Online Performance Anomaly Detection with
|
|
|
- Hubert White
- 10 years ago
- Views:
Transcription
1 ΘPAD: Online Performance Anomaly Detection with Tillmann Bielefeld 1 1 empuxa GmbH, Kiel KoSSE-Symposium Application Performance Management (Kieker Days 2012) November 29, Wissenschaftszentrum Kiel Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 1 / 27
2 Agenda 1 Monitoring at XING 2 OPAD s Architecture 3 Evaluation 4 Results 5 Conclusion Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 2 / 27
3 Thesis Goals Author Tillmann Carlos Bielefeld Advisory Prof. Dr. Wilhelm Hasselbring Dipl.-Inform. André van Hoorn Dr. Stefan Kaes (XING AG) Case Study at XING AG 1 Design of online performance anomaly detection concept (ΘPAD) 2 ΘPAD implementation as plugin 3 ΘPAD integration with case study system 4 Θnline Performance Anomaly Detection Diploma Thesis Tillmann Carlos Bielefeld Θnline Performance Anomaly Detection for Large-Scale Software Systems Diploma Thesis Christian-Albrechts-Universität zu Kiel PAD Tillmann C. Bielefeld: Online performance anomaly detection for large-scale software systems March Diploma Thesis, Kiel Univ. Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 3 / 27
4 Existing Logjam-based XING Monitoring at XING Logjam-based monitoring already in Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 4 / 27
5 Integration of ΘPAD in XING s Architecture Monitoring at XING Servers App Support Importer Log Database Logjam XWS (API) DB Background s logging/monitoring architecture Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 5 / 27
6 Integration of ΘPAD in XING s Architecture Monitoring at XING Servers App Support Importer Log Database Logjam XWS (API) DB Background ΘPAD Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 5 / 27
7 Example JSON Logging Message Monitoring at XING {... } "count": , "memcache_time": , "api_time": , "db_time": , "view_time": , "total_time": , "api_calls": Input data received via AMQP and processed by ΘPAD Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 6 / 27
8 ΘPAD gets instantiated at startup of the Kieker server. Both main architectural components High-Level of Kieker, ΘPAD Monitoring Architecture and Analysis are used to route the measurements to the plugin. The data flow from input to output is illustrated in Figure 4.4. OPAD s Architecture Measurement Queue C «Adapter» AMQPBridge «artifact» Monitoring «artifact» Analysis «component» ΘPAD Plugin P Java Pipe Time Series Storage Alerting Queue X Figure 4.4: The coarse-grained architecture follows the linear data 1 AMQP messages transformed into Kieker monitoring records flow of the approach (see Chapter 3). The AMQPBridge adapter 2 ΘPAD: translates pipes-and-filters the monitored processing system s measurements of records to Kieker records 3 ΘPAD and therefore results passed makesto ΘPAD alerting reusable queueinand other time-series environments storage (NFR4). This graphic uses the AMQP notation of Figure Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 7 / 27
9 ΘPAD Processing Steps OPAD s Architecture <<Reader>> Time Series Extraction Time Series Forecasting Anomaly Score Calculation Anomaly Detection Alerting (e.g., AMQP) Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 8 / 27
10 Step 1: Time Series Extraction ΘPAD Processing Steps (cont d) OPAD s Architecture <<Reader>> Time Series Extraction Time Series Forecasting Anomaly Score Calculation Anomaly Detection Alerting (e.g., AMQP) Continuous Time Discrete Time Series X 4 2 } } }} f f f } f Event on ES Discretization Function Time Series X Current Time select sum(value) as aggregation from MeasureEvent.win:time_batch( 1000 msec ) Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 9 / 27
