, , 2016.
CARDWATCH: a neural network based database mining system for credit card fraud detection, Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr), pp.220-226, 1997. ,
DOI : 10.1109/CIFER.1997.618940
Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004. ,
DOI : 10.1109/TDSC.2004.2
URL : http://drum.lib.umd.edu/bitstream/1903/6459/1/TR_2004-47.pdf
Towards energy-aware scheduling in data centers using machine learning, Proceedings of the 1st International Conference on Energy-Efficient Computing and Networking, e-Energy '10, pp.215-224, 2010. ,
DOI : 10.1145/1791314.1791349
Machine learning approach for intrusion detection on cloud virtual machines, International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol.2, issue.6, pp.56-66, 2013. ,
Statistical machine learning makes automatic control practical for internet datacenters, Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud'09 ,
The use of the area under the ROC curve in the evaluation of machine learning algorithms, Pattern Recognition, vol.30, issue.7, pp.1145-1159, 1997. ,
DOI : 10.1016/S0031-3203(96)00142-2
Nfv-vital: A framework for characterizing the performance of virtual network functions, Network Function Virtualization and Software Defined Network 2015 IEEE Conference on, pp.93-99, 2015. ,
Software Faults Diagnosis in Complex OTS Based Safety Critical Systems, 2008 Seventh European Dependable Computing Conference, pp.25-34, 1109. ,
DOI : 10.1109/EDCC-7.2008.26
Cost function based event triggered Model Predictive Controllers application to Big Data Cloud services, 2016 IEEE 55th Conference on Decision and Control (CDC), 2016. ,
DOI : 10.1109/CDC.2016.7798503
URL : https://hal.archives-ouvertes.fr/hal-01348687
Managing energy and server resources in hosting centers, ACM SIGOPS Operating Systems Review, vol.35, issue.5, pp.103-116, 2001. ,
DOI : 10.1145/502059.502045
URL : http://www.cs.pitt.edu/~melhem/courses/3530/papers/pm3.pdf
Automated anomaly detection and performance modeling of enterprise applications, ACM Transactions on Computer Systems, vol.27, issue.3, pp.1-6, 2009. ,
DOI : 10.1145/1629087.1629089
Correlating instrumentation data to system states: a building block for automated diagnosis and control, Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation -Volume USENIX Association. URL http, pp.16-16, 2004. ,
Benchmarking cloud serving systems with YCSB, Proceedings of the 1st ACM symposium on Cloud computing, SoCC '10, pp.143-154, 2010. ,
DOI : 10.1145/1807128.1807152
NFV-Bench: A Dependability Benchmark for Network Function Virtualization Systems, IEEE Transactions on Network and Service Management, vol.14, issue.4 ,
DOI : 10.1109/TNSM.2017.2733042
The relationship between Precision-Recall and ROC curves, Proceedings of the 23rd international conference on Machine learning , ICML '06, pp.233-240, 2006. ,
DOI : 10.1145/1143844.1143874
URL : https://minds.wisconsin.edu/bitstream/1793/60482/1/TR1551.pdf
UBL, Proceedings of the 9th international conference on Autonomic computing, ICAC '12, pp.191-200 ,
DOI : 10.1145/2371536.2371572
Perfcompass: Toward runtime performance anomaly fault localization for infrastructure-as-a-service clouds, 6th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 14), 2014. ,
DOI : 10.1109/tpds.2015.2444392
An intrusion-detection model, IEEE Transactions on Software Engineering, issue.2, pp.13222-232, 1987. ,
Fa: A System for Automating Failure Diagnosis, 2009 IEEE 25th International Conference on Data Engineering, pp.1012-1023, 2009. ,
