{"id":"https://openalex.org/W4394597439","doi":"https://doi.org/10.1109/cloudnet59005.2023.10490038","title":"Real-Time Anomaly Detection Using Distributed Tracing in Microservice Cloud Applications","display_name":"Real-Time Anomaly Detection Using Distributed Tracing in Microservice Cloud Applications","publication_year":2023,"publication_date":"2023-11-01","ids":{"openalex":"https://openalex.org/W4394597439","doi":"https://doi.org/10.1109/cloudnet59005.2023.10490038"},"language":"en","primary_location":{"id":"doi:10.1109/cloudnet59005.2023.10490038","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloudnet59005.2023.10490038","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 12th International Conference on Cloud Networking (CloudNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://lup.lub.lu.se/search/files/165150749/Real_Time_Anomaly_Detection_Using_Distributed_Tracing_in_Microservice_Cloud_Applications.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008119392","display_name":"Mahsa Raeiszadeh","orcid":"https://orcid.org/0009-0005-9729-4475"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Mahsa Raeiszadeh","raw_affiliation_strings":["Concordia University,CIISE,Montr&#x00E9;al,Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University,CIISE,Montr&#x00E9;al,Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023434379","display_name":"Amin Ebrahimzadeh","orcid":"https://orcid.org/0000-0002-1741-677X"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Amin Ebrahimzadeh","raw_affiliation_strings":["Concordia University,CIISE,Montr&#x00E9;al,Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University,CIISE,Montr&#x00E9;al,Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080097569","display_name":"Ahsan Saleem","orcid":"https://orcid.org/0000-0003-1710-3578"},"institutions":[{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ahsan Saleem","raw_affiliation_strings":["Concordia University,CIISE,Montr&#x00E9;al,Canada"],"affiliations":[{"raw_affiliation_string":"Concordia University,CIISE,Montr&#x00E9;al,Canada","institution_ids":["https://openalex.org/I60158472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041878389","display_name":"Roch Glitho","orcid":"https://orcid.org/0000-0002-7699-0296"},"institutions":[{"id":"https://openalex.org/I869660684","display_name":"University of the Western Cape","ror":"https://ror.org/00h2vm590","country_code":"ZA","type":"education","lineage":["https://openalex.org/I869660684"]},{"id":"https://openalex.org/I60158472","display_name":"Concordia University","ror":"https://ror.org/0420zvk78","country_code":"CA","type":"education","lineage":["https://openalex.org/I60158472"]}],"countries":["CA","ZA"],"is_corresponding":false,"raw_author_name":"Roch H. Glitho","raw_affiliation_strings":["Concordia University,CIISE,Montr&#x00E9;al,Canada","Computer Science Programme, University of Western Cape, Capetown, South Africa"],"affiliations":[{"raw_affiliation_string":"Concordia University,CIISE,Montr&#x00E9;al,Canada","institution_ids":["https://openalex.org/I60158472"]},{"raw_affiliation_string":"Computer Science Programme, University of Western Cape, Capetown, South Africa","institution_ids":["https://openalex.org/I869660684"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067617101","display_name":"Johan Eker","orcid":"https://orcid.org/0000-0003-0181-3970"},"institutions":[{"id":"https://openalex.org/I1306339040","display_name":"Ericsson (Sweden)","ror":"https://ror.org/05a7rhx54","country_code":"SE","type":"company","lineage":["https://openalex.org/I1306339040"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Johan Eker","raw_affiliation_strings":["Ericsson Research,Lund,Sweden","Ericsson Research, Lund, Sweden"],"affiliations":[{"raw_affiliation_string":"Ericsson Research,Lund,Sweden","institution_ids":["https://openalex.org/I1306339040"]},{"raw_affiliation_string":"Ericsson Research, Lund, Sweden","institution_ids":["https://openalex.org/I1306339040"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034800224","display_name":"Raquel A. F. Mini","orcid":"https://orcid.org/0000-0001-7575-7348"},"institutions":[{"id":"https://openalex.org/I1306339040","display_name":"Ericsson (Sweden)","ror":"https://ror.org/05a7rhx54","country_code":"SE","type":"company","lineage":["https://openalex.org/I1306339040"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Raquel A. F. Mini","raw_affiliation_strings":["Ericsson Research,Lund,Sweden","Ericsson Research, Lund, Sweden"],"affiliations":[{"raw_affiliation_string":"Ericsson