11 Step 2: Time Series Forecasting ΘPAD Processing Steps (cont d) OPAD s Architecture <<Reader>> Time Series Extraction Time Series Forecasting Anomaly Score Calculation Anomaly Detection Alerting (e.g., AMQP) W Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 10 / 27
12 Step 3: Anomaly Score Calculation ΘPAD Processing Steps (cont d) OPAD s Architecture <<Reader>> Time Series Extraction Time Series Forecasting Anomaly Score Calculation Anomaly Detection Alerting (e.g., AMQP) Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 11 / 27
13 Step 4: Anomaly Detection ΘPAD Processing Steps (cont d) OPAD s Architecture <<Reader>> Time Series Extraction Time Series Forecasting Anomaly Score Calculation Anomaly Detection Alerting (e.g., AMQP) Abnormal Score Normal Score Anomaly Threshold Anomaly Detected Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 12 / 27
14 ΘPAD Web Interface OPAD s Architecture Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 13 / 27
15 Evaluation Methodology: GQM Evaluation Goal Assess Practicality of Approach Questions How precise is the detection? How accurate is the detection? Metric Number of true positives Metric Number of false negatives Goal/Question/Metric (GQM) plan (excerpt) Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 14 / 27
16 Manual Identification of Anomalies Evaluation Methodology (cont d) Evaluation 0:00 12:00 23:00 API time Memcache time Other time DB Time View time Manual detection using the visualization tool 8 anomalies were detected Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 15 / 27
17 ΘPAD Results Evaluation Results aptt.fses.d1min.l15min aptt.fets.d1min.l1h aptt.fmean.d5min.l1h Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 16 / 27
18 ROC Curves (Introduction) Evaluation (cont d) Results 1 Random Guess True Positive Rate (TPR) 0.5 Better Worse 3 2 Evaluation Run False Positive Rate (FPR) TPR = TP TP + FN = TP F FPR = FP FP + TN = FP NF (1) Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 17 / 27
19 ROC Curves (ΘPAD Results) Evaluation (cont d) Results 1 1 mean.d1min.l1h ses.d1min.l15min 0,8 0,8 0,6 0,6 2 0,4 1 0,4 0, ,5 1 1 mean.d20min.l2h 0,8 0,6 0,4 0, ,5 1 0, , ,8 0,6 0,4 0,2 aptt.fws.d1h.l24 h 0 0 0,5 1 Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 18 / 27
20 Accuracy and Precision Evaluation (cont d) Results ACC 1,00 PREC 0,80 0,60 0,40 0,20 0,00 0,00 Accuracy 0,98% 0,07 0,13 0,20 0,27 Detection Threshold ACC = PREC = 1 2 0,14% TP + TN N Precision 0,33 0,40 0,47 0,53 0,60 0,67 0,73 0,80 0,87 0,93 1,00 TP POS = TP TP + FP. (2) = TP + TN TP +FP +FN +TN. (3) Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 19 / 27
21 Summary and Outlook for Large-Scale Software Systems Diploma Thesis Christian-Albrechts-Universität zu Kiel Author Tillmann Carlos Bielefeld Advisory Prof. Dr. Wilhelm Hasselbring Dipl.-Inform. André van Hoorn Dr. Stefan Kaes (XING AG) Case Study at XING AG Conclusion Θnline Performance Anomaly Detection Diploma Thesis Tillmann Carlos Bielefeld Θnline Performance Anomaly Detection PAD Tillmann C. Bielefeld: Online performance anomaly detection for large-scale software systems March Diploma Thesis, Kiel Univ. Outlook ΘPAD to be released as part of Kieker Follow-up theses on ΘPAD Contact Us Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 20 / 27
22 Demo Conclusion Win a free empuxa Hoodie! Tillmann Bielefeld (empuxa GmbH) ΘPAD w/ Kieker Nov. 29, Kiel 21 / 27
