport=[transport]; ob>;+sip.ice;reg-id=1;+sip.instance= "<urn, pp.3600-3603 ,
];transport=[transport]; ob>;+sip.ice;reg-id=1;+sip.instance= "<urn ,
send> <recv response="200" rtd="register"> <action> <add assign_to= ,
];transport=[transport]; ob>;+sip.ice;reg-id=1;+sip.instance="<urn:uuid:00000000-0000-0000-0000-000000000001>" Contact: <sip:[$peer_dn]@[local_ip]:[local_port];transport=[transport]; ob>;expires=0;+sip.ice;reg-id=1;+sip.instance="<urn Expires, p.3600 ,
];transport=[transport]; ob>;+sip.ice Max-Forwards, p.70 ,
Contact: <sip:[$peer_dn]@[$nat_ip_addr][$nat_port];transport=[transport]; ob>;+sip.ice Content-Length: 0 ]]> </send> <recv response="200" rtd="call-teardown"> </recv> <!--definition of the response time repartition table (unit is ms) --> <ResponseTimeRepartition value=, pp.3000-4000, 1000. ,
A Framework for Clustering Evolving Data Streams, Proceedings of the 29th International Conference on Very Large Data Bases, pp.81-92, 2003. ,
DOI : 10.1016/B978-012722442-8/50016-1
A Framework for Projected Clustering of High Dimensional Data Streams, Proceedings of the Thirtieth International Conference on Very Large Data Bases, pp.852-863, 2004. ,
DOI : 10.1016/B978-012088469-8.50075-9
A survey of stream clustering algorithms, Data Clustering : Algorithms and Applications, pp.231-258, 2013. ,
Data clustering : Algorithms and applications, Chapman & Hall/CRC, pp.2013-2040, 2013. ,
Automatic subspace clustering of high dimensional data for data mining applications, ACM SIGMOD Record, vol.27, issue.2, pp.94-105, 1998. ,
DOI : 10.1145/276305.276314
CARDWATCH: a neural network based database mining system for credit card fraud detection, Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr), pp.220-226, 1997. ,
DOI : 10.1109/CIFER.1997.618940
Empirical assessment of machine learning-based malware detectors for Android, Empirical Software Engineering, vol.98888, issue.14, pp.183-211, 2016. ,
DOI : 10.1109/SP.2012.16
Fault injection for dependability validation: a methodology and some applications, IEEE Transactions on Software Engineering, vol.16, issue.2, pp.166-182, 1990. ,
DOI : 10.1109/32.44380
Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004. ,
DOI : 10.1109/TDSC.2004.2
Reliability and availability of cloud computing, p.2012, 2012. ,
DOI : 10.1002/9781118393994
Towards Energy-aware Scheduling in Data Centers Using Machine Learning, Proceedings of the 1st International Conference on Energy-Efficient Computing and Networking, e-Energy '10, pp.215-224, 2010. ,
When Is ???Nearest Neighbor??? Meaningful?, Database Theory ? ICDT'99, pp.217-235, 1999. ,
DOI : 10.1007/3-540-49257-7_15
URL : https://minds.wisconsin.edu/bitstream/handle/1793/60174/TR1377.pdf?sequence=1
Machine learning approach for intrusion detection on cloud virtual machines, International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol.2, issue.6, pp.56-66, 2013. ,
Statistical Machine Learning Makes Automatic Control Practical for Internet Datacenters, Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud'09, 2009. ,
The use of the area under the ROC curve in the evaluation of machine learning algorithms, Pattern recognition, vol.30, issue.7, pp.1145-1159, 1997. ,
Random Forests, Machine Learning, pp.5-32, 2001. ,
The evolution of virtual machine architecture, Proceedings of the June 4-8, 1973, national computer conference and exposition on, AFIPS '73, pp.291-299, 1973. ,
DOI : 10.1145/1499586.1499667
Density-Based Clustering over an Evolving Data Stream with Noise, 2006 SIAM Conference on Data Mining, pp.328-339, 2006. ,
DOI : 10.1137/1.9781611972764.29
Enhancing density-based clustering: Parameter reduction and outlier detection, Information Systems, vol.38, issue.3, pp.317-330, 2013. ,
DOI : 10.1016/j.is.2012.09.001
Cost function based event triggered Model Predictive Controllers application to Big Data Cloud services, 2016 IEEE 55th Conference on Decision and Control (CDC), p.2016, 2016. ,
DOI : 10.1109/CDC.2016.7798503
