Microservice architecture has advantages such as independent development, independent deployment, scalability, and reusability. However, due to its complexity and large scale, faults are inevitable during the operation of microservice system. Although the multi-source data generated by the system provides an overall description of the system, existing research methods are aimed at single data sources and ignore the correlation information between multi-source data. In this paper, a novel anomaly detection approach is introduced, incorporating a multi-level attention mechanism and a multi-scale convolutional neural network. This approach effectively captures the patterns and dependencies within both logs data and KPI data, enabling accurate detection of anomalies. For this purpose, A feature extraction module is designed for log features with multiple influencing factors, and another feature extraction module for KPI features with a multi-scale attention network. Then these features are input in parallel to the attention network for weighted fusion and anomaly detection. We deployed an open-source benchmark microservice system TrainTicket and injected various typical faults to validate our approach. Experimental results show that the approach can identify anomalies more accurately than the existing methods.
Fri 19 AprDisplayed time zone: Lisbon change
15:30 - 16:00 | |||
15:30 30mPoster | Causal Graph Fuzzing for Fair ML Sofware Development Posters Verya Monjezi University of Texas at El Paso, Ashish Kumar , Gang (Gary) Tan Pennsylvania State University, Ashutosh Trivedi University of Colorado Boulder, Saeid Tizpaz-Niari University of Texas at El Paso | ||
15:30 30mPoster | Multi-source Anomaly Detection For Microservice Systems Posters Zhengxin Li Inner Mongolia University, Junfeng Zhao Inner Mongolia University, Jia Kang Inner Mongolia University | ||
15:30 30mPoster | Boosting Individual Fairness through Mahalanobis Distances Guided Boltzmann Exploratory Testing (Extended Abstract) Posters Kaixiang Dong School of Intelligent Science and Technology, Hangzhou Institute for Advanced Study, University of Chinese Academy of Sciences, Hangzhou, China, Peng Wu Institute of Software, Chinese Academy of Sciences, China | ||
15:30 30mPoster | ICLNet: Stepping Beyond Dates for Robust Issue-Commit Link Recovery Posters Abhishek Kumar Indian Institute of Technology Kharagpur, Partha Pratim Das Indian Institute of Technology, Kharagpur, Partha Pratim Chakrabarti Indian Institute of Technology, Kharagpur | ||
15:30 30mPoster | NomNom: Explanatory Function Names for Program Synthesizers Posters Amirmohammad Nazari University of Southern California, Souti Chattopadhyay University of Southern California, Swabha Swayamdipta University of Southern California, Mukund Raghothaman University of Southern California | ||
15:30 30mPoster | Extracting Relevant Test Inputs from Bug Reports for Automatic Test Case Generation Posters Wendkuuni Arzouma Marc Christian OUEDRAOGO University of Luxembourg, Laura Plein University of Luxembourg, Abdoul Kader Kaboré University of Luxembourg, Andrew Habib ABB Corporate Research, Germany, Jacques Klein University of Luxembourg, David Lo Singapore Management University, Tegawendé F. Bissyandé University of Luxembourg | ||
15:30 30mPoster | F-CodeLLM: A Federated Learning Framework for Adapting Large Language Models to Practical Software Development Posters Zeju Cai the School of Software Engineering, Sun Yat-sen University, China, Jianguo Chen the School of Software Engineering, Sun Yat-sen University, China, Wenqing Chen Sun Yat-sen University, Weicheng Wang the School of Software Engineering, Sun Yat-sen University, China, Zibin Zheng Sun Yat-sen University | ||
15:30 30mPoster | How are Contracts Used in Android Mobile Applications? Posters David R. Ferreira Faculty of Engineering, University of Porto, Alexandra Mendes University of Porto and HASLab, INESC TEC, João F. Ferreira INESC-ID and IST, University of Lisbon | ||
15:30 30mPoster | Creating Fair Software: Identifying and Mitigating Bias in Machine Learning Models through Counterfactual Thinking Posters Zhipeng Yin Florida International University, Zichong Wang Florida International University, Wenbin Zhang Florida International University | ||
15:30 30mPoster | Automated Security Repair for Helm Charts Posters Francesco Minna Vrije Universiteit Amsterdam, Agathe Blaise Thales SIX GTS France, Fabio Massacci University of Trento; Vrije Universiteit Amsterdam, Katja Tuma Vrije Universiteit Amsterdam | ||
15:30 30mPoster | Path Complexity Analysis for Interprocedural Code Posters Mira Kaniyur Harvey Mudd College, Ana Cavalcante-Studart Harvey Mudd College, Yihan Yang Harvey Mudd College, Sangeon Park Harvey Mudd College, David Chen Harvey Mudd College, Duy Lam Harvey Mudd College, Lucas Bang Harvey Mudd College | ||
15:30 30mPoster | NL2Fix: Generating Functionally Correct Code Edits from Bug Descriptions Posters Sarah Fakhoury Microsoft Research, Saikat Chakraborty Microsoft Research, Madan Musuvathi Microsoft Research, Shuvendu K. Lahiri Microsoft Research |