Requirements for Anomaly Detection Techniques for Microservices

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Version configurations of third-party software are essential to ensure a reliable and executable microservice architecture. Although these minor version configurations seem straightforward as the functionality does not need to be adapted, unexpected behaviour emerges due to the complex infrastructure and many dependencies. Anomaly detection techniques determine these unexpected behaviour changes during runtime. However, the requirements anomaly detection algorithms need to fulfil are unexplored. Thus, this case study collects experiences from practitioners and monitoring datasets from a well-known benchmark system (Train Ticket) to identify five requirements - namely: (1) early detectability, (2) reliability, (3) risk analysis, (4) adaptability, and (5) root causes analysis. In this work, we additionally evaluate three anomaly detection techniques on their practical applicability with the help of these identified requirements and extracted monitoring data.

Cite

CITATION STYLE

APA

Steidl, M., Gattringer, M., Felderer, M., Ramler, R., & Shahriari, M. (2022). Requirements for Anomaly Detection Techniques for Microservices. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 13709 LNCS, pp. 37–52). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-21388-5_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free