[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3297280.3297311acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Failure prediction in the internet of things due to memory exhaustion

Published: 08 April 2019 Publication History

Abstract

We present a technique to predict failures resulting from memory exhaustion in devices built for the modern Internet of Things (IoT). These devices can run general-purpose applications on the network edge for local data processing to reduce latency, bandwidth and infrastructure costs, and to address data safety and privacy concerns. Applications are, however, not optimized for all devices and could result in sudden and unexpected memory exhaustion failures because of limited available memory on those IoT devices. Proactive prediction of such failures, with sufficient lead time, allows for adaptation of the application or its safe termination. Our memory failure prediction technique for applications running on IoT devices uses k-Nearest-Neighbor (kNN) based machine learning models. We have evaluated our technique using two third-party applications and a real-world IoT simulation application on two different IoT platforms and on an Amazon EC2 t2.micro instance for both single and multitenancy use cases. Our results indicate that our technique significantly outperforms simpler threshold-based techniques: in our test applications, with 180 seconds of lead time, failures were accurately predicted with 88% recall at 74% precision for a single application failure and 76% recall at 71% precision for multitenancy failure.

References

[1]
2018. Embedded Linux. http://elinux.org
[2]
2018. Gartner IT Glossary: Multitenancy. https://www.gartner.com/it-glossary/multitenancy
[3]
2018. Raspbian. https://www.raspberrypi.org/documentation/raspbian/
[4]
Omid Alipourfard, Hongqiang Harry Liu, Jianshu Chen, Shivaram Venkataraman, Minlan Yu, and Ming Zhang. 2017. CherryPick: Adaptively Unearthing the Best Cloud Configurations for Big Data Analytics. In NSDI, Vol. 2. 4--2.
[5]
Javier Alonso, Jordi Torres, and Ricard Gavalda. 2009. Predicting web server crashes: A case study in comparing prediction algorithms. In Autonomic and Autonomous Systems, 2009. ICAS'09. Fifth International Conference on. IEEE.
[6]
Javier Alonso Lopez, Josep Ll, Ricard GavaldÃă, and Jordi Torres. 2018. Predicting web application crashes using machine learning. (04 2018).
[7]
Flavio Bonomi, Rodolfo Milito, Preethi Natarajan, and Jiang Zhu. 2014. Fog computing: A platform for internet of things and analytics. In Big data and internet of things: A roadmap for smart environments. Springer.
[8]
Antonio Bovenzi, Francesco Brancati, Stefano Russo, and Andrea Bondavalli. 2015. An os-level framework for anomaly detection in complex software systems. IEEE Transactions on Dependable and Secure Computing 12, 3 (2015), 366--372.
[9]
Gabriella Carrozza, Domenico Cotroneo, Roberto Natella, Antonio Pecchia, and Stefano Russo. 2010. Memory leak analysis of mission-critical middleware. Journal of Systems and Software 83, 9 (2010).
[10]
Xin Chen, Charng-Da Lu, and Karthik Pattabiraman. 2014. Failure prediction of jobs in compute clouds: A google cluster case study. In Software Reliability Engineering Workshops (ISSREW), 2014 IEEE International Symposium on. IEEE.
[11]
Ludmila Cherkasova, Kivanc Ozonat, Ningfang Mi, Julie Symons, and Evgenia Smirni. 2008. Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change. In Dependable Systems and Networks With FTCS and DCC, 2008. DSN 2008. IEEE International Conference on. IEEE, 452--461.
[12]
Ira Cohen, Jeffrey S Chase, Moises Goldszmidt, Terence Kelly, and Julie Symons. 2004. Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control. In OSDI, Vol. 4. 16--16.
[13]
Domenico Cotroneo, Salvatore Orlando, and Stefano Russo. 2007. Characterizing aging phenomena of the java virtual machine. In Reliable Distributed Systems, 2007. SRDS 2007. 26th IEEE International Symposium on. IEEE.
[14]
P Daniel, Cesati Marco, et al. 2007. Understanding the Linux kernel.
[15]
Julien Gascon-Samson, Kumseok Jung, Shivanshu Goyal, Armin Rezaiean-Asel, and Karthik Pattabiraman. 2018. Things Migrate: Platform-Independent Migration of Stateful JavaScript IoT Applications. European Conference on Object-Oriented Programming (ECOOP) (2018).
