skip to main content
10.1109/ISSRE.2014.30guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Assessing Direct Monitoring Techniques to Analyze Failures of Critical Industrial Systems

Published: 03 November 2014 Publication History

Abstract

The analysis of monitoring data is extremely valuable for critical computer systems. It allows to gain insights into the failure behavior of a given system under real workload conditions, which is crucial to assure service continuity and downtime reduction. This paper proposes an experimental evaluation of different direct monitoring techniques, namely event logs, assertions, and source code instrumentation, that are widely used in the context of critical industrial systems. We inject 12,733 software faults in a real-world air traffic control (ATC) middleware system with the aim of analyzing the ability of mentioned techniques to produce information in case of failures. Experimental results indicate that each technique is able to cover a limited number of failure manifestations. Moreover, we observe that the quality of collected data to support failure diagnosis tasks strongly varies across the techniques considered in this study.

Cited By

View all
  • (2024)State Reconciliation Defects in Infrastructure as CodeProceedings of the ACM on Software Engineering10.1145/36607901:FSE(1865-1888)Online publication date: 12-Jul-2024
  • (2023)Defect Categorization in Compilers: A Multi-vocal Literature ReviewACM Computing Surveys10.1145/362631356:4(1-42)Online publication date: 10-Nov-2023
  • (2020)Gang of eightProceedings of the ACM/IEEE 42nd International Conference on Software Engineering10.1145/3377811.3380409(752-764)Online publication date: 27-Jun-2020
  • Show More Cited By
  1. Assessing Direct Monitoring Techniques to Analyze Failures of Critical Industrial Systems

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      ISSRE '14: Proceedings of the 2014 IEEE 25th International Symposium on Software Reliability Engineering
      November 2014
      347 pages
      ISBN:9781479960330

      Publisher

      IEEE Computer Society

      United States

      Publication History

      Published: 03 November 2014

      Author Tags

      1. assertions
      2. code instrumentation
      3. critical systems
      4. event logs
      5. failure detection
      6. information entropy

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 01 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)State Reconciliation Defects in Infrastructure as CodeProceedings of the ACM on Software Engineering10.1145/36607901:FSE(1865-1888)Online publication date: 12-Jul-2024
      • (2023)Defect Categorization in Compilers: A Multi-vocal Literature ReviewACM Computing Surveys10.1145/362631356:4(1-42)Online publication date: 10-Nov-2023
      • (2020)Gang of eightProceedings of the ACM/IEEE 42nd International Conference on Software Engineering10.1145/3377811.3380409(752-764)Online publication date: 27-Jun-2020
      • (2016)Automated root cause identification of security alertsFuture Generation Computer Systems10.1016/j.future.2015.09.00956:C(375-387)Online publication date: 1-Mar-2016
      • (2015)Industry practices and event loggingProceedings of the 37th International Conference on Software Engineering - Volume 210.5555/2819009.2819035(169-178)Online publication date: 16-May-2015
      • (2015)A Multi-layer Anomaly Detector for Dynamic Service-Based SystemsProceedings of the 34th International Conference on Computer Safety, Reliability, and Security - Volume 933710.1007/978-3-319-24255-2_13(166-180)Online publication date: 23-Sep-2015
      • (2014)Filtering Security Alerts for the Analysis of a Production SaaS CloudProceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing10.1109/UCC.2014.32(233-241)Online publication date: 8-Dec-2014

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media