{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,16]],"date-time":"2024-02-16T13:43:45Z","timestamp":1708091025060},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T00:00:00Z","timestamp":1681689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T00:00:00Z","timestamp":1681689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Containers are light, numerous, and interdependent, which are prone to cascading fault, increasing the probability of fault and the difficulty of detection. Existing detection methods are usually based on a cascade fault model with traditional association analysis. The tradition model lacks consideration of the fault cascade history dimension and container space correlation dimension which results in a lower detection effect. And the imbalance of fault data in the cloud environment to the detection method to bring interference. Instead, this paper proposes a cascade fault detection method based on spatial\u2013temporal correlation in cloud environment. First, the container cascade fault relationship model is constructed by extracting the spatial\u2013temporal correlation from historical container faults. Second, based on dynamic feedback data sampling combined with ensemble learning, a container fault model learning method is designed to solve the imbalance of fault data. Then, a real-time container cascade fault detection mechanism for container cascade failure is proposed. The experimental results show that compared with the existing fault detection methods, the proposed method can effectively improve the detection accuracy, recall rate, and F<jats:sub>1<\/jats:sub> value.<\/jats:p>","DOI":"10.1186\/s13677-023-00438-2","type":"journal-article","created":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T10:08:55Z","timestamp":1681726135000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Container cascade fault detection based on spatial\u2013temporal correlation in cloud environment"],"prefix":"10.1186","volume":"12","author":[{"given":"Ningjiang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Qingwei","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Yifei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Weitao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Liangqing","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,17]]},"reference":[{"key":"438_CR1","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1016\/j.future.2015.09.004","volume":"56","author":"RS Bali","year":"2016","unstructured":"Bali RS, Kumar N (2016) Secure clustering for efficient data dissemination in vehicular cyber\u2013physical systems. Futur Gener Comput Syst 56:476\u2013492","journal-title":"Futur Gener Comput Syst"},{"issue":"11","key":"438_CR2","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/MCOM.2017.1700102","volume":"55","author":"R Chaudhary","year":"2017","unstructured":"Chaudhary R, Kumar N, Zeadally S (2017) Network service chaining in fog and cloud computing for the 5G environment: data management and security challenges. IEEE Commun Mag 55(11):114\u2013122","journal-title":"IEEE Commun Mag"},{"key":"438_CR3","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1016\/j.future.2018.04.019","volume":"108","author":"S Challa","year":"2020","unstructured":"Challa S, Das AK, Gope P et al (2020) Design and analysis of authenticated key agreement scheme in cloud-assisted cyber\u2013physical systems. Futur Gener Comput Syst 108:1267\u20131286","journal-title":"Futur Gener Comput Syst"},{"key":"438_CR4","unstructured":"The 10 Biggest Cloud Outages of 2020 (So Far) in 2020. pp 6\u201325. https:\/\/www.crn.com\/slide-shows\/cloud\/the-10-biggest-cloud-outages-of-2020-so-far-\/. Accessed 17 May 2022."},{"key":"438_CR5","doi-asserted-by":"crossref","unstructured":"Manu AR, Patel JK, Akhtar S, et al (2016) A study, analysis and deep dive on cloud PAAS security in terms of Docker container security. In: 2016 international conference on circuit, power and computing technologies (ICCPCT). IEEE, Piscataway, pp 1\u201313","DOI":"10.1109\/ICCPCT.2016.7530284"},{"key":"438_CR6","doi-asserted-by":"crossref","unstructured":"Birke R, Giurgiu I, Chen LY, et al (2014) Failure analysis of virtual and physical machines: patterns, causes and characteristics. In: 2014 44th annual IEEE\/IFIP international conference on dependable systems and networks. IEEE, Piscataway, pp 1\u201312","DOI":"10.1109\/DSN.2014.18"},{"key":"438_CR7","doi-asserted-by":"crossref","unstructured":"Ye K, Liu Y, Xu G, et al (2018) Fault injection and detection for artificial intelligence applications in container-based clouds. In: International conference on cloud computing. Springer, Cham, pp 112\u2013127","DOI":"10.1007\/978-3-319-94295-7_8"},{"key":"438_CR8","doi-asserted-by":"crossref","unstructured":"Yuan Z, Zhao P (2019) An improved ensemble learning for imbalanced data classification. In: 2019 IEEE 8th joint international information technology and artificial intelligence conference (ITAIC). IEEE, Piscataway, pp 408\u2013411","DOI":"10.1109\/ITAIC.2019.8785887"},{"key":"438_CR9","doi-asserted-by":"crossref","unstructured":"Das A, Mueller F, Siegel C, et al (2018) Desh: deep learning for system health prediction of lead times to failure in hpc. In: Proceedings of the 27th international symposium on high-performance parallel and distributed computing. pp 40\u201351","DOI":"10.1145\/3208040.3208051"},{"issue":"2","key":"438_CR10","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/s10586-019-02917-1","volume":"22","author":"B Mohammed","year":"2019","unstructured":"Mohammed B, Awan I, Ugail H et al (2019) Failure prediction using machine learning in a virtualised HPC system and application. Clust Comput 22(2):471\u2013485","journal-title":"Clust Comput"},{"issue":"2","key":"438_CR11","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1109\/JAS.2017.7510817","volume":"5","author":"PY Zhang","year":"2018","unstructured":"Zhang PY, Shu S, Zhou MC (2018) An online fault detection model and strategies based on SVM-grid in clouds. IEEE\/CAA J Autom Sin 5(2):445\u2013456","journal-title":"IEEE\/CAA J Autom Sin"},{"key":"438_CR12","doi-asserted-by":"crossref","unstructured":"Le VH, Zhang H (2021) Log-based anomaly detection without log parsing. In: 2021 36th IEEE\/ACM international conference on automated software engineering (ASE). IEEE, Piscataway, pp 492\u2013504","DOI":"10.1109\/ASE51524.2021.9678773"},{"key":"438_CR13","doi-asserted-by":"crossref","unstructured":"Bergroth L, Hakonen H, Raita T (2000) A survey of longest common subsequence algorithms. In: Proceedings seventh international symposium on string processing and information retrieval. SPIRE 2000. IEEE, Piscataway, pp 39\u201348","DOI":"10.1109\/SPIRE.2000.878178"},{"key":"438_CR14","doi-asserted-by":"crossref","unstructured":"Cotroneo D, De Simone L, Liguori P, et al (2019) Enhancing failure propagation analysis in cloud computing systems. In: 2019 IEEE 30th international symposium on software reliability engineering (ISSRE). IEEE, Piscataway, pp 139\u2013150","DOI":"10.1109\/ISSRE.2019.00023"},{"key":"438_CR15","doi-asserted-by":"crossref","unstructured":"Bui DM, Huynh-The T, Lee S (2016) Fuzzy fault detection in IaaS cloud computing. In: Proceedings of the 10th international conference on ubiquitous information management and communication. pp 1\u20136","DOI":"10.1145\/2857546.2857612"},{"key":"438_CR16","doi-asserted-by":"crossref","unstructured":"Wang H, Shen H, Li Z (2018) Approaches for resilience against cascading failures in cloud datacenters. In: 2018 IEEE 38th international conference on distributed computing systems (ICDCS). IEEE, Piscataway, pp 706\u2013717","DOI":"10.1109\/ICDCS.2018.00074"},{"key":"438_CR17","doi-asserted-by":"crossref","unstructured":"Wang T, Zhang W, Wei J, et al (2015) Fault detection for cloud computing systems with correlation analysis. In: 2015 IFIP\/IEEE international symposium on integrated network management (IM). IEEE, Piscataway, pp 652\u2013658","DOI":"10.1109\/INM.2015.7140351"},{"key":"438_CR18","doi-asserted-by":"crossref","unstructured":"Yu S, Chen N, Liang B (2021) Predicting gray fault based on context graph in container-based cloud. In: 2021 IEEE international symposium on software reliability engineering workshops (ISSREW). IEEE, Piscataway, pp 224\u2013234","DOI":"10.1109\/ISSREW53611.2021.00067"},{"key":"438_CR19","unstructured":"Toka L, Dobreff G, Haja D, et al (2021) Predicting cloud-native application failures based on monitoring data of cloud infrastructure. In: 2021 IFIP\/IEEE international symposium on integrated network management (IM). IEEE, Piscataway, pp 842\u2013847"},{"key":"438_CR20","doi-asserted-by":"crossref","unstructured":"Singh P (2019) Learning from software defect datasets. In: 2019 5th international conference on signal processing, computing and control (ISPCC). IEEE, Piscataway, pp 58\u201363","DOI":"10.1109\/ISPCC48220.2019.8988366"},{"key":"438_CR21","unstructured":"Sara A, Wael M, Walid M (2018) Using