AI & eBPF based performance anomaly detection system

被引:7
|
作者
Ben-Yair, Ido [1 ]
Rogovoy, Pavel [2 ]
Zaidenberg, Nezer [2 ]
机构
[1] Open Univ Israel, Raanana, Israel
[2] Coll Management, Rishon Leziyyon, Israel
关键词
eBPF; Anomaly Detection; Performance;
D O I
10.1145/3319647.3325842
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We describe means to run eBPF on a production environment for systems inspection. We examine the inspected system outputs in order to train and generate a model for the host. We model the specific application and network traffic usage on the site based on the data collected by eBPF. Our system generates alerts when an anomaly in performance is detected on a specific host. These warnings can be used to discover the root cause for performance problems, cyber-security issues and warn in advance about potential performance peaks.
引用
收藏
页码:180 / 180
页数:1
相关论文
共 50 条
  • [41] Anomaly Detection System using Entropy based Technique
    Gautam, Sunil Kumar
    Om, Hari
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 738 - 743
  • [42] An anomaly intrusion detection system based on vector quantization
    Zheng, J
    Hu, MZ
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2006, E89D (01): : 201 - 210
  • [43] Anomaly-Based Network Intrusion Detection System
    Villalba, L. J. G.
    Orozco, A. L. S.
    Vidal, J. M.
    IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (03) : 850 - 855
  • [44] Anomaly Detection System Based on Service Oriented Architecture
    Kolaczek, Grzegorz
    Prusiewicz, Agnieszka
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS (ACIIDS 2012), PT III, 2012, 7198 : 376 - 385
  • [45] An anomaly detection system based on dendritic cell algorithm
    Chen, Guo
    Shuo, Peng
    Rong, Jiang
    Chao, Luo
    THIRD INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING, 2009, : 192 - 195
  • [46] SOM-based anomaly intrusion detection system
    Wang, Chun-Dong
    Yu, He-Feng
    Wang, Huai-Bin
    Liu, Kai
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4808 : 356 - 366
  • [47] VHetNets for AI and AI for VHetNets: An Anomaly Detection Case Study for Ubiquitous IoT
    Wang, Weili
    Abbasi, Omid
    Yanikomeroglu, Halim
    Liang, Chengchao
    Tang, Lun
    Chen, Qianbin
    IEEE NETWORK, 2024, 38 (06): : 1 - 1
  • [48] AI Anomaly Detection with Decentralized Identity Management on Blockchain
    Sharma, Ch Rahul A. N.
    Swetchana, Dutta
    Rajagopal, Shinu M.
    10TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES, CONECCT 2024, 2024,
  • [49] Cognitive analytics platform with AI solutions for anomaly detection
    Rousopoulou, Vaia
    Vafeiadis, Thanasis
    Nizamis, Alexandros
    Iakovidis, Ioannis
    Samaras, Leonidas
    Kirtsoglou, Alkis
    Georgiadis, Konstantinos
    Ioannidis, Dimosthenis
    Tzovaras, Dimitrios
    COMPUTERS IN INDUSTRY, 2022, 134
  • [50] Anomaly detection for composite manufacturing using AI models
    Kumar, Deepak
    Agraharam, Pragathi Chan
    Liu, Yongxin
    Namilae, Sirish
    JOURNAL OF INTELLIGENT MANUFACTURING, 2024,