{"id":1895,"date":"2020-11-24T10:36:57","date_gmt":"2020-11-24T09:36:57","guid":{"rendered":"https:\/\/blog.outscale.com\/?p=1895"},"modified":"2022-02-17T17:44:12","modified_gmt":"2022-02-17T16:44:12","slug":"automated-anomaly-detection-in-cloud-infrastructure","status":"publish","type":"post","link":"https:\/\/blog.outscale.com\/en\/automated-anomaly-detection-in-cloud-infrastructure\/","title":{"rendered":"Automated Anomaly Detection in Cloud Infrastructure"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1895\" class=\"elementor elementor-1895 elementor-1891\">\n\t\t\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-2115d9da elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2115d9da\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-511e6b57\" data-id=\"511e6b57\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6fd50a7f elementor-widget elementor-widget-text-editor\" data-id=\"6fd50a7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>While striving to support the education and development of young talent, 3DS OUTSCALE regularly conducts a number of actions in schools. The visits of 3DS OUTSCALE employees to schools are a means of presenting career opportunities in the digital industry. OUTSCALE for Women program destined to young women aims to inform on digital careers and thus promote employment diversity. In addition, numerous collaborative projects intend on offering students a qualitative practical framework for them to conduct research work. This is the case for this collaborative project between 3DS OUTSCALE and the ISEP engineering school that I am going to unveil in this article along with the benefits it brings to both the industry and the higher education institution.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Historically, a logbook refers to a set of registers used by ship crews to chronologically record a variety of events, such as a change of course or the loading of goods. These registers were then used by inspectors to trace operations in search of potential frauds or errors.<\/span><\/p><p><span style=\"font-weight: 400;\"><br><\/span><\/p>\n<p><b>Ubiquitous Traceability in IT<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Event logging also exists in the IT world, with timestamps being produced each time a significant action occurs. The thereby generated registers, called log files, make up a valuable source of information for system analysis and monitoring. Controlling these files helps retrace the different stages of a process in search of an anomaly that could potentially be at the root of a system failure, an application crash or any other event impacting quality of service, and thus improve performance and customer experience.<\/span><\/p><p><span style=\"font-weight: 400;\"><br><\/span><\/p>\n<p><b>Processing Hundreds of Thousands of Events per Second: Mission (Almost) Impossible<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In the context of Cloud computing, processing log files can be challenging. First of all, because of the substantial volumetry, represented by the generation of hundreds of thousands of log lines each second. Second of all, because of the disparity of messages, each source having its own log structure and the generated message types being likely to vary in time.&nbsp;<\/span><\/p><p><span style=\"font-weight: 400;\"><br><\/span><\/p>\n<p><b>A Vast Technical and Technological Challenge<\/b><\/p>\n<p><span style=\"font-weight: 400;\">To address these issues that make solely manual control impossible, administrators look for predefined patterns corresponding to known abnormal behaviors. However, this requires prior knowledge of the said errors, which is not possible in the case of new anomalies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hence the importance of developing autonomous systems capable of detecting anomalies efficiently (accuracy), in near-real time (ms order), whilst maintaining performance over time.&nbsp; This last criterion is particularly crucial in guaranteeing the autonomy of the solution and its suitability in the long run. Such systems must also be able to identify the context and type of the anomaly with great accuracy in order to notify the appropriate team for action.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As part of my dissertation, I am working on the detection of anomalies in Cloud infrastructure based on logs. My aim is to take part in the conception of an autonomous system, particularly to ensure its capacity to adapt to the high volumetry and variability constraints of 3DS OUTSCALE\u2019s logs.<\/span><\/p><p><span style=\"font-weight: 400;\"><br><\/span><\/p>\n<p><b>Deep Learning and Neural Networks at the Service of Anomaly Detection<\/b><\/p>\n<p><span style=\"font-weight: 400;\">To achieve this, I am taking a close look at deep learning. The use of convolutional neural networks has paved the way for facial recognition and the development of autonomous cars. LSTM (long short-term memory) neural networks are fundamental in the rise of spell checkers that rely on the context of a word or a sentence.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Deep learning for anomaly detection has shown its first results with the use of LSTM network stacks. However, the corresponding works are relatively recent and subject to improvement, the pre-processing of logs being, in my opinion, still underutilized, as is the analysis of an anomaly\u2019s context.<\/span><\/p><p><span style=\"font-weight: 400;\"><br><\/span><\/p>\n<p><b>A Winning Collaboration for the Industry and the Scientific World<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The practical framework provided by 3DS OUTSCALE is ideal for conducting research work. Access to large volumes of data and to substantial computing power is key in deep learning research. This also means being in regular contact with domain experts and making the most of their knowledge. The work will be carried out as part of a collaboration between 3DS OUTSCALE and the <a href=\"https:\/\/www.isep.fr\/chaire-outscale\/\"><u>LISITE-ISEP research laboratory<\/u><\/a>. The latter had already made anomaly detection one of its main concerns and will be able to leverage the partnership to develop its research activity.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>While striving to support the education and development of young talent, 3DS OUTSCALE regularly conducts a&hellip;<\/p>\n","protected":false},"author":14,"featured_media":1893,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[34],"tags":[],"class_list":["post-1895","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.outscale.com\/en\/wp-json\/wp\/v2\/posts\/1895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.outscale.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.outscale.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.outscale.com\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.outscale.com\/en\/wp-json\/wp\/v2\/comments?post=1895"}],"version-history":[{"count":17,"href":"https:\/\/blog.outscale.com\/en\/wp-json\/wp\/v2\/posts\/1895\/revisions"}],"predecessor-version":[{"id":3544,"href":"https:\/\/blog.outscale.com\/en\/wp-json\/wp\/v2\/posts\/1895\/revisions\/3544"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.outscale.com\/en\/wp-json\/wp\/v2\/media\/1893"}],"wp:attachment":[{"href":"https:\/\/blog.outscale.com\/en\/wp-json\/wp\/v2\/media?parent=1895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.outscale.com\/en\/wp-json\/wp\/v2\/categories?post=1895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.outscale.com\/en\/wp-json\/wp\/v2\/tags?post=1895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}