SMOTE and heterogeneous stacking in ensemble learning for software defect prediction. In: Proceedings of the 7th international conference on software and information engineering. Association for Computing Machinery, New York, p 44\u201347"},{"issue":"1","key":"438_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-019-0192-5","volume":"6","author":"JM Johnson","year":"2019","unstructured":"Johnson JM, Khoshgoftaar TM (2019) Survey on deep learning with class imbalance. J Big Data 6(1):1\u201354","journal-title":"J Big Data"},{"key":"438_CR23","doi-asserted-by":"publisher","first-page":"113232","DOI":"10.1016\/j.eswa.2020.113232","volume":"147","author":"VHA Ribeiro","year":"2020","unstructured":"Ribeiro VHA, Reynoso-Meza G (2020) Ensemble learning by means of a multi-objective optimization design approach for dealing with imbalanced data sets. Expert Syst Appl 147:113232","journal-title":"Expert Syst Appl"},{"issue":"4","key":"438_CR24","first-page":"1","volume":"52","author":"H Kaur","year":"2019","unstructured":"Kaur H, Pannu HS, Malhi AK (2019) A systematic review on imbalanced data challenges in machine learning: applications and solutions. ACM Comput Surv (CSUR) 52(4):1\u201336","journal-title":"ACM Comput Surv (CSUR)"},{"key":"438_CR25","doi-asserted-by":"crossref","unstructured":"Lu C, Ye K, Xu G, et al (2017) Imbalance in the cloud: an analysis on alibaba cluster trace. In: 2017 IEEE international conference on big data (big data). IEEE, Piscataway, pp 2884\u20132892","DOI":"10.1109\/BigData.2017.8258257"},{"key":"438_CR26","doi-asserted-by":"publisher","first-page":"103498","DOI":"10.1016\/j.compind.2021.103498","volume":"131","author":"B Lindemann","year":"2021","unstructured":"Lindemann B, Maschler B, Sahlab N et al (2021) A survey on anomaly detection for technical systems using LSTM networks. Comput Ind 131:103498","journal-title":"Comput Ind"},{"key":"438_CR27","doi-asserted-by":"crossref","unstructured":"Heinrich R, van Hoorn A, Knoche H, et al (2017) Performance engineering for microservices: research challenges and directions. In: Proceedings of the 8th ACM\/SPEC on international conference on performance engineering companion. pp 223\u2013226","DOI":"10.1145\/3053600.3053653"},{"issue":"3","key":"438_CR28","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MS.2018.2141039","volume":"35","author":"P Jamshidi","year":"2018","unstructured":"Jamshidi P, Pahl C, Mendon\u00e7a NC et al (2018) Microservices: the journey so far and challenges ahead. IEEE Softw 35(3):24\u201335","journal-title":"IEEE Softw"},{"key":"438_CR29","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.eswa.2018.07.042","volume":"114","author":"Y Shao","year":"2018","unstructured":"Shao Y, Liu B, Wang S et al (2018) A novel software defect prediction based on atomic class-association rule mining. Expert Syst Appl 114:237\u2013254","journal-title":"Expert Syst Appl"},{"key":"438_CR30","unstructured":"Hai D, Chang Z (2019) Alibaba Cluster Trace Program [EB\/OL]. https:\/\/github.com\/alibaba\/ cluster data"},{"issue":"10","key":"438_CR31","doi-asserted-by":"publisher","first-page":"3738","DOI":"10.1016\/j.patcog.2012.03.014","volume":"45","author":"MA Tahir","year":"2012","unstructured":"Tahir MA, Kittler J, Yan F (2012) Inverse random under sampling for class imbalance problem and its application to multi-label classification. Pattern Recogn 45(10):3738\u20133750","journal-title":"Pattern Recogn"},{"key":"438_CR32","unstructured":"Cotroneo D, De Simone L, Liguori P, et al (2020) Fault injection analytics: a novel approach to discover failure modes in cloud-computing systems. In: IEEE transactions on dependable and secure computing"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00438-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-023-00438-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00438-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T10:17:13Z","timestamp":1681726633000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-023-00438-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,17]]},"references-count":32,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["438"],"URL":"https:\/\/doi.org\/10.1186\/s13677-023-00438-2","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,17]]},"assertion":[{"value":"11 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 April 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This declaration is not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"59"}}