{"id":"https://openalex.org/W3009134255","doi":"https://doi.org/10.1109/access.2020.2977464","title":"A Framework of Virtual War Room and Matrix Sketch-Based Streaming Anomaly Detection for Microservice Systems","display_name":"A Framework of Virtual War Room and Matrix Sketch-Based Streaming Anomaly Detection for Microservice Systems","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3009134255","doi":"https://doi.org/10.1109/access.2020.2977464","mag":"3009134255"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.2977464","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2977464","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2020.2977464","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075637613","display_name":"Hongyang Chen","orcid":"https://orcid.org/0000-0002-9419-3768"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hongyang Chen","raw_affiliation_strings":["School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100335060","display_name":"Pengfei Chen","orcid":"https://orcid.org/0000-0003-0972-6900"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Pengfei Chen","raw_affiliation_strings":["School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075077822","display_name":"Guangba Yu","orcid":"https://orcid.org/0000-0001-6195-9088"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangba Yu","raw_affiliation_strings":["School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Data and Computer Science, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5075637613"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":3.7003,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.93408641,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"8","issue":null,"first_page":"43413","last_page":"43426"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8033753037452698},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.6568971276283264},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6335346698760986},{"id":"https://openalex.org/keywords/microservices","display_name":"Microservices","score":0.5916197896003723},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5019629001617432},{"id":"https://openalex.org/keywords/sketch","display_name":"Sketch","score":0.4873705506324768},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.41480764746665955},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.40555518865585327},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.40363436937332153},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.3899591267108917},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.34109023213386536},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.2849911153316498},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14838731288909912},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.13053318858146667}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8033753037452698},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.6568971276283264},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6335346698760986},{"id":"https://openalex.org/C2778505942","wikidata":"https://www.wikidata.org/wiki/Q18344624","display_name":"Microservices","level":3,"score":0.5916197896003723},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5019629001617432},{"id":"https://openalex.org/C2779231336","wikidata":"https://www.wikidata.org/wiki/Q7534724","display_name":"Sketch","level":2,"score":0.4873705506324768},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.41480764746665955},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.40555518865585327},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.40363436937332153},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.3899591267108917},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34109023213386536},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2849911153316498},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14838731288909912},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.13053318858146667},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2020.2977464","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2977464","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:26401188710043a2b84dfcd3e9643b98","is_oa":true,"landing_page_url":"https://doaj.org/article/26401188710043a2b84dfcd3e9643b98","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 43413-43426 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.2977464","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2977464","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1690192735","display_name":null,"funder_award_id":"61802448","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G247730989","display_name":null,"funder_award_id":"2019A1515012229","funder_id":"https://openalex.org/F4320321921","funder_display_name":"Natural Science Foundation of Guangdong