[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1890912.1890915acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
research-article

EVEREST+: run-time SLA violations prediction

Published: 29 November 2010 Publication History

Abstract

Monitoring the preservation of QoS properties during the operation of service-based systems at run-time is an important verification measure for checking if the current service usage is compliant with agreed SLAs. Monitoring, however, does not always provide sufficient scope for taking control actions against violations as it only detects violations after they occur.
In this paper we describe a model-based prediction framework, EVEREST+, for both QoS predictors development and execution. EVEREST+ was designed to provide a framework for developing in an easy and fast way QoS predictors only focusing on their prediction algorithms implementation without the need for caring about how to collect or retrieve historical data or how to infer models out of collected data. It also provides a run-time environment for executing QoS predictors and storing their predictions.

References

[1]
Duc B. L., P., Châtel Rivierre N., Malenfant J., Collet P., Truck I.: Non-functional data collection for adaptive business processes and decision-making. In Proceedings of the 4th MWSOC. ACM, 2009.
[2]
Garg S. Garg, A. V. Moorsel A. V., K. Vaidyanathan K., and Trivedi K.: A methodology for detection and estimation of software aging. ISSRE, 0:283, 1998.
[3]
Iyer R. K. Iyer and Rossetti D. J.: Effect of system workload on operating system reliability: A study on ibm 3081. IEEE Trans. Softw. Eng., 1985.
[4]
Iyer R. K., Young L. T., and Iyer P. K.: Automatic Recognition of Intermittent Failures: An Experimental Study of Field Data. IEEE Trans. Comput. 39, 4, 1990.
[5]
Kowalski R. and Sergot M.: A logic-based calculus of events. New Gen. Comput., 4(1):67--95, 1986.
[6]
Lee B-D, Schopf J M.: Run-Time Prediction of Parallel Applications on Shared Environments, Cluster Computing, IEEE International Conference on, p. 487, Fifth IEEE International Conference CLUSTER, 2003.
[7]
Leitner P., Wetzstein B., Rosenberg F., Michlmayr A., Dustdar S. and Leymann F.: Runtime Prediction of Service Level Agreement Violations for Composite Services. The 3rd Workshop NFPSLAM-SOC, 2009.
[8]
Lorenzoli D. and Spanoudakis G.: Detection of security and dependability threats: A belief based reasoning approach. SECURWARE, 0:312--320, 2009.
[9]
Mahbub K. Spanoudakis G.: Monitoring WS Agreements: An Event Calculus Based Approach, Test and Analysis of Service Oriented Systems, (eds) L. Baresi, E. diNitto, Springer- Verlang, 2007
[10]
Michlmayr A., Rosemberg F., Leitner P., and Dustdar S.: End-to-end support for QoS-aware service selection, invocation and mediation in VRESCo. Technical report, Vienna University of Technology, 2009.
[11]
Michlmayr A., Rosenberg F., Leitner P., and Dustdar A.: Comprehensive QoS monitoring of Web services and event-based SLA violation detection. In Proceedings of the 4th MWSOC. ACM, 2009.
[12]
Sahai A., Machiraju V., Sayal M., Moorsel A. P., and Casati F.: Automated SLA Monitoring for Web Services. In Proceedings of the 13th IFIP/IEEE international Workshop on Distributed Systems, 2002.
[13]
Salfner F., Schieschke M., and Malek M.: Predicting failures of computer systems: a case study for a telecommunication system. IPDPS, 0:415, 2006.
[14]
Thio N., Karunasekera S. Automatic measurement of a Qos metric for Web Services. In proc. of ASWEC, 2005.
[15]
Tsigkritis T., Spanoudakis G., and Lorenzoli D.: Diagnosis and Threat Detection Capabilities of the SERENITY Monitoring Framework,. cChapter 14, pages 239--271. Advances in Information Security. Springer US, 2009.

Cited By

View all
  • (2025)Service Selection under UncertaintyComputers & Operations Research10.1016/j.cor.2024.106847173(106847)Online publication date: Jan-2025
  • (2017)Manifold learning in SLA violation detection and prediction for cloud-based systemProceedings of the Second International Conference on Internet of things, Data and Cloud Computing10.1145/3018896.3056800(1-5)Online publication date: 22-Mar-2017
  • (2015)Coverage-Based Testing for Service Level AgreementsIEEE Transactions on Services Computing10.1109/TSC.2014.23004868:2(299-313)Online publication date: Mar-2015
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
MW4SOC '10: Proceedings of the 5th International Workshop on Middleware for Service Oriented Computing
November 2010
47 pages
ISBN:9781450304528
DOI:10.1145/1890912
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Professional
  • USENIX Assoc: USENIX Assoc
  • IFIP

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 November 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. prediction framework
  2. run-time QoS prediction

Qualifiers

  • Research-article

Funding Sources

Conference

Middleware '10
Sponsor:
  • USENIX Assoc
Middleware '10: 11th International Middleware Conference
November 29 - December 3, 2010
Bangalore, India

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2025)Service Selection under UncertaintyComputers & Operations Research10.1016/j.cor.2024.106847173(106847)Online publication date: Jan-2025
  • (2017)Manifold learning in SLA violation detection and prediction for cloud-based systemProceedings of the Second International Conference on Internet of things, Data and Cloud Computing10.1145/3018896.3056800(1-5)Online publication date: 22-Mar-2017
  • (2015)Coverage-Based Testing for Service Level AgreementsIEEE Transactions on Services Computing10.1109/TSC.2014.23004868:2(299-313)Online publication date: Mar-2015
  • (2015)Improving Tenants' Trust in SaaS Applications Using Dynamic Security MonitorsProceedings of the 2015 20th International Conference on Engineering of Complex Computer Systems (ICECCS)10.1109/ICECCS.2015.18(70-79)Online publication date: 9-Dec-2015
  • (2015)Towards the Integration of Security Transparency in the Modelling and Design of Cloud Based SystemsAdvanced Information Systems Engineering Workshops10.1007/978-3-319-19243-7_45(495-506)Online publication date: 27-May-2015
  • (2013)Support Vector regression for Service Level Agreement violation prediction2013 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)10.1109/IC3INA.2013.6819192(307-311)Online publication date: Nov-2013
  • (2012)Towards performance isolation in multi-tenant SaaS applicationsProceedings of the 7th Workshop on Middleware for Next Generation Internet Computing10.1145/2405178.2405184(1-6)Online publication date: 3-Dec-2012
  • (2011)Monitoring performance-related QoS properties in service-oriented systemsProceedings of the 16th European Conference on Pattern Languages of Programs10.1145/2396716.2396729(1-37)Online publication date: 13-Jul-2011
  • (2011)Runtime PredictionService Level Agreements for Cloud Computing10.1007/978-1-4614-1614-2_9(139-152)Online publication date: 29-Sep-2011

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media