Architecture-Based Multivariate Anomaly Detection for Software Systems
Architecture-Based Multivariate Anomaly Detection for Software Systems Master s Thesis Tom Frotscher October 16, 2013 Kiel University Department of Computer Science Software Engineering Group Advised by:
Tool-Supported Application Performance Problem Detection and Diagnosis. André van Hoorn. http://www.iste.uni-stuttgart.de/rss/
Tool-Supported Application Performance Problem Detection and Diagnosis University of Stuttgart Institute of Software Technology, Reliable Software Systems Group http://www.iste.uni-stuttgart.de/rss/ Agenda
Self Adaptive Software System Monitoring for Performance Anomaly Localization
2011/06/17 Jens Ehlers, André van Hoorn, Jan Waller, Wilhelm Hasselbring Software Engineering Group Christian Albrechts University Kiel Application level Monitoring Extensive infrastructure monitoring,
Performance Measures for Machine Learning
Performance Measures for Machine Learning 1 Performance Measures Accuracy Weighted (Cost-Sensitive) Accuracy Lift Precision/Recall F Break Even Point ROC ROC Area 2 Accuracy Target: 0/1, -1/+1, True/False,
Performance Measures in Data Mining
Performance Measures in Data Mining Common Performance Measures used in Data Mining and Machine Learning Approaches L. Richter J.M. Cejuela Department of Computer Science Technische Universität München
ExplorViz: Visual Runtime Behavior Analysis of Enterprise Application Landscapes
ExplorViz: Visual Runtime Behavior Analysis of Enterprise Application Landscapes Florian Fittkau, Sascha Roth, and Wilhelm Hasselbring 2015-05-27 Fittkau, Roth, Hasselbring ExplorViz: Visual Runtime Behavior
Application Performance Monitoring of a scalable Java web-application in a cloud infrastructure
Application Performance Monitoring of a scalable Java web-application in a cloud infrastructure Final Presentation August 5, 2013 Student: Supervisor: Advisor: Michael Rose Prof. Dr. Florian Matthes Alexander
Performance Metrics. number of mistakes total number of observations. err = p.1/1
p.1/1 Performance Metrics The simplest performance metric is the model error defined as the number of mistakes the model makes on a data set divided by the number of observations in the data set, err =
Business Case Development for Credit and Debit Card Fraud Re- Scoring Models
Business Case Development for Credit and Debit Card Fraud Re- Scoring Models Kurt Gutzmann Managing Director & Chief ScienAst GCX Advanced Analy.cs LLC www.gcxanalyacs.com October 20, 2011 www.gcxanalyacs.com
Capturing provenance information with a workflow monitoring extension for the Kieker framework
Capturing provenance information with a workflow monitoring extension for the Kieker framework Peer C. Brauer Wilhelm Hasselbring Software Engineering Group, University of Kiel, Christian-Albrechts-Platz
Log management with Graylog2 Lennart Koopmann, FrOSCon 2012. Mittwoch, 29. August 12
Log management with Graylog2 Lennart Koopmann, FrOSCon 2012 About me 24 years old, Software Engineer at XING AG Hamburg, Germany @_lennart Graylog2 Free and open source log management system Started in
Log management with Graylog2 Lennart Koopmann, Kieker Days 2012. Mittwoch, 5. Dezember 12
Log management with Graylog2 Lennart Koopmann, Kieker Days 2012 About me 24 years old, Software Engineer at XING AG Hamburg, Germany @_lennart Graylog2 Free and open source log management system Started
Monitoring Drupal with Sensu. John VanDyk Iowa State University DrupalCorn Iowa City August 10, 2013