URL : https://hal.archives-ouvertes.fr/hal-01348687
Updating formulae and a pairwise algorithm for computing sample variances, COMPSTAT 1982 5th Symposium held at Toulouse 1982, pp.30-41, 1982. ,
Anomaly detection, ACM Computing Surveys, vol.41, issue.3, pp.1-15, 2009. ,
DOI : 10.1145/1541880.1541882
Managing energy and server resources in hosting centers, ACM SIGOPS Operating Systems Review, vol.35, issue.5, pp.103-116, 2001. ,
DOI : 10.1145/502059.502045
Automated anomaly detection and performance modeling of enterprise applications, ACM Transactions on Computer Systems, vol.27, issue.3, pp.1-6, 2009. ,
DOI : 10.1145/1629087.1629089
Correlating instrumentation data to system states : a building block for automated diagnosis and control, Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation USENIX Association . (Cité en, pp.16-16, 2004. ,
Benchmarking cloud serving systems with YCSB, Proceedings of the 1st ACM symposium on Cloud computing, SoCC '10, pp.143-154, 2010. ,
DOI : 10.1145/1807128.1807152
URL : http://www.brianfrankcooper.net/pubs/ycsb.pdf
UBL, Proceedings of the 9th international conference on Autonomic computing, ICAC '12, pp.191-200, 2012. ,
DOI : 10.1145/2371536.2371572
An Intrusion-Detection Model, IEEE Transactions on Software Engineering, issue.2, pp.222-232, 1987. ,
Fa : A system for automating failure diagnosis, IEEE 25th International Conference on Data Engineering, pp.1012-1023, 2009. ,
MSDBSCAN: Multi-density Scale-Independent Clustering Algorithm Based on DBSCAN, Advanced Data Mining and Applications, pp.202-213, 2010. ,
DOI : 10.1145/335191.335388
A density-based algorithm for discovering clusters in large spatial databases with noise, KDD, pp.226-231, 1996. ,
Experience report: Anomaly detection of cloud application operations using log and cloud metric correlation analysis, 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE), pp.24-34, 2015. ,
DOI : 10.1109/ISSRE.2015.7381796
Experience report: Anomaly detection of cloud application operations using log and cloud metric correlation analysis, 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE), pp.24-34, 2015. ,
DOI : 10.1109/ISSRE.2015.7381796
Cloud Computing and Grid Computing 360-Degree Compared, 2008 Grid Computing Environments Workshop, pp.1-10, 2008. ,
DOI : 10.1109/GCE.2008.4738445
Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning, pp.103-116, 2013. ,
DOI : 10.1007/978-3-642-45260-4_8
Artificial neural networks (the multilayer perceptron)?a review of applications in the atmospheric sciences Atmospheric environment, pp.2627-2636, 1998. ,
Architecture of Virtual Machines, Proceedings of the Workshop on Virtual Computer Systems, pp.74-112, 1973. ,
Survey of Virtual Machine Research, Computer, vol.7, issue.9, pp.34-45, 1974. ,
Press : Predictive elastic resource scaling for cloud systems, 2010 International Conference on Network and Service Management, pp.9-16, 2010. ,
Efficient and Accurate Anomaly Identification Using Reduced Metric Space in Utility Clouds, Networking, Architecture and Storage (NAS), 2012 IEEE 7th International Conference on, pp.207-216, 2012. ,
Ensemble of bayesian predictors and decision trees for proactive failure management in cloud computing systems, Journal of Communications, vol.7, issue.1, pp.52-61, 2012. ,
The elements of statistical learning : Data mining, inference, and prediction. Springer series in statistics, 2001. ,
Network security monitor (NSM)?final report, 1995. ,
A comparison of methods for multiclass support vector machines, IEEE Transactions on Neural Networks, vol.13, issue.2, pp.415-425, 2002. ,
Fault injection techniques and tools, Computer, vol.30, issue.4, pp.75-82, 1997. ,
DOI : 10.1109/2.585157
Data clustering: a review, ACM Computing Surveys, vol.31, issue.3, pp.264-323, 1999. ,
DOI : 10.1145/331499.331504
Diagnosing Network-wide Traffic Anomalies, Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications , SIGCOMM '04, pp.219-230, 2004. ,
DOI : 10.1145/1015467.1015492