[16]
Michael Grottke, Lei Li, Kalyanaraman Vaidyanathan, and Kishor S Trivedi. 2006. Analysis of software aging in a web server. IEEE Transactions on reliability (2006).
[17]
Michael Grottke and Kishor S Trivedi. 2005. A classification of software faults. Journal of Reliability Engineering Association of Japan 27, 7 (2005), 425--438.
[18]
Michael Grottke and Kishor S Trivedi. 2007. Fighting bugs: Remove, retry, replicate, and rejuvenate. Computer 40, 2 (2007).
[19]
Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. 2013. Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems 29, 7 (2013), 1645--1660.
[20]
Yennun Huang, Chandra Kintala, Nick Kolettis, and N Dudley Fulton. 1995. Software rejuvenation: Analysis, module and applications. In ftcs. IEEE.
[21]
Gareth James, Daniela Witten, Trevor Hastie, and Robert Tibshirani. 2013. An introduction to statistical learning. Vol. 112. Springer.
[22]
P Lamkin and S Charara. 2017. The best smartglasses 2017: Snap, Vuzix, ODG, Sony & more.
[23]
David J Leinweber. 2007. Stupid data miner tricks: overfitting the S&P 500. Journal of Investing 16, 1 (2007), 15.
[24]
Lei Li, Kalyanaraman Vaidyanathan, and Kishor S Trivedi. 2002. An approach for estimation of software aging in a web server. In Empirical Software Engineering, 2002. Proceedings. 2002 International Symposium n. IEEE.
[25]
Rivalino Matias and JF Paulo Filho. 2006. An experimental study on software aging and rejuvenation in web servers. In Computer Software and Applications Conference, 2006. COMPSAC'06. 30th Annual International, Vol. 1. IEEE, 189--196.
[26]
I Dan Melamed, Ryan Green, and Joseph P Turian. 2003. Precision and recall of machine translation. In Proceedings of the 2003 Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology: companion volume of the Proceedings of HLT-NAACL 2003-short papers-Volume 2. Association for Computational Linguistics, 61--63.
[27]
Lawrence Rabiner, Marvin Sambur, and Carol Schmidt. 1975. Applications of a nonlinear smoothing algorithm to speech processing. IEEE Transactions on Acoustics, Speech, and Signal Processing 23, 6 (1975).
[28]
Xiaojuan Ren, Seyong Lee, Rudolf Eigenmann, and Saurabh Bagchi. 2006. Resource failure prediction in fine-grained cycle sharing system. In International Conference on High Performance Distributed Computing. 93--104.
[29]
Laerd Statistics. 2013. Spearman's rank-order correlation. Laerd Statistics (2013).
[30]
Xian-He Sun and Lionel M Ni. 1993. Scalable problems and memory-bounded speedup. J. Parallel and Distrib. Comput. 19, 1 (1993), 27--37.
[31]
Kalyanaraman Vaidyanathan and Kishor S Trivedi. 1999. A measurement-based model for estimation of resource exhaustion in operational software systems. In issre. IEEE, 84.
[32]
Stefan Van der Walt, Johannes L Schönberger, Juan Nunez-Iglesias, François Boulogne, Joshua D Warner, Neil Yager, Emmanuelle Gouillart, and Tony Yu. 2014. scikit-image: image processing in Python. PeerJ 2 (2014), e453.
[33]
Pascal Weisenburger, Manisha Luthra, Boris Koldehofe, and Guido Salvaneschi. 2017. Quality-aware runtime adaptation in complex event processing. In Software Engineering for Adaptive and Self-Managing Systems (SEAMS), 2017 IEEE/ACM 12th International Symposium on. IEEE.
[34]
Geoff Werner-Allen, Konrad Lorincz, Jeff Johnson, Jonathan Lees, and Matt Welsh. 2006. Fidelity and yield in a volcano monitoring sensor network. In Proceedings of the 7th symposium on Operating systems design and implementation. USENIX Association, 381--396.
[35]
Ben Zhang, Nitesh Mor, John Kolb, Douglas S Chan, Ken Lutz, Eric Allman, John Wawrzynek, Edward A Lee, and John Kubiatowicz. 2015. The Cloud is Not Enough: Saving IoT from the Cloud. In HotStorage.
[36]
Hao Zhang, Alexander C Berg, Michael Maire, and Jitendra Malik. 2006. SVM-KNN: Discriminative nearest neighbor classification for visual category recognition. In Computer Vision and Pattern Recognition, 2006 IEEE Computer Society Conference on, Vol. 2. IEEE, 2126--2136.
[37]
Qi Zhang, Ludmila Cherkasova, Ningfang Mi, and Evgenia Smirni. 2008. A regression-based analytic model for capacity planning of multi-tier applications. Cluster Computing 11, 3 (2008), 197--211.