Monitoring Drupal with Sensu John VanDyk Iowa State University DrupalCorn Iowa City August 10, 2013 What is Sensu? Sensu architecture Sensu server Sensu client Drupal and Sensu Q: What is Sensu? A: A monitoring
PREDICTING SUCCESS IN THE COMPUTER SCIENCE DEGREE USING ROC ANALYSIS
PREDICTING SUCCESS IN THE COMPUTER SCIENCE DEGREE USING ROC ANALYSIS Arturo Fornés [email protected], José A. Conejero [email protected] 1, Antonio Molina [email protected], Antonio Pérez [email protected],
Development of a Concurrent and Distributed Analysis Framework for Kieker
Development of a Concurrent and Distributed Analysis Framework for Kieker Master s Thesis Nils Christian Ehmke October 5, 213 Kiel University Department of Computer Science Software Engineering Group Advised
Predictive Analytics
Predictive Analytics How many of you used predictive today? 2015 SAP SE. All rights reserved. 2 2015 SAP SE. All rights reserved. 3 How can you apply predictive to your business? Predictive Analytics is
Topology Aware Analytics for Elastic Cloud Services
Topology Aware Analytics for Elastic Cloud Services [email protected] Master Thesis Presentation May 28 th 2015, Department of Computer Science, University of Cyprus In Brief.. a Tool providing Performance
Knowledge Discovery and Data Mining
Knowledge Discovery and Data Mining Lecture 15 - ROC, AUC & Lift Tom Kelsey School of Computer Science University of St Andrews http://tom.home.cs.st-andrews.ac.uk [email protected] Tom Kelsey ID5059-17-AUC
OpenAdmin Tool for Informix (OAT) October 2012
OpenAdmin Tool for Informix (OAT) October 2012 What is OpenAdmin Tool for Informix? OAT is a web-based administration tool for the IBM Informix database server A single OAT installation can administer
ANALYTICS IN BIG DATA ERA
ANALYTICS IN BIG DATA ERA ANALYTICS TECHNOLOGY AND ARCHITECTURE TO MANAGE VELOCITY AND VARIETY, DISCOVER RELATIONSHIPS AND CLASSIFY HUGE AMOUNT OF DATA MAURIZIO SALUSTI SAS Copyr i g ht 2012, SAS Ins titut
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University
CSC574 - Computer and Network Security Module: Intrusion Detection
CSC574 - Computer and Network Security Module: Intrusion Detection Prof. William Enck Spring 2013 1 Intrusion An authorized action... that exploits a vulnerability... that causes a compromise... and thus
Data Mining Algorithms Part 1. Dejan Sarka
Data Mining Algorithms Part 1 Dejan Sarka Join the conversation on Twitter: @DevWeek #DW2015 Instructor Bio Dejan Sarka ([email protected]) 30 years of experience SQL Server MVP, MCT, 13 books 7+ courses
The ADOxx Metamodelling Platform Workshop "Methods as Plug-Ins for Meta-Modelling" in conjunction with "Modellierung 2010", Klagenfurt
The ADOxx Metamodelling Platform Workshop "Methods as Plug-Ins for Meta-Modelling" in conjunction with "Modellierung 2010", Klagenfurt Dr. Harald Kühn 24.03.2010 Agenda 1 Overview 2 Deployment and Integration
An Introduction to SAS Enterprise Miner and SAS Forecast Server. André de Waal, Ph.D. Analytical Consultant
SAS Analytics Day An Introduction to SAS Enterprise Miner and SAS Forecast Server André de Waal, Ph.D. Analytical Consultant Agenda 1. Introduction to SAS Enterprise Miner 2. Basics 3. Enterprise Miner
Continuous Integration in Kieker
28. November 2014 @ Stuttgart, Germany Continuous Integration in Kieker (Experience Report) Nils Christian Ehmke, Christian Wulf, and Wilhelm Hasselbring Software Engineering Group, Kiel University, Germany
Data Mining - The Next Mining Boom?
Howard Ong Principal Consultant Aurora Consulting Pty Ltd Abstract This paper introduces Data Mining to its audience by explaining Data Mining in the context of Corporate and Business Intelligence Reporting.