DOI : 10.1109/ICDE.2009.115
Technical report 103 125 v1.1.1. cloud; slas for cloud services, 2012. ,
Experience report: Anomaly detection of cloud application operations using log and cloud metric correlation analysis, 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE), pp.24-34, 2015. ,
DOI : 10.1109/ISSRE.2015.7381796
Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning, pp.103-116, 2013. ,
DOI : 10.1007/978-3-642-45260-4_8
Press: Predictive elastic resource scaling for cloud systems, 2010 International Conference on Network and Service Management, pp.9-16, 2010. ,
Press: Predictive elastic resource scaling for cloud systems, 2010 International Conference on Network and Service Management, pp.9-16, 2010. ,
Adaptive Anomaly Identification by Exploring Metric Subspace in Cloud Computing Infrastructures, 2013 IEEE 32nd International Symposium on Reliable Distributed Systems, pp.205-214, 2013. ,
DOI : 10.1109/SRDS.2013.29
Efficient and Accurate Anomaly Identification Using Reduced Metric Space in Utility Clouds, 2012 IEEE Seventh International Conference on Networking, Architecture, and Storage, pp.207-216, 2012. ,
DOI : 10.1109/NAS.2012.30
Ensemble of Bayesian Predictors and Decision Trees for Proactive Failure Management in Cloud Computing Systems, Journal of Communications, vol.7, issue.1, pp.52-61, 2012. ,
DOI : 10.4304/jcm.7.1.52-61
Network security monitor (nsm)?final report, 1995. ,
PeerWatch, Proceeding of the 7th international conference on Autonomic computing, ICAC '10, pp.119-128, 2010. ,
DOI : 10.1145/1809049.1809070
Dapa: Diagnosing application performance anomalies for virtualized infrastruc- tures, Presented as part of the 2nd USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services ,
Dependability Benchmarking for Computer Systems, 2008. ,
DOI : 10.1002/9780470370506
URL : https://hal.archives-ouvertes.fr/hal-01961204
Modeling virtualized applications using machine learning techniques, ACM SIGPLAN Notices, vol.47, issue.7, pp.3-14 ,
DOI : 10.1145/2365864.2151028
Diagnosing network-wide traffic anomalies, Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '04, pp.219-230, 2004. ,
Second order properties of error surfaces: Learning time and generalization, Advances in Neural Information Processing Systems, pp.918-924, 1991. ,
Information-theoretic measures for anomaly detection, Security and Privacy Proceedings. 2001 IEEE Symposium on, pp.130-143, 2001. ,
A data mining framework for building intrusion detection models, Security and Privacy Proceedings of the 1999 IEEE Symposium on, pp.120-132, 1999. ,
Unsupervised anomaly detection in network intrusion detection using clusters, Proceedings of the Twenty-eighth Australasian Conference on Computer Science, pp.333-342, 2005. ,
Bluegene/l failure analysis and prediction models, Dependable Systems and Networks, 2006. DSN 2006. International Conference on, pp.425-434, 2006. ,
Failure Prediction in IBM BlueGene/L Event Logs, Seventh IEEE International Conference on Data Mining (ICDM 2007), pp.583-588, 2007. ,
DOI : 10.1109/ICDM.2007.46
The ganglia distributed monitoring system: design, implementation, and experience, Parallel Computing, vol.30, issue.7, 2003. ,
DOI : 10.1016/j.parco.2004.04.001
On the Use of Machine Learning to Predict the Time and Resources Consumed by Applications, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp.495-504, 2010. ,
DOI : 10.1109/CCGRID.2010.98
Unsupervised network anomaly detection, 2011. ,
, Machine Learning, Neural and Statistical Classification, 1994.
