Applications
In this section, we give a table listing the existed techniques that can be or cannot be supported by TraceBench. The items in column "Can use TraceBench" contains:
• "yes": We have validated that this technique can use TraceBench
• "no": We are sure this technique cannot use TraceBench, due to the lack of required information
• "maybe": We consider this technique can use TraceBench, however we have not validated this
Technique | Category | Can use TraceBench? |
---|---|---|
Synoptic [1] | Temporal invariants mining | yes |
Synoptic [2] | Model inference | maybe |
Perfume [3] | Model inference | maybe |
Ref. [4] | Performance problems diagnosis | yes |
Ref. [5] | Performance problems diagnosis | yes |
CloudStack [6] | Performance problems diagnosis | yes |
Spectroscope [7] | Performance problems diagnosis | no |
Pip [8] | Func. & perf. problems diagnosis | no |
The Mystery Machine [9] | Model inference | maybe |
Magnify [10] | Performance problems diagnosis | yes |
Magpie [11] | Workload modelling | maybe |
NetCheck [12] | Anomaly detection | no |
AppInsight [13] | Performance problems diagnosis | no |
Ref. [14] | Anomaly detection | no |
Ref. [15] | Model inference | no |
Ref. [16] | Anomaly detection | yes |
CSight [17] | Model inference | maybe |
Distalyzer [18] | Performance problems diagnosis | maybe |
InvariMint [19] | Model inference | maybe |
Ref. [20] | Model inference | maybe |
lprof [21] | Request Flow Profiler | maybe |
MOP [22] | Runtime verification | maybe |
Ref. [23] | Performance problems diagnosis | maybe |
Ref. [24] | Anomaly detection | maybe |
Ref. [25] | Anomaly detection | maybe |
To be continued |
[1] I. Beschastnikh, Y. Brun, M.D. Ernst, A. Krishnamurthy, and T.E. Anderson, "Mining temporal invariants from partially ordered logs," FSE 2011, pp. 448-451. ACM Association2011.
[2] I. Beschastnikh, J. Abrahamson, Y. Brun, and M. D. Ernst, "Synoptic: Studying Logged Behavior with Inferred Models,"
[3] T. Ohmann, M. Herzberg, S. Fiss, A. Halbert, M. Palyart, I. Beschastnikh, and Y. Brun, "Behavioral resource-aware model inference," ASE 2014, pp. 19-30. ACM Association, 2014.
[4] H. Mi, H. Wang, G. Yin, H. Cai, Q. Zhou, and T. Sun, "Performance problems diagnosis in cloud computing systems by mining request trace logs," NOMS 2012, pp. 893-899. IEEE Computer Society, 2012.
[5] H. Mi, H. Wang, Y. Zhou, M.R. Lyu, and H. Cai, "Localizing root causes of performance anomalies in cloud computing systems by analyzing request trace logs," Science China: Information Science, vol. 55, no. 12, pp. 2757-2773, 2012.
[6] H. Mi, H. Wang, Y. Zhou, M.R. Lyu, and H. Cai, "Toward fine grained, unsupervised, scalable performance diagnosis for production cloud computing systems," IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 6, pp. 1245-1255, 2013.
[7] R.R. Sambasivan, A.X. Zheng, M.D. Rosa, E. Krevat, S. Whitman, M. Stroucken, W. Wang, L. Xu, and G.R. Ganger, "Diagnosing performance changes by comparing request flows," NSDI 2011, pp. 43-56. USENIX Association, 2011.
[8] P. Reynolds, C.E. Killian, J.L. Wiener, J.C. Mogul, M.A. Shah, and A. Vahdat, "Pip: Detecting the unexpected in distributed systems," NSDI 2006, pp. 115-128. USENIX Association, 2006.
[9] M. Chow, D. Meisner, J. Flinn, D. Peek, and T.F. Wenisch, "The Mystery Machine: End-to-end performance analysis of large-scale Internet services," OSDI 2014, pp. 217-231. USENIX Association, 2014.
[10] H. Mi, H. Wang, G. Yin, H. Cai, Q. Zhou, T. Sun, and Y. Zhou, "Magnifier: Online Detection of Performance Problems in Large-Scale Cloud Computing Systems," SCC 2011, pp. 418--425. IEEE Computer Society, 2011.
[11] P. Barham, A. Donnelly, R. Isaacs, and R. Mortier, "Using Magpiefor request extraction and workload modelling," OSDI 2004), pp. 259-272. USENIX Association, 2004.
[12] Y. Zhuang, E. Gessiou, S. Portzer, F. Fund, M. Muhammad, I. Beschastnikh, and J. Cappos, "NetCheck: Network diagnoses from blackbox traces," NSDI 2014, pp. 115-128. USENIX Association, 2014.
[13] L.R. Sivalingam, J. Padhye, S. Agarwal, R. Mahajan, I. Obermiller, and S. Sayandeh, "AppInsight: Mobile app performance monitoring in the wild," OSDI*12, pp. 107-120. USENIX Association, 2012.
[14] W. Eberle and L. B. Holder, "Discovering structural anomalies in graph-based data," ICDMW 2007, 2007.
[15] R. Jin, C. Wang, D. Polshakov, S. Parthasarathy, and G. Agrawal, "Discovering frequent topological structures from graph datasets," KDD 2005, 2005.
[16] J. Zhou, Z. Chen, J. Wang, Z. Zheng, and W. Dong, "A runtime verification based trace-oriented monitoring framework for cloud systems," ISSREW 2014, pp. 152-155. IEEE Computer Society, 2014.
[17] I. Beschastnikh, Y. Brun, M. D. Ernst, A. Krishnamurthy, and T. E. Anderson, "Inferring Models of Concurrent Systems from Logs of Their Behavior with CSight," ICSE 2014, pp. 468-479. ACM Association 2014.
[18] K. Nagaraj, C. Killian, and J. Neville, "Structured Comparative Analysis of Systems Logs to Diagnose Performance Problems," NSDI 2012, pp. 353-366. USENIX Association, 2012.
[19] I. Beschastnikh, Y. Brun, J. Abrahamson, M. D. Ernst, and A. Krishnamurthy, "Unifying FSM-Inference Algorithms through Declarative Specification," ICSE 2013, pp. 252-261. 2013.
[20] I. Krka, Y. Brun, and N. Medvidovic, "Automatic Mining of Specifications from Invocation Traces and Method Invariants," FSE 2014. ACM Association, 2014.
[21] X. Zhao, Y. Zhang, D. Lion, M. FaizanUllah, Y. Luo, D. Yuan, and M. Stumm, "lprof : A Non-intrusive Request Flow Profiler for Distributed Systems," OSDI 2014, pp. 629-644. USENIX Association, 2014.
[22] P.O. Meredith, D. Jin, D. Griffith, F. Chen, and G. Rosu, "An overview of the MOP runtime verification framework,§ International Journal on Software Tools for Technology Transfer, vol. 14, no. 3, pp. 249-289, 2012.
[23] F. Ryckbosch and A. Diwan, "Analyzing performance traces using temporal formulas," Software: Practice and Experience, 2014.
[24] C.Y. Chiu, C.T. Yeh, and Y.J. Lee, "Frequent Pattern based User Behavior Anomaly Detection for Cloud System," TAAI 2013, pp. 61-66. IEEE Computer Society, 2013.
[25] J.G. Lou, Q. Fu, S. Yang, Y. Xu, and J. Li, "Mining Invariants from Console Logs for System Problem Detection," Annual Technical Conference. USENIX Association, 2010.