Automatic Extraction of Probabilistic Workload Specifications for Load Testing Session-Based Application Systems
Bratislava, Slovakia, 2014-12-10 Automatic Extraction of Probabilistic Workload Specifications for Load Testing Session-Based Application Systems André van Hoorn, Christian Vögele Eike Schulz, Wilhelm
Bernd Ahlers Michael Friedrich. Log Monitoring Simplified Get the best out of Graylog2 & Icinga 2
Bernd Ahlers Michael Friedrich Log Monitoring Simplified Get the best out of Graylog2 & Icinga 2 BEFORE WE START Agenda AGENDA Introduction Tools Log History Logs & Monitoring Demo The Future Resources
TDAQ Analytics Dashboard
14 October 2010 ATL-DAQ-SLIDE-2010-397 TDAQ Analytics Dashboard A real time analytics web application Outline Messages in the ATLAS TDAQ infrastructure Importance of analysis A dashboard approach Architecture
Performance Benchmarking of Application Monitoring Frameworks
Performance Benchmarking of Application Monitoring Frameworks Jan Waller 2014/5 Kiel Computer Science Series Performance Benchmarking of Application Monitoring Frameworks Dissertation Jan Waller Dissertation
the missing log collector Treasure Data, Inc. Muga Nishizawa
the missing log collector Treasure Data, Inc. Muga Nishizawa Muga Nishizawa (@muga_nishizawa) Chief Software Architect, Treasure Data Treasure Data Overview Founded to deliver big data analytics in days
Self-Adaptive Performance Monitoring for Component-Based Software Systems. Jens Ehlers
Self-Adaptive Performance Monitoring for Component-Based Software Systems Jens Ehlers Dissertation zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften (Dr.-Ing.) der Technischen Fakultät
Optimize for Infrastructure Moving from reactive to proactive IT infrastructure management
Optimize for Infrastructure Moving from reactive to proactive IT infrastructure management Becky Albin Chief IT Architect Optimize for Infrastructure Mainframe Edition Agenda October 9, 2012 2 What is
Double guard: Detecting Interruptions in N- Tier Web Applications
Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2014-2018 ISSN: 2249-6645 Double guard: Detecting Interruptions in N- Tier Web Applications P. Krishna Reddy 1, T. Manjula 2, D. Srujan Chandra Reddy 3, T. Dayakar
Azure Machine Learning, SQL Data Mining and R
Azure Machine Learning, SQL Data Mining and R Day-by-day Agenda Prerequisites No formal prerequisites. Basic knowledge of SQL Server Data Tools, Excel and any analytical experience helps. Best of all:
Online Reviews as First Class Artifacts in Mobile App Development
Online Reviews as First Class Artifacts in Mobile App Development Claudia Iacob (1), Rachel Harrison (1), Shamal Faily (2) (1) Oxford Brookes University Oxford, United Kingdom {iacob, rachel.harrison}@brookes.ac.uk
A Software Development Platform for SOA
A Software Development Platform for SOA Peter Eeles Executive IT Architect Rational Brand Architect for UK, Ireland and South Africa [email protected] 2004 IBM Corporation Agenda IBM Software Group
SaPHAL Sales Prediction powered by HANA and Predictive Analytics
SaPHAL Sales Prediction powered by HANA and Predictive Analytics 1 SaPHAL Sales Prediction Powered by HANA and Predictive Analytics 1 Introduction - SaPHAL Agenda 2 3 4 Business Case Pain Points & Solution
GRNET NOC In-house management tools
http://www.grnet.gr GRNET NOC In-house management tools TF-NOC George Kargiotakis ([email protected]) Andreas Polyrakis ([email protected]) Leonidas Poulopoulos ([email protected]) TF-NOC 2 Automation
Enabling Continuous Delivery for Java Projects with Oracle Cloud Services (Oracle PaaS) Siva Rama Krishna Oracle India
Enabling Continuous Delivery for Java Projects with Oracle Services (Oracle PaaS) Siva Rama Krishna Oracle India Agenda What is Continuous Delivery? What is Oracle PaaS? Enabling Continuous Delivery with
Application Testing Suite Oracle Load Testing Introduction
Application Testing Suite Oracle Load Testing Introduction ATS Load Testing Workshop Bangalore, India September 24 / 25 2012 Yutaka Takatsu ATS Group Product Manager Oracle Enterprise Manager - ATS 1 Agenda
1. Classification problems
