. Mongodb, , 2016.

E. Aleskerov, B. Freisleben, and B. Rao, CARDWATCH: a neural network based database mining system for credit card fraud detection, Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr), pp.220-226, 1997.
DOI : 10.1109/CIFER.1997.618940

A. Avizienis, J. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004.
DOI : 10.1109/TDSC.2004.2

URL : http://drum.lib.umd.edu/bitstream/1903/6459/1/TR_2004-47.pdf

J. L. Berral, I. N. Goiri, R. Nou, F. Julì-a, J. Guitart et al., Towards energy-aware scheduling in data centers using machine learning, Proceedings of the 1st International Conference on Energy-Efficient Computing and Networking, e-Energy '10, pp.215-224, 2010.
DOI : 10.1145/1791314.1791349

A. H. Bhat, S. Patra, and D. Jena, Machine learning approach for intrusion detection on cloud virtual machines, International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol.2, issue.6, pp.56-66, 2013.

P. Bodík, R. Griffith, C. Sutton, A. Fox, M. Jordan et al., Statistical machine learning makes automatic control practical for internet datacenters, Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud'09

A. P. Bradley, The use of the area under the ROC curve in the evaluation of machine learning algorithms, Pattern Recognition, vol.30, issue.7, pp.1145-1159, 1997.
DOI : 10.1016/S0031-3203(96)00142-2

L. Cao, P. Sharma, S. Fahmy, and V. Saxena, Nfv-vital: A framework for characterizing the performance of virtual network functions, Network Function Virtualization and Software Defined Network 2015 IEEE Conference on, pp.93-99, 2015.

G. Carrozza, D. Cotroneo, and S. Russo, Software Faults Diagnosis in Complex OTS Based Safety Critical Systems, 2008 Seventh European Dependable Computing Conference, pp.25-34, 1109.
DOI : 10.1109/EDCC-7.2008.26

S. Cerf, M. Berekmeri, B. Robu, N. Marchand, and S. Bouchenak, Cost function based event triggered Model Predictive Controllers application to Big Data Cloud services, 2016 IEEE 55th Conference on Decision and Control (CDC), 2016.
DOI : 10.1109/CDC.2016.7798503

URL : https://hal.archives-ouvertes.fr/hal-01348687

J. S. Chase, D. C. Anderson, P. N. Thakar, A. M. Vahdat, and R. P. Doyle, Managing energy and server resources in hosting centers, ACM SIGOPS Operating Systems Review, vol.35, issue.5, pp.103-116, 2001.
DOI : 10.1145/502059.502045

URL : http://www.cs.pitt.edu/~melhem/courses/3530/papers/pm3.pdf

L. Cherkasova, K. Ozonat, N. Mi, J. Symons, and E. Smirni, Automated anomaly detection and performance modeling of enterprise applications, ACM Transactions on Computer Systems, vol.27, issue.3, pp.1-6, 2009.
DOI : 10.1145/1629087.1629089

I. Cohen, M. Goldszmidt, T. Kelly, J. Symons, and J. S. Chase, Correlating instrumentation data to system states: a building block for automated diagnosis and control, Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation -Volume USENIX Association. URL http, pp.16-16, 2004.

B. F. Cooper, A. Silberstein, E. Tam, R. Ramakrishnan, and R. Sears, Benchmarking cloud serving systems with YCSB, Proceedings of the 1st ACM symposium on Cloud computing, SoCC '10, pp.143-154, 2010.
DOI : 10.1145/1807128.1807152

D. Cotroneo, L. D. Simone, and R. Natella, NFV-Bench: A Dependability Benchmark for Network Function Virtualization Systems, IEEE Transactions on Network and Service Management, vol.14, issue.4
DOI : 10.1109/TNSM.2017.2733042

J. Davis and M. Goadrich, The relationship between Precision-Recall and ROC curves, Proceedings of the 23rd international conference on Machine learning , ICML '06, pp.233-240, 2006.
DOI : 10.1145/1143844.1143874

