Contention Detection by Throttling: a Black-box On-line Approach

被引:0
|
作者
Vallone, Joel [1 ,2 ]
Birke, Robert [2 ]
Chen, Lydia Y. [2 ]
Falsafi, Babak [1 ]
机构
[1] Ecole Polytech Fed Lausanne, Sch Comp & Commun Sci, Lausanne, Switzerland
[2] IBM Res Zurich, Cloud Server Technol Grp, Ruschlikon, Switzerland
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Virtualization technology powers up the cloud computing paradigm and inevitably raises concerns about performance isolation of collocated virtual machines (VM). It is imperative for public cloud providers to guarantee performance targets for tenants' VMs while respecting strict business confidentiality, e.g., having no information on applications nor their performance. A large body of related work addresses the challenges of detecting performance interferences by leveraging client's quality of service (QoS) metrics, such as latency, and additional profiling servers. Whereas to assist cloud providers, we resort to an on-line black-box approach based on throttling that detects a wide range of resource contentions with no cooperation need from the virtual machines. We focus on different resource metrics and actively monitor them from the hypervisor in fine time granularity at low cost. To detect resource contention, we propose a three-phase algorithm: an alarm phase, to identify statistical outliers in the victim's VM resource metrics; a passive diagnosis phase, to match the current sample to historical behaviors; and, an active learning phase, to discern contentions from application phase changes via throttling. We evaluate our algorithm on a prototype running Wikimedia as victim application across a set of VMs collocated with neighboring VMs running resource hoggers, i.e. PARSEC and Cachebench. Our extensive experimental results show that we can reach an average detection accuracy above 90% while limiting the performance degradation experienced by offender workloads to short learning phases.
引用
收藏
页码:237 / 242
页数:6
相关论文
共 50 条
  • [1] A Combined On-Line/Off-Line Framework for Black-Box Fault Diagnosis
    Tripakis, Stavros
    RUNTIME VERIFICATION, 2009, 5779 : 152 - 167
  • [2] On-Line Black-Box Aerodynamic Performance Optimization for a Morphing Wing With Distributed Sensing and Control
    Mkhoyan, Tigran
    Ruland, Oscar
    De Breuker, Roeland
    Wang, Xuerui
    IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2023, 31 (03) : 1063 - 1077
  • [3] Finding Needles in a Haystack: A Black-Box Approach to Invisible Watermark Detection
    Pan, Minzhou
    Wang, Zhenting
    Dong, Xin
    Sehwag, Vikash
    Lyu, Lingjuan
    Lin, Xue
    COMPUTER VISION - ECCV 2024, PT XXXIII, 2025, 15091 : 253 - 270
  • [4] Mitch: A Machine Learning Approach to the Black-Box Detection of CSRF Vulnerabilities
    Calzavara, Stefano
    Conti, Mauro
    Focardi, Riccardo
    Rabitti, Alvise
    Tolomei, Gabriele
    2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 528 - 543
  • [5] THE BLACK-BOX
    KYLE, SA
    NEW SCIENTIST, 1986, 110 (1512) : 61 - 61
  • [6] THE BLACK-BOX
    WISEMAN, J
    ECONOMIC JOURNAL, 1991, 101 (404): : 149 - 155
  • [7] Automated black-box boundary value detection
    Dobslaw F.
    Feldt R.
    de Oliveira Neto F.G.
    PeerJ Computer Science, 2023, 9
  • [8] Automated black-box boundary value detection
    Dobslaw, Felix
    Feldt, Robert
    Neto, Francisco Gomes de Oliveira
    PEERJ COMPUTER SCIENCE, 2023, 9
  • [9] Explaining Black-box Android Malware Detection
    Melis, Marco
    Maiorca, Davide
    Biggio, Battista
    Giacinto, Giorgio
    Roli, Fabio
    2018 26TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2018, : 524 - 528
  • [10] A Black-Box Approach for Detecting the Failure Traces
    Meng, You
    Yu, Lang
    Luan, Zhongzhi
    Qian, Depei
    Xie, Ming
    Du, Zhigao
    TRUSTWORTHY COMPUTING AND SERVICES, 2014, 426 : 252 - 259