URL : http://cs-people.bu.edu/anukool/pubs/subspacemethod-sigc04.pdf
Guide de la sûreté de fonctionnement. Cépaduès-éditions, 1995. ,
Second Order Properties of Error Surfaces : Learning Time and Generalization, Advances in Neural Information Processing Systems, pp.918-924, 1991. ,
A data mining framework for building intrusion detection models, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), pp.120-132, 1999. ,
DOI : 10.1109/SECPRI.1999.766909
Semi-supervised random forests, IEEE 12th International Conference on Computer Vision, pp.506-513, 2009. ,
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters, Proceedings of the Twenty-eighth Australasian Conference on Computer Science - ACSC '05, pp.333-342, 2005. ,
BlueGene/L Failure Analysis and Prediction Models, Dependable Systems and Networks, 2006. DSN 2006. International Conference on, pp.425-434, 2006. ,
Failure Prediction in IBM BlueGene/L Event Logs, Seventh IEEE International Conference on Data Mining (ICDM 2007), pp.583-588, 2007. ,
DOI : 10.1109/ICDM.2007.46
Incremental Clustering of Dynamic Data Streams Using Connectivity Based Representative Points, Data Knowl. Eng, vol.68, issue.1, pp.1-27, 2009. ,
Some Methods for classification and analysis of multivariate observations, Procedings of the Fifth Berkeley Symposium on Math, Statistics, and Probability, pp.281-297, 1967. ,
The Ganglia Distributed Monitoring System : Design, Implementation And Experience, Parallel Computing, vol.30, 2003. ,
On the Use of Machine Learning to Predict the Time and Resources Consumed by Applications, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp.495-504, 2010. ,
DOI : 10.1109/CCGRID.2010.98
vNMF: Distributed fault detection using clustering approach for network function virtualization, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp.640-645, 2015. ,
DOI : 10.1109/INM.2015.7140349
Network intrusion detection, IEEE Network, vol.8, issue.3, pp.26-41, 1994. ,
DOI : 10.1109/65.283931
Assessing Dependability with Software Fault Injection, ACM Computing Surveys, vol.48, issue.3, pp.44-2016, 2016. ,
DOI : 10.1109/DSN.2001.941426
FChain: Toward Black-Box Online Fault Localization for Cloud Systems, 2013 IEEE 33rd International Conference on Distributed Computing Systems, pp.21-30, 2013. ,
DOI : 10.1109/ICDCS.2013.26
Universal fault detection for NFV using SOM-based clustering, Network Operations and Management Symposium (APNOMS), 2015 17th Asia-Pacific, pp.315-320, 2015. ,
CloudVal: A framework for validation of virtualization environment in cloud infrastructure, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN), pp.189-196, 2011. ,
DOI : 10.1109/DSN.2011.5958218
The Case Against Accuracy Estimation for Comparing Induction Algorithms, Proceedings of the Fifteenth International Conference on Machine Learning, ICML '98, pp.445-453, 1998. ,
Using Hidden Semi-Markov Models for Effective Online Failure Prediction, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007), pp.161-174, 2007. ,
DOI : 10.1109/SRDS.2007.35
A survey of online failure prediction methods, ACM Computing Surveys, vol.42, issue.3, pp.1-10, 2010. ,
DOI : 10.1145/1670679.1670680
Data Stream Clustering for Online Anomaly Detection in Cloud Applications, 2015 11th European Dependable Computing Conference (EDCC), pp.73-134, 2015. ,
DOI : 10.1109/EDCC.2015.22
URL : https://hal.archives-ouvertes.fr/hal-01211774
Anomaly Detection and Root Cause Localization in Virtual Network Functions, 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), 2016. ,
DOI : 10.1109/ISSRE.2016.32
URL : https://hal.archives-ouvertes.fr/hal-01419014
Predicting Vulnerable Software Components via Text Mining, IEEE Transactions on Software Engineering, vol.40, issue.10, pp.993-1006, 2014. ,
DOI : 10.1109/TSE.2014.2340398
Estimating the Support of a High-Dimensional Distribution, Neural Computation, vol.6, issue.1, pp.1443-1471, 2001. ,
DOI : 10.1214/aos/1069362732
Analytics : The real-world use of big data. IBM Institute for Business Value, pp.2012-2028 ,
