View on GitHub

TraceBench

An open data set for trace-oriented monitoring

Applications

In this section, we give a table listing the existed techniques that can be or cannot be supported by TraceBench. The items in column "Can use TraceBench" contains:
• "yes": We have validated that this technique can use TraceBench
• "no": We are sure this technique cannot use TraceBench, due to the lack of required information
• "maybe": We consider this technique can use TraceBench, however we have not validated this

TechniqueCategoryCan use TraceBench?
Synoptic [1]Temporal invariants miningyes
Synoptic [2]Model inferencemaybe
Perfume [3]Model inferencemaybe
Ref. [4]Performance problems diagnosisyes
Ref. [5]Performance problems diagnosisyes
CloudStack [6]Performance problems diagnosisyes
Spectroscope [7]Performance problems diagnosisno
Pip [8]Func. & perf. problems diagnosisno
The Mystery Machine [9]Model inferencemaybe
Magnify [10]Performance problems diagnosisyes
Magpie [11]Workload modellingmaybe
NetCheck [12]Anomaly detectionno
AppInsight [13]Performance problems diagnosisno
Ref. [14]Anomaly detectionno
Ref. [15]Model inferenceno
Ref. [16]Anomaly detectionyes
CSight [17]Model inferencemaybe
Distalyzer [18]Performance problems diagnosismaybe
InvariMint [19]Model inferencemaybe
Ref. [20]Model inferencemaybe
lprof [21]Request Flow Profilermaybe
MOP [22]Runtime verificationmaybe
Ref. [23]Performance problems diagnosismaybe
Ref. [24]Anomaly detectionmaybe
Ref. [25]Anomaly detectionmaybe
To be continued

[1] I. Beschastnikh, Y. Brun, M.D. Ernst, A. Krishnamurthy, and T.E. Anderson, "Mining temporal invariants from partially ordered logs," FSE 2011, pp. 448-451. ACM Association2011.
[2] I. Beschastnikh, J. Abrahamson, Y. Brun, and M. D. Ernst, "Synoptic: Studying Logged Behavior with Inferred Models,"
[3] T. Ohmann, M. Herzberg, S. Fiss, A. Halbert, M. Palyart, I. Beschastnikh, and Y. Brun, "Behavioral resource-aware model inference," ASE 2014, pp. 19-30. ACM Association, 2014.
[4] H. Mi, H. Wang, G. Yin, H. Cai, Q. Zhou, and T. Sun, "Performance problems diagnosis in cloud computing systems by mining request trace logs," NOMS 2012, pp. 893-899. IEEE Computer Society, 2012.
[5] H. Mi, H. Wang, Y. Zhou, M.R. Lyu, and H. Cai, "Localizing root causes of performance anomalies in cloud computing systems by analyzing request trace logs," Science China: Information Science, vol. 55, no. 12, pp. 2757-2773, 2012.
[6] H. Mi, H. Wang, Y. Zhou, M.R. Lyu, and H. Cai, "Toward fine grained, unsupervised, scalable performance diagnosis for production cloud computing systems," IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 6, pp. 1245-1255, 2013.
[7] R.R. Sambasivan, A.X. Zheng, M.D. Rosa, E. Krevat, S. Whitman, M. Stroucken, W. Wang, L. Xu, and G.R. Ganger, "Diagnosing performance changes by comparing request flows," NSDI 2011, pp. 43-56. USENIX Association, 2011.
[8] P. Reynolds, C.E. Killian, J.L. Wiener, J.C. Mogul, M.A. Shah, and A. Vahdat, "Pip: Detecting the unexpected in distributed systems," NSDI 2006, pp. 115-128. USENIX Association, 2006.
[9] M. Chow, D. Meisner, J. Flinn, D. Peek, and T.F. Wenisch, "The Mystery Machine: End-to-end performance analysis of large-scale Internet services," OSDI 2014, pp. 217-231. USENIX Association, 2014.
[10] H. Mi, H. Wang, G. Yin, H. Cai, Q. Zhou, T. Sun, and Y. Zhou, "Magnifier: Online Detection of Performance Problems in Large-Scale Cloud Computing Systems," SCC 2011, pp. 418--425. IEEE Computer Society, 2011.
[11] P. Barham, A. Donnelly, R. Isaacs, and R. Mortier, "Using Magpiefor request extraction and workload modelling," OSDI 2004), pp. 259-272. USENIX Association, 2004.
[12] Y. Zhuang, E. Gessiou, S. Portzer, F. Fund, M. Muhammad, I. Beschastnikh, and J. Cappos, "NetCheck: Network diagnoses from blackbox traces," NSDI 2014, pp. 115-128. USENIX Association, 2014.
[13] L.R. Sivalingam, J. Padhye, S. Agarwal, R. Mahajan, I. Obermiller, and S. Sayandeh, "AppInsight: Mobile app performance monitoring in the wild," OSDI*12, pp. 107-120. USENIX Association, 2012.
[14] W. Eberle and L. B. Holder, "Discovering structural anomalies in graph-based data," ICDMW 2007, 2007.
[15] R. Jin, C. Wang, D. Polshakov, S. Parthasarathy, and G. Agrawal, "Discovering frequent topological structures from graph datasets," KDD 2005, 2005.
[16] J. Zhou, Z. Chen, J. Wang, Z. Zheng, and W. Dong, "A runtime verification based trace-oriented monitoring framework for cloud systems," ISSREW 2014, pp. 152-155. IEEE Computer Society, 2014.
[17] I. Beschastnikh, Y. Brun, M. D. Ernst, A. Krishnamurthy, and T. E. Anderson, "Inferring Models of Concurrent Systems from Logs of Their Behavior with CSight," ICSE 2014, pp. 468-479. ACM Association 2014.
[18] K. Nagaraj, C. Killian, and J. Neville, "Structured Comparative Analysis of Systems Logs to Diagnose Performance Problems," NSDI 2012, pp. 353-366. USENIX Association, 2012.
[19] I. Beschastnikh, Y. Brun, J. Abrahamson, M. D. Ernst, and A. Krishnamurthy, "Unifying FSM-Inference Algorithms through Declarative Specification," ICSE 2013, pp. 252-261. 2013.
[20] I. Krka, Y. Brun, and N. Medvidovic, "Automatic Mining of Specifications from Invocation Traces and Method Invariants," FSE 2014. ACM Association, 2014.
[21] X. Zhao, Y. Zhang, D. Lion, M. FaizanUllah, Y. Luo, D. Yuan, and M. Stumm, "lprof : A Non-intrusive Request Flow Profiler for Distributed Systems," OSDI 2014, pp. 629-644. USENIX Association, 2014.
[22] P.O. Meredith, D. Jin, D. Griffith, F. Chen, and G. Rosu, "An overview of the MOP runtime verification framework,§ International Journal on Software Tools for Technology Transfer, vol. 14, no. 3, pp. 249-289, 2012.
[23] F. Ryckbosch and A. Diwan, "Analyzing performance traces using temporal formulas," Software: Practice and Experience, 2014.
[24] C.Y. Chiu, C.T. Yeh, and Y.J. Lee, "Frequent Pattern based User Behavior Anomaly Detection for Cloud System," TAAI 2013, pp. 61-66. IEEE Computer Society, 2013.
[25] J.G. Lou, Q. Fu, S. Yang, Y. Xu, and J. Li, "Mining Invariants from Console Logs for System Problem Detection," Annual Technical Conference. USENIX Association, 2010.