Characterizing Direct Monitoring Techniques in Software Systems

作者: Marcello Cinque , Domenico Cotroneo , Raffaele Della Corte , Antonio Pecchia

DOI: 10.1109/TR.2016.2570564

关键词:

摘要: Monitoring is a consolidated practice to characterize the dependability behavior of software system. A variety techniques, such as event logging and operating system probes, are currently used generate monitoring data for troubleshooting failure analysis. In spite importance monitoring, whose role can be essential in critical systems, there lack studies addressing assessment comparison techniques aiming monitor occurrence failures during operations. This paper proposes method implemented The based on fault injection approach allows measuring 1) precision recall technique 2) dissimilarity it generates upon failures. has been two systems implementing logging, assertion checking, source code instrumentation techniques. We analyzed total 3 844 With respect our data, we observed that effectiveness strongly affected by type failure, combination different potentially beneficial increase overall reporting ability. More important, analysis revealed number practical implications taken into account when developing technique.

参考文章(41)
Bryan M. Cantrill, Adam H. Leventhal, Michael W. Shapiro, Dynamic instrumentation of production systems usenix annual technical conference. pp. 2- 2 ,(2004)
Stephen E. Hansen, E. Todd Atkins, Automated System Monitoring and Notification With Swatch usenix large installation systems administration conference. pp. 145- 152 ,(1993)
Christian Colombo, Ruth Mizzi, Gordon J. Pace, SMock — A Test Platform for Monitoring Tools runtime verification. pp. 352- 357 ,(2013) , 10.1007/978-3-642-40787-1_24
C. Simache, M. Kaaniche, Availability assessment of SunOS/Solaris Unix systems based on syslogd and wtmpx log files: A case study pacific rim international symposium on dependable computing. pp. 49- 56 ,(2005) , 10.1109/PRDC.2005.20
A.K. Mok, Guangtian Liu, Efficient Run-time Monitoring Of Timing Constraints real time technology and applications symposium. pp. 252- 262 ,(1997) , 10.1109/RTTAS.1997.601363
C. Lonvick, The BSD Syslog Protocol RFC. ,vol. 3164, pp. 1- 29 ,(2001)
Michael W. Berry, Zlatko Drmac, Elizabeth R. Jessup, Matrices, Vector Spaces, and Information Retrieval SIAM Review. ,vol. 41, pp. 335- 362 ,(1999) , 10.1137/S0036144598347035
Chinghway Lim, Navjot Singh, Shalini Yajnik, A log mining approach to failure analysis of enterprise telephony systems dependable systems and networks. pp. 398- 403 ,(2008) , 10.1109/DSN.2008.4630109
Joao A. Duraes, Henrique S. Madeira, Emulation of Software Faults: A Field Data Study and a Practical Approach IEEE Transactions on Software Engineering. ,vol. 32, pp. 849- 867 ,(2006) , 10.1109/TSE.2006.113
Detlef Bartetzko, Clemens Fischer, Michael Möller, Heike Wehrheim, Jass — Java with Assertions1 1This work was partially funded by the German Research Council (DFG) under grant OL 98/3-1. Electronic Notes in Theoretical Computer Science. ,vol. 55, pp. 103- 117 ,(2001) , 10.1016/S1571-0661(04)00247-6