SLA guarantees for cloud services, Future Generation Computer Systems, vol.54, pp.233-246, 2016. ,
DOI : 10.1016/j.future.2015.03.018
URL : https://hal.archives-ouvertes.fr/hal-01162654
Fault detection and localization in distributed systems using invariant relationships, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp.1-8, 2013. ,
Referencedriven Performance Anomaly Identification, SIGMETRICS Perform. Eval. Rev, vol.37, issue.1, pp.85-96, 2009. ,
DOI : 10.1145/1555349.1555360
URL : http://www.cs.rochester.edu/~kshen/papers/sigmetrics2009.pdf
An anomaly detection approach for scale-out storage systems, 26th International Symposium on Computer Architecture and High Performance Computing, pp.45-68, 2014. ,
Boosting streaming video delivery with wisereplica, Transactions on Large-Scale Data-and Knowledge-Centered Systems XX, pp.34-58, 2015. ,
Tejo : A Supervised Anomaly Detection Scheme for NewSQL Databases, 7th International Workshop on Software Engineering for Resilient Systems, pp.35-76, 2015. ,
Measurement-based availability analysis of Unix systems in a distributed environment, Proceedings 12th International Symposium on Software Reliability Engineering, pp.346-355, 2001. ,
DOI : 10.1109/ISSRE.2001.989489
URL : https://hal.archives-ouvertes.fr/hal-00852425
Event log based dependability analysis of Windows NT and 2K systems, 2002 Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings., 2002. ,
DOI : 10.1109/PRDC.2002.1185651
NF- TAPE : a framework for assessing dependability in distributed systems with lightweight fault injectors, Computer Performance and Dependability Symposium, pp.91-100, 2000. ,
Adaptive system anomaly prediction for large-scale hosting infrastructures, Proceeding of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing, PODC '10, pp.173-182, 2010. ,
DOI : 10.1145/1835698.1835741
URL : http://dance.csc.ncsu.edu/papers/podc10.pdf
PREPARE: Predictive Performance Anomaly Prevention for Virtualized Cloud Systems, 2012 IEEE 32nd International Conference on Distributed Computing Systems, pp.285-294, 2012. ,
DOI : 10.1109/ICDCS.2012.65
URL : http://www4.ncsu.edu/~ytan2/icdcs2012_tan.pdf
Bellwether analysis, ACM Transactions on Knowledge Discovery from Data, vol.3, issue.1, pp.1-12, 2009. ,
DOI : 10.1145/1497577.1497582
Experimental perspectives on learning from imbalanced data, Proceedings of the 24th international conference on Machine learning, ICML '07, pp.935-942, 2007. ,
DOI : 10.1145/1273496.1273614
Online detection of utility cloud anomalies using metric distributions, 2010 IEEE Network Operations and Management Symposium -NOMS 2010, pp.96-103, 2010. ,
Online failure prediction in cloud datacenters by real-time message pattern learning, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, pp.504-511, 2012. ,
DOI : 10.1109/CloudCom.2012.6427566
Vajra : Evaluating byzantine-fault-tolerant distributed systems, pp.163-183, 2008. ,
Tiresias: Black-Box Failure Prediction in Distributed Systems, 2007 IEEE International Parallel and Distributed Processing Symposium, pp.1-8, 2007. ,
DOI : 10.1109/IPDPS.2007.370345
GMDBS- CAN : Multi-Density DBSCAN Cluster Based on Grid, IEEE International Conference on, pp.780-783, 2008. ,
Detecting large-scale system problems by mining console logs, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP '09, pp.117-132, 2009. ,
DOI : 10.1145/1629575.1629587
URL : http://www.sigops.org/sosp/sosp09/papers/xu-sosp09.pdf
Simple Testing Can Prevent Most Critical Failures : An Analysis of Production Failures in Distributed Data-Intensive Systems, 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14) 2014. USENIX Association. (Cité en page 63, pp.249-265, 2014. ,
Fuzzy sets, Information and control, vol.8, issue.3, pp.338-353, 1965. ,
BIRCH : An Efficient Data Clustering Method for Very Large Databases, 1996. ,
eCAD: Cloud Anomalies Detection From an Evolutionary View, 2013 International Conference on Cloud Computing and Big Data, pp.328-334, 2013. ,
DOI : 10.1109/CLOUDCOM-ASIA.2013.57