URL : https://minds.wisconsin.edu/bitstream/1793/60482/1/TR1551.pdf

J. Dean, H. Nguyen, and X. Gu, UBL, Proceedings of the 9th international conference on Autonomic computing, ICAC '12, pp.191-200
DOI : 10.1145/2371536.2371572

D. J. Dean, H. Nguyen, P. Wang, and X. Gu, Perfcompass: Toward runtime performance anomaly fault localization for infrastructure-as-a-service clouds, 6th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 14), 2014.
DOI : 10.1109/tpds.2015.2444392

D. Denning, An intrusion-detection model, IEEE Transactions on Software Engineering, issue.2, pp.13222-232, 1987.

S. Duan, S. Babu, and K. Munagala, Fa: A System for Automating Failure Diagnosis, 2009 IEEE 25th International Conference on Data Engineering, pp.1012-1023, 2009.
DOI : 10.1109/ICDE.2009.115

E. , Technical report 103 125 v1.1.1. cloud; slas for cloud services, 2012.

M. Farshchi, J. G. Schneider, I. Weber, and J. Grundy, Experience report: Anomaly detection of cloud application operations using log and cloud metric correlation analysis, 2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE), pp.24-34, 2015.
DOI : 10.1109/ISSRE.2015.7381796

M. Gander, M. Felderer, B. Katt, A. Tolbaru, R. Breu et al., Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning, pp.103-116, 2013.
DOI : 10.1007/978-3-642-45260-4_8

Z. Gong, X. Gu, and J. Wilkes, Press: Predictive elastic resource scaling for cloud systems, 2010 International Conference on Network and Service Management, pp.9-16, 2010.

Z. Gong, X. Gu, and J. Wilkes, Press: Predictive elastic resource scaling for cloud systems, 2010 International Conference on Network and Service Management, pp.9-16, 2010.

Q. Guan and S. Fu, Adaptive Anomaly Identification by Exploring Metric Subspace in Cloud Computing Infrastructures, 2013 IEEE 32nd International Symposium on Reliable Distributed Systems, pp.205-214, 2013.
DOI : 10.1109/SRDS.2013.29

Q. Guan, C. Chiu, Z. Zhang, and S. Fu, Efficient and Accurate Anomaly Identification Using Reduced Metric Space in Utility Clouds, 2012 IEEE Seventh International Conference on Networking, Architecture, and Storage, pp.207-216, 2012.
DOI : 10.1109/NAS.2012.30

Q. Guan, Z. Zhang, and S. Fu, Ensemble of Bayesian Predictors and Decision Trees for Proactive Failure Management in Cloud Computing Systems, Journal of Communications, vol.7, issue.1, pp.52-61, 2012.
DOI : 10.4304/jcm.7.1.52-61

. Heberlein, Network security monitor (nsm)?final report, 1995.

H. Kang, H. Chen, and G. Jiang, PeerWatch, Proceeding of the 7th international conference on Autonomic computing, ICAC '10, pp.119-128, 2010.
DOI : 10.1145/1809049.1809070

H. Kang, X. Zhu, and J. L. Wong, Dapa: Diagnosing application performance anomalies for virtualized infrastruc- tures, Presented as part of the 2nd USENIX Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services

K. Kanoun and L. Spainhower, Dependability Benchmarking for Computer Systems, 2008.
DOI : 10.1002/9780470370506

URL : https://hal.archives-ouvertes.fr/hal-01961204

S. Kundu, R. Rangaswami, A. Gulati, M. Zhao, and K. Dutta, Modeling virtualized applications using machine learning techniques, ACM SIGPLAN Notices, vol.47, issue.7, pp.3-14
DOI : 10.1145/2365864.2151028

A. Lakhina, M. Crovella, and C. Diot, Diagnosing network-wide traffic anomalies, Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '04, pp.219-230, 2004.