Province"},{"id":"https://openalex.org/G4135978206","display_name":null,"funder_award_id":"U1811462","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G860604859","display_name":null,"funder_award_id":"6190244","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321921","display_name":"Natural Science Foundation of Guangdong Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W192446467","https://openalex.org/W1243432849","https://openalex.org/W1513765469","https://openalex.org/W1520857056","https://openalex.org/W1524673069","https://openalex.org/W1537198022","https://openalex.org/W1581005283","https://openalex.org/W2028604378","https://openalex.org/W2029648915","https://openalex.org/W2035286849","https://openalex.org/W2093089874","https://openalex.org/W2099517310","https://openalex.org/W2122646361","https://openalex.org/W2143522309","https://openalex.org/W2150996188","https://openalex.org/W2296719434","https://openalex.org/W2358348501","https://openalex.org/W2395123632","https://openalex.org/W2509285305","https://openalex.org/W2528800812","https://openalex.org/W2743138268","https://openalex.org/W2766252405","https://openalex.org/W2792103155","https://openalex.org/W2821372324","https://openalex.org/W2900100055","https://openalex.org/W2903799441","https://openalex.org/W2931122162","https://openalex.org/W2962944216","https://openalex.org/W2966971704","https://openalex.org/W2970739572","https://openalex.org/W2998646672","https://openalex.org/W3003444068","https://openalex.org/W6607881844","https://openalex.org/W6627955765","https://openalex.org/W6630749910","https://openalex.org/W6631426539","https://openalex.org/W6632104034","https://openalex.org/W6634794993","https://openalex.org/W6681992919","https://openalex.org/W6725282042","https://openalex.org/W6750797480"],"related_works":["https://openalex.org/W4210334847","https://openalex.org/W3181741639","https://openalex.org/W4367181468","https://openalex.org/W2767473057","https://openalex.org/W4225586032","https://openalex.org/W3003367851","https://openalex.org/W1492892507","https://openalex.org/W3119944216","https://openalex.org/W2994988622","https://openalex.org/W2888006113"],"abstract_inverted_index":{"Recently,":[0],"microservice":[1,32,47,68,97,105,118,220,243,269],"has":[2],"been":[3],"a":[4,64,85,89,142,186,200,219,223],"popular":[5],"architecture":[6,13],"to":[7,28,35,44,63,72,83,102],"construct":[8],"cloud-native":[9],"systems.":[10],"This":[11,207],"novel":[12,187],"brings":[14],"agility":[15],"and":[16,30,38,60,110,128,151,168,196,245],"accelerates":[17],"the":[18,73,117,130,152,157,161,170,177,233,265],"software":[19],"development":[20],"process":[21,75],"significantly.":[22],"However,":[23],"it":[24,198],"is":[25],"not":[26],"easy":[27],"manage":[29],"operate":[31,46],"systems":[33,48,244,270],"due":[34,62],"their":[36,104,164],"scale":[37],"complexity.":[39],"Many":[40],"approaches":[41,263],"are":[42],"proposed":[43],"automatically":[45],"such":[49,253],"as":[50,172,199,254],"anomaly":[51,189,250],"detection.":[52],"Nevertheless,":[53],"those":[54],"methods":[55,252],"cannot":[56],"be":[57,272],"sufficiently":[58],"validated":[59],"compared":[61],"lack":[65],"of":[66,76,91,114,163,268],"real":[67],"systems,":[69],"which":[70,99],"leads":[71],"slow":[74],"intelligent":[77,165,202,266],"operation.":[78],"These":[79],"challenges":[80],"inspire":[81],"us":[82],"build":[84],"system":[86,119,221],"named":[87],"\u201cVWR\u201d,":[88],"framework":[90],"Virtual":[92],"War":[93],"Room":[94],"for":[95,138],"operating":[96],"applications":[98],"allows":[100],"users":[101,158],"simulate":[103],"architectures":[106],"with":[107,120,145],"low":[108],"overhead":[109],"inject":[111],"multiple":[112],"types":[113],"faults":[115],"into":[116],"chaos":[121],"engineering.":[122],"VWR":[123,230],"can":[124,159,209,238,271],"mimic":[125],"user":[126],"requests":[127],"record":[129],"end-to-end":[131],"tracing":[132,155,179],"data":[133,180,216],"(i.e.,":[134],"service":[135],"call":[136],"chains)":[137],"each":[139],"request":[140],"in":[141,205,222,229,242,257],"way":[143],"consistent":[144],"OpenTracing.":[146],"With":[147],"easily":[148],"designed":[149],"tests":[150],"produced":[153],"streaming":[154,178,224],"data,":[156],"validate":[160],"performance":[162,215],"operation":[166,203,267],"algorithms":[167,171],"improve":[169],"needed.":[173],"Besides,":[174],"based":[175,192,236,274],"on":[176,193,264,275],"generated":[181],"by":[182,212],"VWR,":[183],"we":[184],"introduce":[185],"unsupervised":[188],"detection":[190,251],"algorithm":[191,204,208],"Matrix":[194],"Sketch":[195],"set":[197],"default":[201],"VWR.":[206,276],"detect":[210,240],"anomalies":[211,241],"analyzing":[213],"high-dimensional":[214],"collected":[217],"from":[218],"manner.":[225],"The":[226],"experimental":[227],"result":[228],"shows":[231],"that":[232],"matrix":[234],"sketch":[235],"method":[237],"precisely":[239],"outperform":[246],"some":[247,258],"widely":[248],"used":[249],"isolation":[255],"forest":[256],"scenario.":[259],"We":[260],"believe":[261],"more":[262],"constructed":[273]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
