This thesis studies ways to detect anomalies in server performance and tests simple implementations on detect two different anomalies: CPU related anomalies and memory leaks. The goal is to find a way to implement a lightweight analysis component. This thesis was done as an assignment for Patria Aviation Oy. Common system performance metrics are presented of which CPU and memory utilization are also used later in thesis. A literary study was done to find different strategies on anomaly detection, including both statistical methods and machine learning methods. The simplest strategies, z-score and regression analysis using ordinary least squares, were used for implementation and testing. Testing the implementations showed that z-score ...
Today, data centers deal with fast growing data volumes. To deliver services, they deploy growing am...
Anomaly detection in computer systems operating within complex environments,such as cyber-physical s...
This work studies systems and methods for anomaly detection in computer networks. At first, basic ca...
This thesis studies ways to detect anomalies in server performance and tests simple implementations ...
This thesis investigates the possibility of using anomaly detection on performance data of virtual s...
In recent years, microservices have gained popularity due to their benefits such as increased mainta...
In order to meet stringent performance requirements, system administrators must effectively detect u...
With the explosion of the number of distributed applications, a new dynamic server environment emerg...
The impact of an anomaly is domain-dependent. In a dataset of network activities, an anomaly can imp...
The next generation of critical systems, namely complex Critical Infrastructures (LCCIs), require ef...
— Monitoring resources in a server environment is an essential and indispensable process that ensur...
With the explosion of the number of distributed applications, a new dynamic server environment emerg...
The analysis and correct categorisation of software performance anomalies is a major challenge in cu...
The main goal of this research is to contribute to automated performance anomaly detection for large...
Distributed systems have become pervasive in current society. From laptops and mobile phones, to ser...
Today, data centers deal with fast growing data volumes. To deliver services, they deploy growing am...
Anomaly detection in computer systems operating within complex environments,such as cyber-physical s...
This work studies systems and methods for anomaly detection in computer networks. At first, basic ca...
This thesis studies ways to detect anomalies in server performance and tests simple implementations ...
This thesis investigates the possibility of using anomaly detection on performance data of virtual s...
In recent years, microservices have gained popularity due to their benefits such as increased mainta...
In order to meet stringent performance requirements, system administrators must effectively detect u...
With the explosion of the number of distributed applications, a new dynamic server environment emerg...
The impact of an anomaly is domain-dependent. In a dataset of network activities, an anomaly can imp...
The next generation of critical systems, namely complex Critical Infrastructures (LCCIs), require ef...
— Monitoring resources in a server environment is an essential and indispensable process that ensur...
With the explosion of the number of distributed applications, a new dynamic server environment emerg...
The analysis and correct categorisation of software performance anomalies is a major challenge in cu...
The main goal of this research is to contribute to automated performance anomaly detection for large...
Distributed systems have become pervasive in current society. From laptops and mobile phones, to ser...
Today, data centers deal with fast growing data volumes. To deliver services, they deploy growing am...
Anomaly detection in computer systems operating within complex environments,such as cyber-physical s...
This work studies systems and methods for anomaly detection in computer networks. At first, basic ca...