Y. Lecun, I. Kanter, and S. A. Solla, Second order properties of error surfaces: Learning time and generalization, Advances in Neural Information Processing Systems, pp.918-924, 1991.

W. Lee and D. Xiang, Information-theoretic measures for anomaly detection, Security and Privacy Proceedings. 2001 IEEE Symposium on, pp.130-143, 2001.

W. Lee, S. Stolfo, and K. Mok, A data mining framework for building intrusion detection models, Security and Privacy Proceedings of the 1999 IEEE Symposium on, pp.120-132, 1999.

K. Leung and C. Leckie, Unsupervised anomaly detection in network intrusion detection using clusters, Proceedings of the Twenty-eighth Australasian Conference on Computer Science, pp.333-342, 2005.

Y. Liang, Y. Zhang, M. Jette, A. Sivasubramaniam, and R. Sahoo, Bluegene/l failure analysis and prediction models, Dependable Systems and Networks, 2006. DSN 2006. International Conference on, pp.425-434, 2006.

Y. Liang, Y. Zhang, H. Xiong, and R. Sahoo, Failure Prediction in IBM BlueGene/L Event Logs, Seventh IEEE International Conference on Data Mining (ICDM 2007), pp.583-588, 2007.
DOI : 10.1109/ICDM.2007.46

M. L. Massie, B. N. Chun, and D. E. Culler, The ganglia distributed monitoring system: design, implementation, and experience, Parallel Computing, vol.30, issue.7, 2003.
DOI : 10.1016/j.parco.2004.04.001

A. Matsunaga and J. A. Fortes, On the Use of Machine Learning to Predict the Time and Resources Consumed by Applications, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp.495-504, 2010.
DOI : 10.1109/CCGRID.2010.98

J. , Unsupervised network anomaly detection, 2011.

D. J. Michie, C. C. Spiegelhalter, J. Taylor, and . Campbell, Machine Learning, Neural and Statistical Classification, 1994.

M. Miyazawa, M. Hayashi, and R. Stadler, vNMF: Distributed fault detection using clustering approach for network function virtualization, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp.640-645, 2015.
DOI : 10.1109/INM.2015.7140349

L. Mukherjee, K. Heberlein, and . Levitt, Network intrusion detection, IEEE Network, vol.8, issue.3, pp.26-41, 1994.
DOI : 10.1109/65.283931

H. Nguyen, Z. Shen, Y. Tan, and X. Gu, FChain: Toward Black-Box Online Fault Localization for Cloud Systems, 2013 IEEE 33rd International Conference on Distributed Computing Systems, pp.21-30, 2013.
DOI : 10.1109/ICDCS.2013.26

T. Niwa, M. Miyazawa, M. Hayashi, and R. Stadler, Universal fault detection for NFV using SOM-based clustering, 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp.315-320, 2015.
DOI : 10.1109/APNOMS.2015.7275446

D. Pop, Machine learning and cloud computing: Survey of distributed and saas solutions

F. Salfner and M. Malek, Using Hidden Semi-Markov Models for Effective Online Failure Prediction, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007), pp.161-174, 2007.
DOI : 10.1109/SRDS.2007.35

C. Sauvanaud, G. Silvestre, M. Kaâniche, and K. Kanoun, Data Stream Clustering for Online Anomaly Detection in Cloud Applications URL https, 11th European Dependable Computing Conference (EDCC 2015), 2015.

C. Sauvanaud, G. Silvestre, M. Kaâniche, and K. Kanoun, Data Stream Clustering for Online Anomaly Detection in Cloud Applications URL https, 11th European Dependable Computing Conference (EDCC 2015), 2015.

C. Sauvanaud, K. Lazri, M. Kaâniche, and K. Kanoun, Anomaly Detection and Root Cause Localization in Virtual Network Functions, 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), pp.196-206, 2016.
DOI : 10.1109/ISSRE.2016.32

URL : https://hal.archives-ouvertes.fr/hal-01419014

G. Silvestre, C. Sauvanaud, M. Kaâniche, and K. Kanoun, An anomaly detection approach for scale-out storage systems URL https, 26th International Symposium on Computer Architecture and High Performance Computing, 2014.

