[1] |
COULOURIS G, DOLLIMORE J, KINDBERG T, et al. Distributed Systems: Concepts and Design[M]. Addison-Wesley,2011.
|
[2] |
VERMA A,PEDROSA L,KORUPOLU M,et al. Large-scale cluster management at Google with Borg[C]// Proceedings of the 10th European Conference on Computer Systems. 2015. DOI: 10.1145/2741948.2741964.
|
[3] |
THUSOO A, SHAO Z, ANTHONY S, et al. Data warehousing and analytics infrastructure at facebook[C]// Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data. 2010:1013-1020.
|
[4] |
SOMASEKARAM P,CALINESCU R,BUYYA R. High-availability clusters: A taxonomy,survey,and future directions[J]. Journal of Systems and Software,2022,187. DOI: 10.1016/j.jss.2021.111208.
|
[5] |
LIN Q W, HSIEH K, DANG Y N, et al. Predicting node failure in cloud service systems[C]// Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 2018:480-490.
|
[6] |
YAO D F,SHU X K,CHENG L,et al. Anomaly Detection as a Service: Challenges,Advances,and Opportunities[M]. Morgan & Claypool Publishers,2017.
|
[7] |
IBIDUNMOYE O,HERNANDEZ-RODRIGUEZ F,ELMR
|
|
OTH E. Performance anomaly detection and bottleneck identification[J]. ACM Computing Surveys (CSUR),2015,48(1). DOI: 10.1145/2791120.
|
[8] |
张夏豪. 面向云数据中心计算资源的可靠性保障技术研究[D]. 南京:南京航空航天大学, 2020.
|
[9] |
GUAN Q,ZHANG Z M,FU S. Ensemble of Bayesian predictors and decision trees for proactive failure management in cloud computing systems[J]. Journal of Communications,2012,7(1):52-61.
|
[10] |
AREFIN A,SINGH V K,JIANG G F,et al. Diagnosing data center behavior flow by flow[C]// Proceedings of the 2013 IEEE 33rd International Conference on Distributed Computing Systems. 2013:11-20.
|
[11] |
王开放. 云环境下基于LSTM和SVM的虚拟机故障预测模型[J]. 信息技术,2022,46(10):108-112.
|
[12] |
ADAMU H,MOHAMMED B,MAINA A B,et al. An approach to failure prediction in a cloud based environment[C]// Proceedings of the 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud). 2017:191-197.
|
[13] |
SHU X K,YAO D F,RAMAKRISHNAN N. Unearthing stealthy program attacks buried in extremely long execution paths[C]// Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015:401-413.
|
[14] |
SHU X K,YAO D F,RYDER B G. A formal framework for program anomaly detection[C]// Proceedings of the 2015 International Symposium on Recent Advances in Intrusion Detection. 2015:270-292.
|
[15] |
DU M,LI F F,ZHENG G N,et al. DeepLog: Anomaly detection and diagnosis from system logs through deep learning[C]// Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017:1285-1298.
|
[16] |
LU L,XU Z G,WANG W H,et al. A new fault detection method for computer networks[J]. Reliability Engineering & System Safety,2013,114:45-51.
|
[17] |
张开延,潘杨,娄季朝. 基于ANP-SVM算法的智能变电站过程层网络故障分类[J]. 计算机与现代化, 2019(7):72-77.
|
[18] |
董海强. 基于贝叶斯网的IP网络故障定位算法的研究与实现[D]. 北京:北京邮电大学, 2009.
|
[19] |
周畅. 计算机网络中的故障定位研究[J]. 软件工程,2016,19(12):1-4.
|
[20] |
YU L,LAN Z L. A scalable,non-parametric method for detecting performance anomaly in large scale computing[J]. IEEE Transactions on Parallel and Distributed Systems,2016,27(7):1902-1914.
|
[21] |
王焘,顾泽宇,张文博,等. 一种基于自适应监测的云计算系统故障检测方法[J]. 计算机学报, 2018,41(6):1332-1345.
|
[22] |
GUAN Q,FU S. Adaptive anomaly identification by exploring metric subspace in cloud computing infrastructures[C]// Proceedings of the 2013 IEEE 32nd International Symposium on Reliable Distributed Systems. 2013:205-214.
|
[23] |
SHARMA B,JAYACHANDRAN P,VERMA A,et al. CloudPD: Problem determination and diagnosis in shared dynamic clouds[C]// Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). 2013. DOI: 10.1109/DSN.2013.
|
|
6575298.
|
[24] |
WANG J. Real local-linearity preserving embedding[J]. Neurocomputing, 2014,136:7-13.
|
[25] |
李元,耿泽伟. 基于LLE与K均值聚类算法的工业过程故障诊断[J]. 系统仿真学报, 2021,33(9):2066-2073.
|
[26] |
HSU C W,LIN C J. A comparison of methods for multiclass support vector machines[J]. IEEE Transactions on Neural Networks, 2002,13(2):415-425.
|
[27] |
ABUALIGAH L,DIABAT A,MIRJALILI S,et al. The arithmetic optimization algorithm[J]. Computer Methods in Applied Mechanics and Engineering,2021,376. DOI: 10.1016/j.cma.2020.113609.
|
[28] |
LIU Y M,ZHOU H F. MSVM recognition model for dynamic process abnormal pattern based on multi-kernel functions[J]. Journal of Systems Science and Information,2014,2(5):473-480.
|
[29] |
MEI Y Y,HAN W H,LI S D,et al. A hybrid intelligent approach to attribute advanced persistent threat organization using PSO-MSVM algorithm[J]. IEEE Transactions on Network and Service Management,2022,19(4):4262-4272.
|
[30] |
LU P,YE L,ZHONG W Z,et al. A novel spatio-temporal wind power forecasting framework based on multi-output support vector machine and optimization strategy[J]. Journal of Cleaner Production,2020,254. DOI: 10.1016/j.jclepro.2020.119993.
|