Informatics and Applications
2021, Volume 15, Issue 3, pp 2-8
REMOTE MONITORING OF WORKFLOWS
- A. A. Grusho
- N. A. Grusho
- M. I. Zabezhailo
- E. E. Timonina
Abstract
The paper discusses the workflows control scheme in the distributed information system which is economical in terms of the amount of information provided to the remote system administrator or security officer.
The proposed scheme allows automation of control, is based on real experience of the system administrator, and allows implementing logic of determination, classification, and approximating localization of anomalies. The system administrator receives information about the operation of the distributed information system through the communication channels. In operation, it is assumed that the sources of messages for the system administrator are sensors. Sensors are entities capable of recognizing information received at the input of sensor-related transformation of information, that is, if the transformation receives information at the input, then the sensor recognizes the fact and time of transmitting the input information to the first transformation of the block in which it is located within the framework of the information technology being implemented. The scheme is based on the calculation and analysis of the moments when the sensor "sees" the transfer of data to the transformation input in a particular instance of information technology. The characteristics of the approach to workflows monitoring are estimations of systematic process delays and analysis of outages using "parallel" sensors. The constructed scheme allows one to dynamically detail the control to clarify the approximate location of the anomaly.
[+] References (9)
- Srikanth, T., P. Branch, J. Jin, and J. Singh. 2020. A comprehensive survey of anomaly detection techniques for high dimensional big data. J. Big Data 7:42. 30 p. doi: 10.1186/s40537-020-00320-x.
- Dereszynski, E. W., and T. G. Dietterich. 2012. Probabilistic models for anomaly detection in remote sensor data streams. arXiv.org. 8 p. Available at: https://arxiv.org/ ftp/arxiv/papers/1206/1206.5250.pdf (accessed July 9, 2021).
- Shkodyrev, V., K. Yagafarov, V. Bashtovenko, and E. Ilyina. 2017. Obzor metodov obnaruzheniya anomaliy v potokakh dannykh [The overview of anomaly detection methods in data streams]. CEUR Workshop Procee. 1864:8. 7 p.
- Hooi, B. 2019. Anomaly detection in graphs and time series: Algorithms and applications. Pittsburgh, PA: Carnegie Mellon University. PhD Thesis. 222 p. Available at: http:// reports-archive.adm.cs.cmu.edu/anon/ml2019/CMU- ML-19-100.pdf (accessed August 7, 2021).
- Samuylov, K. E., A. V. Chukarin, and N. V. Yarkina. 2009. Biznes-protsessy i informatsionnye tekhnologii v upravlenii telekommunikatsionnymi kompaniyami [Business processes and information technologies in management of the
telecommunication companies]. Moscow: Alpina Publs. 442 p.
- Grusho, A., N. Grusho, M. Zabezhailo, E. Timonina, and V. Senchilo. 2021. Metadata for root cause analysis. Communications ECMS 35(1):267-271. doi: 10.7148/ 2021-0267.
- Brandon, A., M. Sole, A. Huelamo, D. Solans, M. S. Perez, and V. Muntes-Mulero. 2020. Graph-based root cause analysis for service-oriented and microservice architectures. J. Syst. Software 159:110432. 17 p. doi: 10.1016/j.jss. 2019.110432.
- Grusho, A., N. Grusho, M. Zabezhailo, and E. Tim- onina. 2020. Generation of metadata for network control. Distributedcomputerandcommunication networks. Eds. VM. Vishnevskiy, K. E. Samouylov, and D.V. Kozyrev Lecture notes in computer science ser. Springer, Cham. 12563:723-735. doi: 10.1007/978-3-030-66471-8_55.
- Grusho, N.A., A. A. Grusho, M. I. Zabezhailo, and E. E. Timonina. 2020. Metody nakhozhdeniya prichin sboev v informatsionnykh tekhnologiyakh s pomoshch'yu metadannykh [Methods of finding the causes of information technology failures by means of meta data]. Infor- matika i ee Primeneniya - Inform. Appl. 14(2):33-39. doi: 10.14357/19922264200205.
[+] About this article
Title
REMOTE MONITORING OF WORKFLOWS
Journal
Informatics and Applications
2021, Volume 15, Issue 3, pp 2-8
Cover Date
2021-09-30
DOI
10.14357/19922264210301
Print ISSN
1992-2264
Publisher
Institute of Informatics Problems, Russian Academy of Sciences
Additional Links
Key words
information security; remote monitoring of information system; evaluation of monitoring data by information characteristics
Authors
A. A. Grusho , N. A. Grusho , M. I. Zabezhailo , and E. E. Timonina
Author Affiliations
Institute of Informatics Problems, Federal Research Center "Computer Science and Control" of the Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
Federal Research Center "Computer Science and Control" of the Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
|