G. Silvestre, D. Buffoni, K. Pires, S. Monnet, and P. Sens, Boosting Streaming Video Delivery with WiseReplica, Transactions on Large-Scale Data-and Knowledge-Centered Systems XX, pp.34-58, 2015.
DOI : 10.1007/978-3-662-46703-9_2

URL : https://hal.archives-ouvertes.fr/hal-01198678

G. Silvestre, C. Sauvanaud, M. Kaâniche, and K. Kanoun, Tejo: A Supervised Anomaly Detection Scheme for NewSQL Databases, 7th International Workshop on Software Engineering for Resilient Systems, 2015.
DOI : 10.1007/978-3-319-23129-7_9

URL : https://hal.archives-ouvertes.fr/hal-01211772

C. Simache and M. Kaâniche, Measurement-based availability analysis of Unix systems in a distributed environment, Proceedings 12th International Symposium on Software Reliability Engineering, pp.346-355, 2001.
DOI : 10.1109/ISSRE.2001.989489

URL : https://hal.archives-ouvertes.fr/hal-00852425

M. Simache, A. Kaâniche, and . Saidane, Event log based dependability analysis of Windows NT and 2K systems, 2002 Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings., 2002.
DOI : 10.1109/PRDC.2002.1185651

URL : https://hal.archives-ouvertes.fr/hal-01911680

Y. Tan, X. Gu, and H. Wang, Adaptive system anomaly prediction for large-scale hosting infrastructures, Proceeding of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing, PODC '10, pp.173-182, 2010.
DOI : 10.1145/1835698.1835741

Y. Tan, H. Nguyen, Z. Shen, X. Gu, C. Venkatramani et al., PREPARE: Predictive Performance Anomaly Prevention for Virtualized Cloud Systems, 2012 IEEE 32nd International Conference on Distributed Computing Systems, pp.285-294, 2012.
DOI : 10.1109/ICDCS.2012.65

J. Van-hulse, T. M. Khoshgoftaar, and A. Napolitano, Experimental perspectives on learning from imbalanced data, Proceedings of the 24th international conference on Machine learning, ICML '07, pp.935-942, 2007.
DOI : 10.1145/1273496.1273614

C. Wang, V. Talwar, K. Schwan, and P. Ranganathan, Online detection of utility cloud anomalies using metric distributions, IEEE Network Operations and Management Symposium -NOMS 2010, pp.96-103, 2010.

H. Watanabe, M. Otsuka, S. Sonoda, Y. Kikuchi, and . Matsumoto, Online failure prediction in cloud datacenters by real-time message pattern learning, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, pp.504-511, 2012.
DOI : 10.1109/CloudCom.2012.6427566

A. W. Williams, S. M. Pertet, and P. Narasimhan, Tiresias: Black-Box Failure Prediction in Distributed Systems, 2007 IEEE International Parallel and Distributed Processing Symposium, pp.1-8, 2007.
DOI : 10.1109/IPDPS.2007.370345

W. Xu, L. Huang, A. Fox, D. Patterson, and M. I. Jordan, Detecting large-scale system problems by mining console logs, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP '09, pp.117-132, 2009.
DOI : 10.1145/1629575.1629587

J. Zhang, M. Zulkernine, and A. Haque, Random-Forests-Based Network Intrusion Detection Systems, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol.38, issue.5, pp.649-659, 2008.
DOI : 10.1109/TSMCC.2008.923876

Y. Zhang, B. Hong, M. Zhang, B. Deng, and W. Lin, eCAD: Cloud Anomalies Detection From an Evolutionary View, 2013 International Conference on Cloud Computing and Big Data, pp.328-334, 2013.
DOI : 10.1109/CLOUDCOM-ASIA.2013.57