Cited By

View all
  • (2024)Comparison of Machine Learning Algorithms for Detecting Software Aging in SQL ServerProceedings of the 13th Latin-American Symposium on Dependable and Secure Computing10.1145/3697090.3699798(159-164)Online publication date: 26-Nov-2024
  • (2024)Co-Approximator: Enabling Performance Prediction in Colocated Applications.ACM Transactions on Embedded Computing Systems10.1145/367718024:1(1-28)Online publication date: 5-Oct-2024
  • (2024)Investigating and Analyzing Simulation Tools of Wireless Sensor Networks: A Comprehensive SurveyIEEE Access10.1109/ACCESS.2024.336288912(22938-22977)Online publication date: 2024
  • Show More Cited By

Index Terms

  1. Failure prediction in the internet of things due to memory exhaustion

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SAC '19: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing
    April 2019
    2682 pages
    ISBN:9781450359337
    DOI:10.1145/3297280
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 April 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. IoT
    2. failure prediction
    3. memory exhaustion

    Qualifiers

    • Research-article

    Conference

    SAC '19
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

    Upcoming Conference

    SAC '25
    The 40th ACM/SIGAPP Symposium on Applied Computing
    March 31 - April 4, 2025
    Catania , Italy

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 28 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Comparison of Machine Learning Algorithms for Detecting Software Aging in SQL ServerProceedings of the 13th Latin-American Symposium on Dependable and Secure Computing10.1145/3697090.3699798(159-164)Online publication date: 26-Nov-2024
    • (2024)Co-Approximator: Enabling Performance Prediction in Colocated Applications.ACM Transactions on Embedded Computing Systems10.1145/367718024:1(1-28)Online publication date: 5-Oct-2024
    • (2024)Investigating and Analyzing Simulation Tools of Wireless Sensor Networks: A Comprehensive SurveyIEEE Access10.1109/ACCESS.2024.336288912(22938-22977)Online publication date: 2024
    • (2023)APRENDIZADO DE MÁQUINA EM AMBIENTES HOSPITALARES: UM ESTUDO DE ANÁLISE DE TENDÊNCIAS DE SOBRECARGA EM SISTEMAS DE TECNOLOGIAS DA INFORMAÇÃO E COMUNICAÇÃORevista Contemporânea10.56083/RCV3N9-1273:9(15866-15893)Online publication date: 27-Sep-2023
    • (2022)$\pi$-Configurator: Enabling Efficient Configuration of Pipelined Applications on the Edge2022 IEEE/ACM Seventh International Conference on Internet-of-Things Design and Implementation (IoTDI)10.1109/IoTDI54339.2022.00009(156-169)Online publication date: May-2022

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media