vNMF: Distributed fault detection using clustering approach for network function virtualization, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp.640-645, 2015. ,
DOI : 10.1109/INM.2015.7140349
Network intrusion detection, IEEE Network, vol.8, issue.3, pp.26-41, 1994. ,
DOI : 10.1109/65.283931
FChain: Toward Black-Box Online Fault Localization for Cloud Systems, 2013 IEEE 33rd International Conference on Distributed Computing Systems, pp.21-30, 2013. ,
DOI : 10.1109/ICDCS.2013.26
Universal fault detection for NFV using SOM-based clustering, 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp.315-320, 2015. ,
DOI : 10.1109/APNOMS.2015.7275446
Machine learning and cloud computing: Survey of distributed and saas solutions ,
Using Hidden Semi-Markov Models for Effective Online Failure Prediction, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007), pp.161-174, 2007. ,
DOI : 10.1109/SRDS.2007.35
Data Stream Clustering for Online Anomaly Detection in Cloud Applications URL https, 11th European Dependable Computing Conference (EDCC 2015), 2015. ,
Data Stream Clustering for Online Anomaly Detection in Cloud Applications URL https, 11th European Dependable Computing Conference (EDCC 2015), 2015. ,
Anomaly Detection and Root Cause Localization in Virtual Network Functions, 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), pp.196-206, 2016. ,
DOI : 10.1109/ISSRE.2016.32
URL : https://hal.archives-ouvertes.fr/hal-01419014
An anomaly detection approach for scale-out storage systems URL https, 26th International Symposium on Computer Architecture and High Performance Computing, 2014. ,
Boosting Streaming Video Delivery with WiseReplica, Transactions on Large-Scale Data-and Knowledge-Centered Systems XX, pp.34-58, 2015. ,
DOI : 10.1007/978-3-662-46703-9_2
URL : https://hal.archives-ouvertes.fr/hal-01198678
Tejo: A Supervised Anomaly Detection Scheme for NewSQL Databases, 7th International Workshop on Software Engineering for Resilient Systems, 2015. ,
DOI : 10.1007/978-3-319-23129-7_9
URL : https://hal.archives-ouvertes.fr/hal-01211772
Measurement-based availability analysis of Unix systems in a distributed environment, Proceedings 12th International Symposium on Software Reliability Engineering, pp.346-355, 2001. ,
DOI : 10.1109/ISSRE.2001.989489
URL : https://hal.archives-ouvertes.fr/hal-00852425
Event log based dependability analysis of Windows NT and 2K systems, 2002 Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings., 2002. ,
DOI : 10.1109/PRDC.2002.1185651
URL : https://hal.archives-ouvertes.fr/hal-01911680
Adaptive system anomaly prediction for large-scale hosting infrastructures, Proceeding of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing, PODC '10, pp.173-182, 2010. ,
DOI : 10.1145/1835698.1835741
PREPARE: Predictive Performance Anomaly Prevention for Virtualized Cloud Systems, 2012 IEEE 32nd International Conference on Distributed Computing Systems, pp.285-294, 2012. ,
DOI : 10.1109/ICDCS.2012.65
Experimental perspectives on learning from imbalanced data, Proceedings of the 24th international conference on Machine learning, ICML '07, pp.935-942, 2007. ,
DOI : 10.1145/1273496.1273614
Online detection of utility cloud anomalies using metric distributions, IEEE Network Operations and Management Symposium -NOMS 2010, pp.96-103, 2010. ,
Online failure prediction in cloud datacenters by real-time message pattern learning, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, pp.504-511, 2012. ,
DOI : 10.1109/CloudCom.2012.6427566
Tiresias: Black-Box Failure Prediction in Distributed Systems, 2007 IEEE International Parallel and Distributed Processing Symposium, pp.1-8, 2007. ,
DOI : 10.1109/IPDPS.2007.370345
Detecting large-scale system problems by mining console logs, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP '09, pp.117-132, 2009. ,
DOI : 10.1145/1629575.1629587
Random-Forests-Based Network Intrusion Detection Systems, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol.38, issue.5, pp.649-659, 2008. ,
DOI : 10.1109/TSMCC.2008.923876
eCAD: Cloud Anomalies Detection From an Evolutionary View, 2013 International Conference on Cloud Computing and Big Data, pp.328-334, 2013. ,
DOI : 10.1109/CLOUDCOM-ASIA.2013.57