Neural and Evolutionary Computing. Lab 1: Classification problems Machine Learning test data repository Weka data mining platform Introduction Scilab 1. Classification problems The main aim of a classification
Evaluation & Validation: Credibility: Evaluating what has been learned
Evaluation & Validation: Credibility: Evaluating what has been learned How predictive is a learned model? How can we evaluate a model Test the model Statistical tests Considerations in evaluating a Model
DATA CENTER INFRASTRUCTURE MANAGEMENT
THE nlyte SOLUTION nlyte Software was founded by data center professionals for data center professionals and is the independent provider of data center infrastructure Management (DCIM) solutions. The nlyte
GECO: Automatic Generator-Composition for (Aspect-oriented) DSLs
GECO: Automatic Generator-Composition for (Aspect-oriented) DSLs Doctoral Symposium Reiner Jung Christian-Albrechts-Universität zu Kiel Institut für Informatik 26.02.2014 Domain-specific Languages Motivation
Data Mining + Business Intelligence. Integration, Design and Implementation
Data Mining + Business Intelligence Integration, Design and Implementation ABOUT ME Vijay Kotu Data, Business, Technology, Statistics BUSINESS INTELLIGENCE - Result Making data accessible Wider distribution
SAP Central Process Scheduling (CPS) 8.0 by Redwood
SAP Central Process Scheduling (CPS) 8.0 by Redwood What s new in SAP CPS 8.0? November 2010 Agenda 1. SAP Central Process Scheduling by Redwood Architecture Overview 2. Enhanced User Interface 3. New
Disrupting The Market: Predictive Analytics As A Service
Disrupting The Market: Predictive Analytics As A Service 0 Problem 8.7 Billion Connected Devices 1 Growing 25% Annually What Does This Data Tell Us About Sensor Use? 1 Study conducted by Cisco 1 Solution
Log management with Logstash and Elasticsearch. Matteo Dessalvi
Log management with Logstash and Elasticsearch Matteo Dessalvi HEPiX 2013 Outline Centralized logging. Logstash: what you can do with it. Logstash + Redis + Elasticsearch. Grok filtering. Elasticsearch
Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems
Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Erik J Bowman Principal Technologist Advanced Technology Group 24 September 2009 Agenda Problem Statements Research
IDENTIFIC ATION OF SOFTWARE EROSION USING LOGISTIC REGRESSION
http:// IDENTIFIC ATION OF SOFTWARE EROSION USING LOGISTIC REGRESSION Harinder Kaur 1, Raveen Bajwa 2 1 PG Student., CSE., Baba Banda Singh Bahadur Engg. College, Fatehgarh Sahib, (India) 2 Asstt. Prof.,
Hardware Performance Optimization and Tuning. Presenter: Tom Arakelian Assistant: Guy Ingalls
Hardware Performance Optimization and Tuning Presenter: Tom Arakelian Assistant: Guy Ingalls Agenda Server Performance Server Reliability Why we need Performance Monitoring How to optimize server performance
Predicting Deadline Transgressions Using Event Logs
Predicting Deadline Transgressions Using Event Logs Anastasiia Pika 1, Wil M. P. van der Aalst 2,1, Colin J. Fidge 1, Arthur H. M. ter Hofstede 1,2, and Moe T. Wynn 1 1 Queensland University of Technology,
IDS for SAP. Application Based IDS Reporting in the ERP system SAP R/3
IDS for SAP Application Based IDS Reporting in the ERP system SAP R/3 1 Research Question How is the performance of this SAP IDS when running with reduction of false positives and anonymization? Hypothesis
AxiomEPM Training Axiom Dashboards Darryl Fleck
AxiomEPM Training Axiom Dashboards Darryl Fleck 1 Housekeeping Maximize your viewing window Q&A: submit any number of questions 2012 Axiom EPM All rights reserved Housekeeping Asking Questions We will
EVERYTHING THAT MATTERS IN ADVANCED ANALYTICS
EVERYTHING THAT MATTERS IN ADVANCED ANALYTICS Marcia Kaufman, Principal Analyst, Hurwitz & Associates Dan Kirsch, Senior Analyst, Hurwitz & Associates Steve Stover, Sr. Director, Product Management, Predixion
Distack. Towards Understanding the Global Behavior of DDoS Attacks A Framework for Distributed Attack Detection and Beyond
Distack Towards Understanding the Global Behavior of DDoS Attacks A Framework for and Beyond Thomas Gamer, Christoph P. Mayer, Martina Zitterbart 29. Aug 2008, EURECOM, France, (TH) Karlsruhe Institute
Big Data in Education
