{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T16:15:56Z","timestamp":1764260156066,"version":"build-2065373602"},"reference-count":42,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T00:00:00Z","timestamp":1603756800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Key Laboratory on Reliability and Environmental Engineering Technology","award":["No. 6142004200402"],"award-info":[{"award-number":["No. 6142004200402"]}]},{"name":"Advanced Research Domains Funding of China","award":["No. JZX7Y20190242013901"],"award-info":[{"award-number":["No. JZX7Y20190242013901"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Software aging is a phenomenon referring to the performance degradation of a long-running software system. This phenomenon is an accumulative process during execution, which will gradually lead the system from a normal state to a failure-prone state. It is a crucial challenge for system reliability to predict the Aging-Related Failures (ARFs) accurately. In this paper, permutation entropy (PE) is modified to Multidimensional Multi-scale Permutation Entropy (MMPE) as a novel aging indicator to detect performance anomalies, since MMPE is sensitive to dynamic state changes. An experiment is set on the distributed database system Voldemort, and MMPE is calculated based on the collected performance metrics during execution. Finally, based on MMPE, a failure prediction model using the machine learning method to reveal the anomalies is presented, which can predict failures with high accuracy.<\/jats:p>","DOI":"10.3390\/e22111225","type":"journal-article","created":{"date-parts":[[2020,10,28]],"date-time":"2020-10-28T11:43:06Z","timestamp":1603885386000},"page":"1225","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Dynamic Anomaly Detection Approach Based on Permutation Entropy for Predicting Aging-Related Failures"],"prefix":"10.3390","volume":"22","author":[{"given":"Shuguang","family":"Wang","sequence":"first","affiliation":[{"name":"School of Reliability and Systems Engineering, Beihang University, Beijing 100089, China"}]},{"given":"Minyan","family":"Lu","sequence":"additional","affiliation":[{"name":"School of Reliability and Systems Engineering, Beihang University, Beijing 100089, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8925-6306","authenticated-orcid":false,"given":"Shiyi","family":"Kong","sequence":"additional","affiliation":[{"name":"School of Reliability and Systems Engineering, Beihang University, Beijing 100089, China"}]},{"given":"Jun","family":"Ai","sequence":"additional","affiliation":[{"name":"School of Reliability and Systems Engineering, Beihang University, Beijing 100089, China"}]}],"member":"1968","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"key":"ref_1","unstructured":"Garg, S., van Moorsel, A., Vaidyanathan, K., and Trivedi, K.S. (1998, January 4\u20137). A methodology for detection and estimation of software aging. Proceedings of the International Symposium on Software Reliability Engineering, Paderborn, Germany."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1109\/TR.2006.879609","article-title":"Analysis of Software Aging in a Web Server","volume":"55","author":"Grottke","year":"2006","journal-title":"IEEE Trans. Reliab."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Cotroneo, D.N., Pietrantuono, R., and Russo, S. (2010, January 1\u20134). Software Aging Analysis of the Linux Operating System. Proceedings of the IEEE International Symposium on Software Reliability Engineering, San Jose, CA, USA.","DOI":"10.1109\/ISSRE.2010.24"},{"key":"ref_4","unstructured":"Sabino, M.E.G., Merabti, M., Llewellynjones, D., and Bouhafs, F. (2013, January 7\u20139). Detecting Software Aging in safety-critical infrastructures. Proceedings of the Science and Information Conference, London, UK."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2260","DOI":"10.4304\/jsw.9.9.2260-2266","article-title":"A Nonlinear Dynamic Model for Software Aging in Service-Oriented Software","volume":"9","author":"Jia","year":"2014","journal-title":"J. Softw."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Langner, F., and Andrzejak, A. (2013, January 14\u201316). Detection and Root Cause Analysis of Memory-Related Software Aging Defects by Automated Tests. Proceedings of the Modeling, Analysis, and Simulation on Computer and Telecommunication Systems, San Francisco, CA, USA.","DOI":"10.1109\/MASCOTS.2013.53"},{"key":"ref_7","unstructured":"Zhao, J., Jin, Y., Trivedi, K.S., and Matias, R. (December, January 29). Injecting Memory Leaks to Accelerate Software Failures. Proceedings of the International Symposium on Software Reliability Engineering, Hiroshima, Japan."