Abstract:
A method for monitoring the quality-of-service (QoS) of high priority transactions in a software system includes receiving a specific QoS metric of a high priority transaction, where the QoS metric associated with a plurality of buckets and comparing the sampled specific QoS metric to an expected value for the specific QoS metric. If the sampled specific QoS metric exceeds the corresponding expected value, a bucket for the specific QoS metric is incremented, otherwise the bucket is decremented. If the bucket for the specific QoS metric overflows, the current bucket is reinitialized to zero, a depth of a next bucket for the specific QoS metric is computed, and a number of standard deviations from a mean value for the specific QoS metric is incremented. When the bucket for the specific QoS metric exceeds a threshold, a software rejuvenation routine is executed.
Abstract:
An automated approach to generating test cases for performance testing may be used for test case planning, early in the software development process, when a UML use case model and its activity diagram refinement are specified. The planned performance tests are executed later in the software development process, after the system is developed. The use case model is annotated with operation arrival rates and departure rates. Deterministic state testing (DST) generation and execution are applied for performance test generation and execution. In addition, a technique is described to generate the most likely test scenarios, labeling each arch in the activity diagram with transition probabilities and applying a breadth first search algorithm to select the most likely paths to be tested for each state generated by the DST algorithm.
Abstract:
A computer-implemented method for triggering a software rejuvenation system and/or method includes receiving a request for resources, determining an estimated response time to the request for resources, determining that the estimated response time is greater than a first threshold, determining that a number of estimated response times greater than the first threshold is greater than or equal to a second threshold, and triggering the software rejuvenation system and/or method.
Abstract:
A method for assessing an impact of a security attack on a system includes defining a system affecting metric for an observation period as a fraction of time the system satisfies a defined specification, defining a resource failure based model and a resource usage based model for the system, obtaining results for each of a plurality of states of the resource failure based model and the resource usage based model, solving the resource failure based model and the resource usage based model and obtaining a term fraction of time each model spends on each of the plurality of states, obtaining a state probability according to the term fraction, and obtaining a measure of the system affecting metric according to the state probability.
Abstract:
A method for detecting security intrusions and soft faults in a software system includes receiving a multi-dimensional performance signature built from operating system metrics sampled by a software system monitoring infrastructure, associating a plurality of buckets with each component of the performance signature, comparing a component of the sampled performance signature to an expected value for the performance signature component, where a bucket for the performance signature component is incremented if the sampled performance signature component exceeds the corresponding expected value, and the bucket for the performance signature component is decremented if the sampled performance signature component is less than the corresponding expected value, executing a security alert notification when the bucket for the performance signature component exceeds a first threshold, and executing a soft-fault notification when the bucket for the performance signature component exceeds a second threshold, where the first threshold is less than the second threshold.
Abstract:
A computer readable medium is provided embodying instructions executable by a processor to perform a method for triggering a software rejuvenation system or method, the method includes receiving a request for resources at a node, determining an estimated response time to the request for resources, determining that the estimated response time is greater than a first threshold, and triggering the software rejuvenation system or method at the node, the triggering including broadcasting an alert upon determining one of, a number of estimated response times is greater than the first threshold is greater than or equal to a dynamic second threshold, and a prior alert is received from another node.
Abstract:
A method for detecting security intrusions and soft faults in a software system includes receiving a multi-dimensional performance signature built from operating system metrics sampled by a software system monitoring infrastructure, associating a plurality of buckets with each component of the performance signature, comparing a component of the sampled performance signature to an expected value for the performance signature component, where a bucket for the performance signature component is incremented if the sampled performance signature component exceeds the corresponding expected value, and the bucket for the performance signature component is decremented if the sampled performance signature component is less than the corresponding expected value, executing a security alert notification when the bucket for the performance signature component exceeds a first threshold, and executing a soft-fault notification when the bucket for the performance signature component exceeds a second threshold, where the first threshold is less than the second threshold.
Abstract:
A computer-implemented method for triggering a software rejuvenation system or method in a computer-system including a plurality of replicates includes receiving a request for resources at a first replicate, determining an estimated response time to the request for resources, and determining that the estimated response time is greater than a first threshold. The method further includes determining that a number of estimated response times greater than the first threshold is greater than or equal to a second threshold, wherein the second threshold of the first replicate is different than a second threshold of a second replicate of the computer-system, and triggering the software rejuvenation system or method for the first replicate.
Abstract:
A computer-implemented method for triggering a software rejuvenation system or method in a computer-system including a plurality of replicates includes receiving a request for resources at a first replicate, determining an estimated response time to the request for resources, and determining that the estimated response time is greater than a first threshold. The method further includes determining that a number of estimated response times greater than the first threshold is greater than or equal to a second threshold, wherein the second threshold of the first replicate is different than a second threshold of a second replicate of the computer-system, and triggering the software rejuvenation system or method for the first replicate.
Abstract:
Transient survivability metrics are used to select improvements to distributed computer architecture designs. The approach combines survivability analysis and software aging and rejuvenation analysis to assess the survivability of the distributed computer architecture network. Available investment decisions are then automatically optimized with respect to survivability and investment costs.