Big Data in Education Alex J. Bowers, Ph.D. Associate Professor of Education Leadership Teachers College, Columbia University April 24, 2014 Schutt, R., & O'Neil, C. (2013). Doing Data Science: Straight
Data Analysis with MATLAB. 2013 The MathWorks, Inc. 1
Data Analysis with MATLAB 2013 The MathWorks, Inc. 1 Agenda Introduction Data analysis with MATLAB and Excel Break Developing applications with MATLAB Solving larger problems Summary 2 Modeling the Solar
ACCELRYS DISCOVERANT
CATALOG ACCELRYS DISCOVERANT 2013 COURSE CATALOG We are proud to offer a variety of courses to meet your organization s needs. These classes are designed to teach everything from the basics of navigation
Data Mining mit der JMSL Numerical Library for Java Applications
Data Mining mit der JMSL Numerical Library for Java Applications Stefan Sineux 8. Java Forum Stuttgart 07.07.2005 Agenda Visual Numerics JMSL TM Numerical Library Neuronale Netze (Hintergrund) Demos Neuronale
ANALYTICS IN BIG DATA ERA
ANALYTICS IN BIG DATA ERA ANALYTICS TECHNOLOGY AND ARCHITECTURE TO MANAGE VELOCITY AND VARIETY, DISCOVER RELATIONSHIPS AND CLASSIFY HUGE AMOUNT OF DATA MAURIZIO SALUSTI SAS Copyr i g ht 2012, SAS Ins titut
Logging on a Shoestring Budget
UNIVERSITY OF NEBRASKA AT OMAHA Logging on a Shoestring Budget James Harr [email protected] Agenda The Tools ElasticSearch Logstash Kibana redis Composing a Log System Q&A, Conclusions, Lessons Learned
Data Mining Application in Direct Marketing: Identifying Hot Prospects for Banking Product
Data Mining Application in Direct Marketing: Identifying Hot Prospects for Banking Product Sagarika Prusty Web Data Mining (ECT 584),Spring 2013 DePaul University,Chicago [email protected] Keywords:
The Internet of Things
The Internet of Things Vijay Sethia Senior Product Manager, IBM Software Group 2014 IBM Corporation Agenda The Internet of Things The IBM IoT On-Prem Cloud Sample IoT Application 1 The Internet of Things
Scalable Application. Mikalai Alimenkou http://xpinjection.com 11.05.2012
Scalable Application Development on AWS Mikalai Alimenkou http://xpinjection.com 11.05.2012 Background Java Technical Lead/Scrum Master at Zoral Labs 7+ years in software development 5+ years of working
White Paper. How Streaming Data Analytics Enables Real-Time Decisions
White Paper How Streaming Data Analytics Enables Real-Time Decisions Contents Introduction... 1 What Is Streaming Analytics?... 1 How Does SAS Event Stream Processing Work?... 2 Overview...2 Event Stream
The SAP Business One Mobile Application for iphone and ipad. August 2011
The SAP Business One Mobile Application for iphone and ipad August 2011 This mobile application allows you to interact anytime and anywhere with the integrated business management application for small
automated acceptance testing of mobile apps
automated acceptance testing of mobile apps Karl Krukow, CTO, LessPainful Goto Aarhus, 2012 [email protected], @karlkrukow 1 Agenda Automated testing for mobile desirable properties for an acceptance
Health Care and Life Sciences
Sensitivity, Specificity, Accuracy, Associated Confidence Interval and ROC Analysis with Practical SAS Implementations Wen Zhu 1, Nancy Zeng 2, Ning Wang 2 1 K&L consulting services, Inc, Fort Washington,
Data Mining For Intrusion Detection in Mobile Systems
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727Volume 6, Issue 5 (Nov. - Dec. 2012), PP 42-47 Data Mining For Intrusion Detection in Mobile Systems 1, Seyed Hasan Mortazavi
SIMPLE MACHINE HEURISTIC INTELLIGENT AGENT FRAMEWORK
SIMPLE MACHINE HEURISTIC INTELLIGENT AGENT FRAMEWORK Simple Machine Heuristic (SMH) Intelligent Agent (IA) Framework Tuesday, November 20, 2011 Randall Mora, David Harris, Wyn Hack Avum, Inc. Outline Solution
Online Ensembles for Financial Trading
Online Ensembles for Financial Trading Jorge Barbosa 1 and Luis Torgo 2 1 MADSAD/FEP, University of Porto, R. Dr. Roberto Frias, 4200-464 Porto, Portugal [email protected] 2 LIACC-FEP, University of
Data Logging and Realtime Visualization
Data Logging and Realtime Visualization Strategies for complex vehicle testing Testing Expo Stuttgart 2013-06-05 [email protected] Copyright TTTech Computertechnik AG. All rights reserved.