},{"key":"ref_8","unstructured":"Shereshevsky, M., Crowell, J., Cukic, B., Gandikota, V., and Liu, Y. (2003, January 22\u201325). Software aging and multifractality of memory resources. Proceedings of the Dependable Systems and Networks, San Francisco, CA, USA."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1145\/2539117","article-title":"A survey of software aging and rejuvenation studies","volume":"10","author":"Cotroneo","year":"2014","journal-title":"ACM J. Emerg. Technol. Comput. Syst."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1109\/TDSC.2005.15","article-title":"A comprehensive model for software rejuvenation","volume":"2","author":"Vaidyanathan","year":"2005","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_11","unstructured":"Dohi, T., Gosevapopstojanova, K., and Trivedi, K.S. (2000, January 20). Statistical non-parametric algorithms to estimate the optimal software rejuvenation schedule. Proceedings of the Pacific Rim International Symposium on Dependable Computing, Los Angeles, CA, USA."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"174102","DOI":"10.1103\/PhysRevLett.88.174102","article-title":"Permutation Entropy: A Natural Complexity Measure for Time Series","volume":"88","author":"Bandt","year":"2002","journal-title":"Phys. Rev. Lett."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"046217","DOI":"10.1103\/PhysRevE.70.046217","article-title":"Detecting dynamical changes in time series using the permutation entropy","volume":"70","author":"Cao","year":"2004","journal-title":"Phys. Rev. E"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Okamura, H., Zheng, J., and Dohi, T. (2017, January 26\u201329). A Statistical Framework on Software Aging Modeling with Continuous-Time Hidden Markov Model. Proceedings of the 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), Hong Kong, China.","DOI":"10.1109\/SRDS.2017.24"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"590","DOI":"10.1016\/j.jss.2006.06.029","article-title":"Modeling and analysis of software aging and software failure","volume":"80","author":"Jiang","year":"2007","journal-title":"J. Syst. Softw."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Zhao, J. (2016, January 24\u201326). Modeling of Software Aging Based on Non-stationary Time Series. Proceedings of the 2016 International Conference on Information System and Artificial Intelligence (ISAI), Hong Kong, China.","DOI":"10.1109\/ISAI.2016.0046"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2539122","article-title":"Software aging in the eucalyptus cloud computing infrastructure: Characterization and rejuvenation","volume":"10","author":"Araujo","year":"2014","journal-title":"ACM J. Emerg. Technol. Comput. Syst."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Li, J., Qi, Y., and Cai, L. (2018, January 26\u201329). A Hybrid Approach for Predicting Aging-Related Failures of Software Systems. Proceedings of the 2018 IEEE Symposium on Service-Oriented System Engineering (SOSE), Bamberg, Germany.","DOI":"10.1109\/SOSE.2018.00021"},{"key":"ref_19","first-page":"675","article-title":"ARF-Predictor: Effective Prediction of Aging-Related Failure Using Entropy","volume":"15","author":"Chen","year":"2018","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/s10115-018-1168-z","article-title":"Energy-based anomaly detection for mixed data","volume":"57","author":"Do","year":"2018","journal-title":"Knowl. Inf. Syst."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Qiao, Y., Zheng, Z., and Fang, Y. (2018, January 15\u201318). An Empirical Study on Software Aging Indicators Prediction in Android Mobile. Proceedings of the 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), Memphis, TN, USA.","DOI":"10.1109\/ISSREW.2018.00018"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"867","DOI":"10.1142\/S0218127491000634","article-title":"The Takens embedding theorem","volume":"1","author":"Noakes","year":"1991","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1016\/0167-2789(93)90054-5","article-title":"Coarse-grained embeddings of time series: Random walks, Gaussian random processes, and deterministic chaos","volume":"64","author":"Kaplan","year":"1993","journal-title":"Phys. D Nonlinear Phenom."},{"key":"ref_24","unstructured":"Yang, Y., Shen, H.T., Ma, Z., Huang, Z., and Zhou, X. (2011, January 16\u201322). \u21132,1-norm regularized discriminative feature selection for unsupervised learning. Proceedings of the International Joint Conference on Artificial Intelligence, Barcelona, Spain."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/TPAMI.2004.1261097","article-title":"Two-dimensional PCA: A new approach to appearance-based face representation and recognition","volume":"26","author":"Yang","year":"2004","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"068102","DOI":"10.1103\/PhysRevLett.89.068102","article-title":"Multiscale Entropy Analysis of Complex Physiologic Time Series","volume":"89","author":"Costa","year":"2002","journal-title":"Phys. Rev. Lett."