27.03.2014 Views

SEKE 2012 Proceedings - Knowledge Systems Institute

SEKE 2012 Proceedings - Knowledge Systems Institute

SEKE 2012 Proceedings - Knowledge Systems Institute

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

no faults are propagated to the trusted parts of the application.<br />

The protocol between the trusted platform and the sandbox<br />

platform brings considerable performance overhead, and the<br />

correct functioning is based on a set of assumptions which may<br />

not apply to some real applications as discussed in their own<br />

work.<br />

VII.<br />

CONCLUSION<br />

The OSGi framework provides support for the management<br />

of component-based software. It is important for improving the<br />

reliability of OSGi-based software to detect anomalies in the<br />

granularity of component. This paper proposed a thread-tracing<br />

method for monitoring components running in OSGi from the<br />

perspectives of CPU utilization. Furthermore, control charts are<br />

also employed to detect anomalous components online. The<br />

experimental results demonstrate that our method is able to<br />

monitor the CPU utilization in a high accuracy without<br />

significant overhead, and can detect the anomalous components<br />

effectively.<br />

ACKNOWLEDGMENT<br />

This work is supported by the National Grand Fundamental<br />

Research 973 Program of China under Grant No.<br />

2009CB320704, the National High Technology Research and<br />

Development Program of China under Grant No.<br />

<strong>2012</strong>AA011204, the National Natural Science Foundation of<br />

China under Grant No.61173004 and the National Science and<br />

Technology Major Project of China under Grant<br />

No.2011ZX03002-002-01.<br />

REFERENCES<br />

[1] G. Heineman, B. Councill, et al., "Component-based software<br />

engineering and the issue of trust," in <strong>Proceedings</strong> of the 22nd<br />

international conference on Software engineering, Limerick, Ireland,<br />

2000, pp.661-664.<br />

[2] OSGi Alliance. Available: http://www.osgi.org/.<br />

[3] OSGi Alliance. About the OSGi Service Platform. Revision 4.1.<br />

http://www.osgi.org/wiki/uploads/Links/OSGiTechnicalWhitePaper.pdf,<br />

2007.<br />

[4] R. Pressman, D. Ince, Software engineering: a practitioner's approach:<br />

McGraw-Hill New York, 2005.<br />

[5] S. G. Swapna, “Architecture-Based Software Reliability Analysis:<br />

Overview and Limitations,” IEEE Transactions on Dependable and<br />

Secure Computing , vol. 4, no. 1, pp. 32-40, 2007.<br />

[6] K. Heiko, “Performance evaluation of component-based software<br />

systems: A survey,” Performance Evaluation, vol. 67, no. 8, pp. 634-658,<br />

2010.<br />

[7] W. Zhang, B. Yang, B. Jin, et al., “Performance Tuning for Application<br />

Server OnceAS", in <strong>Proceedings</strong> of the Second international conference<br />

on Parallel and Distributed Processing and Applications, vol. 3358, Eds.,<br />

ed: Springer Berlin / Heidelberg, 2005, pp. 451-462.<br />

[8] T. Miettinen, D. Pakkala,M. Hongisto, “A Method for the Resource<br />

Monitoring of OSGi-based Software Components,” in <strong>Proceedings</strong> of<br />

the 34th Euromicro Conference on Software Engineering and Advanced<br />

Applications, Parma,Italy, 2008, pp. 100-107.<br />

[9] G. A. Barnard, “Control Charts and Stochastic Processes,” Journal of the<br />

Royal Statistical Society, vol. 21, no. 2, pp. 239-271, 1959.<br />

[10] T.Wang, X. Zhou, J. Wei,W. Zhang, “Towards Runtime Plug-and-Play<br />

Software,” in <strong>Proceedings</strong> of t he 10th International Conference on<br />

Quality Software, Zhangjiajie, China, 2010, pp. 365-368.<br />

[11] D. A. Menasce, “TPC-W: a benchmark for e-commerce,” IEEE Internet<br />

Computing, IEEE, vol. 6, no. 3, pp. 83-87, 2002.<br />

[12] S. Pertet, P. Narasimhan, “Causes of failure in web applications,”<br />

Parallel Data L aboratory, Carnegie Mellon University, CMU-PDL-05-<br />

109, 2005.<br />

[13] P. Barham, A. Donnelly, R. Isaacs, et al., “Using magpie for request<br />

extraction and workload modelling,” in <strong>Proceedings</strong> of t he 6th<br />

conference on Symposium on Opearting <strong>Systems</strong> Design &<br />

Implementation - Volume 6, San Francisco, CA, 2004, pp. 18-31.<br />

[14] K. Yaghmour, M. R. Dagenais, “Measuring and characterizing system<br />

behavior using kernel-level event logging,” in <strong>Proceedings</strong> of the annual<br />

conference on USENIX Annual Technical Conference, San Diego,<br />

California, 2000, pp. 2-15.<br />

[15] B. M. Cantrill, M. W. Shapiro, A. H. Leventhal, “Dynamic<br />

instrumentation of production systems,” in <strong>Proceedings</strong> of the annual<br />

conference on USENIX Annual Technical Conference, Boston, MA,<br />

2004, pp. 2-2.<br />

[16] J. Hulaas, W. Binder, “Program transformations for portable CPU<br />

accounting and control in Java,” in <strong>Proceedings</strong> of the ACM SIGPLAN<br />

symposium on Partial evaluation and semantics-based program<br />

manipulation, Verona, Italy, 2004, pp. 169-177.<br />

[17] M. A. Munawar, P. A. S. Ward, “A comparative study of pairwise<br />

regression techniques for problem determination,” in <strong>Proceedings</strong> of the<br />

international conference of the center for advanced studies on<br />

collaborative research. NY, USA, ACM, 2007, pp.152-166.<br />

[18] G. Jiang, H. Chen, Y. Kenji, “Modeling and Tracking of Transaction<br />

Flow Dynamics for Fault Detection in Complex <strong>Systems</strong>,” IEEE<br />

Transactions on Dependable and Secure Computing, vol. 3, no. 4, 2006,<br />

pp. 312-326.<br />

[19] Z. Guo, G. Jiang, H. Chen, et al., “Tracking Probabilistic Correlation of<br />

Monitoring Data for Fault Detection in Complex <strong>Systems</strong>,” in<br />

<strong>Proceedings</strong> of the 36th international conference on Dependable <strong>Systems</strong><br />

and Networks. Philadelphia, PA, IEEE, 2006. pp. 259-268.<br />

[20] K. Gama, D. Donsez, "A Self-healing Component Sandbox for<br />

Untrustworthy Third Party Code Execution", In <strong>Proceedings</strong> of the 13th<br />

International Symposium on Component-Based Software Engineering.<br />

Springer-Verlag, Berlin, Heidelberg, 2010. pp. 130-149.<br />

[21] V. Chandola, A. Banerjee and V. Kumar, "Anomaly detection: A<br />

survey," ACM Comput. Surv., vol. 41, pp. 1-58, 2009.<br />

[22] JVMTI, http://java.sun.com/j2se/1.5.0/docs/guide/jvmti/.<br />

[23] IBM Tivoli, http://www.cdwg.com/content/brands/ibm/tivoli.aspx.<br />

[24] HP OpenView, http://www.osalt.com/openview-network-node-manager.<br />

[25] J. Dean, D. Grove and C. Chambers, "Optimization of object-oriented<br />

programs using static class hierarchy analysis," the 9th European<br />

Conference on Object-Oriented Programming. Aarhus, Denmark, 7–11<br />

August, 1995. Springer. pp. 77-101.<br />

193

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!