How To Monitor A Server With Zabbix
& JavaEE Platform Monitoring A Good Match? Company Facts Jesta Digital is a leading global provider of next generation entertainment content and services for the digital consumer. subsidiary of Jesta Group,
DTK and Connector Architecture
and Connector Architecture Server provides a highly extensible platform by utilizing configurable Connectors. Each Connector provides specific functionality enabling rapid and flexible integration. Client
Effect of Network Traffic on IPS Performance
Journal of Information Security, 2012, 3, 162-168 http://dx.doi.org/10.4236/jis.2012.32019 Published Online April 2012 (http://www.scirp.org/journal/jis) Effect of Network Traffic on IPS Performance Shahriar
Chapter 6. The stacking ensemble approach
82 This chapter proposes the stacking ensemble approach for combining different data mining classifiers to get better performance. Other combination techniques like voting, bagging etc are also described
April 2016 JPoint Moscow, Russia. How to Apply Big Data Analytics and Machine Learning to Real Time Processing. Kai Wähner. kwaehner@tibco.
April 2016 JPoint Moscow, Russia How to Apply Big Data Analytics and Machine Learning to Real Time Processing Kai Wähner [email protected] @KaiWaehner www.kai-waehner.de LinkedIn / Xing Please connect!
Feature Subset Selection in E-mail Spam Detection
Feature Subset Selection in E-mail Spam Detection Amir Rajabi Behjat, Universiti Technology MARA, Malaysia IT Security for the Next Generation Asia Pacific & MEA Cup, Hong Kong 14-16 March, 2012 Feature
Health monitoring & predictive analytics To lower the TCO in a datacenter
Health monitoring & predictive analytics To lower the TCO in a datacenter PRESENTATION TITLE GOES HERE Christian B Madsen & Andrei Khurshudov Seagate Technology [email protected] Outline 1.
Automating Healthcare Claim Processing
Automating Healthcare Claim Processing How Splunk Software Helps to Manage and Control Both Processes and Costs CUSTOMER PROFILE Splunk customer profiles are a collection of innovative, in-depth use cases
Open-Source-Software als Katalysator im Technologietransfer am Beispiel des Monitoring-Frameworks
Open-Source-Software als Katalysator im Technologietransfer am Beispiel des -Frameworks Wilhelm Hasselbring 1 & André van Hoorn 2 1 Kiel University (CAU) Software Engineering Group & 2 University of Stuttgart
Data Mining. Nonlinear Classification
Data Mining Unit # 6 Sajjad Haider Fall 2014 1 Nonlinear Classification Classes may not be separable by a linear boundary Suppose we randomly generate a data set as follows: X has range between 0 to 15
How To Cluster
Data Clustering Dec 2nd, 2013 Kyrylo Bessonov Talk outline Introduction to clustering Types of clustering Supervised Unsupervised Similarity measures Main clustering algorithms k-means Hierarchical Main
<Insert Picture Here> Oracle SQL Developer 3.0: Overview and New Features
1 Oracle SQL Developer 3.0: Overview and New Features Sue Harper Senior Principal Product Manager The following is intended to outline our general product direction. It is intended