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/1541880.1541882","article-title":"Anomaly detection: A survey","volume":"41","author":"Chandola","year":"2009","journal-title":"ACM Comput. Surv."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"975","DOI":"10.1016\/j.future.2017.08.051","article-title":"Aging-related performance anomalies in the apache storm stream processing system","volume":"86","author":"Ficco","year":"2018","journal-title":"Futur. Gener. Comput. Syst."},{"key":"ref_29","first-page":"93","article-title":"LOF: Identifying density-based local outliers","volume":"29","author":"Breunig","year":"2000","journal-title":"Int. Conf. Manag. Data"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","article-title":"A Survey of Outlier Detection Methodologies","volume":"22","author":"Hodge","year":"2004","journal-title":"Artif. Intell. Rev."},{"key":"ref_31","unstructured":"Gang, C., Yuan, L.C., and Shi, J. (2011, January 20\u201323). Ordinal isolation: An efficient and effective intelligent outlier detection algorithm. Proceedings of the IEEE International Conference on Cyber Technology in Automation, Control, & Intelligent Systems, Kunming, China."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s11219-019-09448-3","article-title":"A survey on software aging and rejuvenation in the cloud","volume":"28","author":"Pietrantuono","year":"2019","journal-title":"Softw. Qual. J."},{"key":"ref_33","first-page":"45","article-title":"Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes","volume":"4","author":"Hwangkai","year":"2007","journal-title":"IEEE Trans. Depend. Secur. Comput."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Goldstein, M., and Uchida, S. (2016). A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data. PLoS ONE, 11.","DOI":"10.1371\/journal.pone.0152173"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1016\/j.neucom.2017.04.070","article-title":"Unsupervised real-time anomaly detection for streaming data","volume":"262","author":"Ahmad","year":"2017","journal-title":"Neurocomputing"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Song, K., Zhou, Y., Liu, H., and Zhu, N. (2017, January 8\u201311). Isolated forest in keystroke dynamics-based authentication: Only normal instances available for training. Proceedings of the 2017 2nd IEEE International Conference on Computational Intelligence and Applications (ICCIA), Beijing, China.","DOI":"10.1109\/CIAPP.2017.8167061"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1443","DOI":"10.1162\/089976601750264965","article-title":"Estimating the Support of a High-Dimensional Distribution","volume":"13","author":"Platt","year":"2001","journal-title":"Neural Comput."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Cooper, B.F., Silberstein, A., Tam, E., Ramakrishnan, R., and Sears, R. (2010, January 10\u201311). Benchmarking cloud serving systems with YCSB. Proceedings of the 1st ACM symposium on Cloud Computing, Indianapolis, IN, USA.","DOI":"10.1145\/1807128.1807152"},{"key":"ref_39","first-page":"1","article-title":"Robust principal component analysis?","volume":"58","author":"Li","year":"2011","journal-title":"J. ACM"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Liu, J., Tan, X., and Wang, Y. (2019, January 8\u201313). CSSAP: Software Aging Prediction for Cloud Services Based on ARIMA-LSTM Hybrid Model. Proceedings of the 2019 IEEE International Conference on Web Services (ICWS), Milan, Italy.","DOI":"10.1109\/ICWS.2019.00055"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1016\/j.ins.2014.03.043","article-title":"On the use of MapReduce for imbalanced big data using Random Forest","volume":"285","author":"Herrera","year":"2014","journal-title":"Inf. Sci."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/0034-4257(91)90048-B","article-title":"A review of assessing the accuracy of classifications of remotely sensed data","volume":"37","author":"Congalton","year":"1991","journal-title":"Remote Sens. Environ."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/22\/11\/1225\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:29:27Z","timestamp":1760178567000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/22\/11\/1225"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,27]]},"references-count":42,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2020,11]]}},"alternative-id":["e22111225"],"URL":"https:\/\/doi.org\/10.3390\/e22111225","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2020,10,27]]}}}