Research,Lund,Sweden","institution_ids":["https://openalex.org/I1306339040"]},{"raw_affiliation_string":"Ericsson Research, Lund, Sweden","institution_ids":["https://openalex.org/I1306339040"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5008119392"],"corresponding_institution_ids":["https://openalex.org/I60158472"],"apc_list":null,"apc_paid":null,"fwci":1.632,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.8531244,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"36","last_page":"44"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7567301392555237},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.7012157440185547},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.692121148109436},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6907451152801514},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.44064250588417053},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.41406798362731934},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3625379800796509},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.15715351700782776},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14840999245643616}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7567301392555237},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.7012157440185547},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.692121148109436},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6907451152801514},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.44064250588417053},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.41406798362731934},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3625379800796509},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.15715351700782776},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14840999245643616},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cloudnet59005.2023.10490038","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloudnet59005.2023.10490038","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 12th International Conference on Cloud Networking (CloudNet)","raw_type":"proceedings-article"},{"id":"pmh:oai:lup.lub.lu.se:1f629ae5-15c8-46b3-aa34-9ac31d7d407c","is_oa":true,"landing_page_url":"https://lup.lub.lu.se/record/1f629ae5-15c8-46b3-aa34-9ac31d7d407c","pdf_url":"https://lup.lub.lu.se/search/files/165150749/Real_Time_Anomaly_Detection_Using_Distributed_Tracing_in_Microservice_Cloud_Applications.pdf","source":{"id":"https://openalex.org/S4306400536","display_name":"Lund University Publications (Lund University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I187531555","host_organization_name":"Lund University","host_organization_lineage":["https://openalex.org/I187531555"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"contributiontobookanthology/conference"}],"best_oa_location":{"id":"pmh:oai:lup.lub.lu.se:1f629ae5-15c8-46b3-aa34-9ac31d7d407c","is_oa":true,"landing_page_url":"https://lup.lub.lu.se/record/1f629ae5-15c8-46b3-aa34-9ac31d7d407c","pdf_url":"https://lup.lub.lu.se/search/files/165150749/Real_Time_Anomaly_Detection_Using_Distributed_Tracing_in_Microservice_Cloud_Applications.pdf","source":{"id":"https://openalex.org/S4306400536","display_name":"Lund University Publications (Lund University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I187531555","host_organization_name":"Lund University","host_organization_lineage":["https://openalex.org/I187531555"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"contributiontobookanthology/conference"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4394597439.pdf"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W2109966155","https://openalex.org/W2121879602","https://openalex.org/W2513041336","https://openalex.org/W2896457183","https://openalex.org/W2900100055","https://openalex.org/W2903799441","https://openalex.org/W2930500175","https://openalex.org/W2933521846","https://openalex.org/W2955169411","https://openalex.org/W2963341628","https://openalex.org/W2964051675","https://openalex.org/W2979826702","https://openalex.org/W3009134255","https://openalex.org/W3084013135","https://openalex.org/W3096738151","https://openalex.org/W3100178186","https://openalex.org/W3113082031","https://openalex.org/W3113508261","https://openalex.org/W3216137074","https://openalex.org/W4293363567","https://openalex.org/W4318767833","https://openalex.org/W6734384760","https://openalex.org/W6745537798","https://openalex.org/W6755207826"],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W3210364259","https://openalex.org/W4300558037","https://openalex.org/W2912112202","https://openalex.org/W2667207928","https://openalex.org/W4377864969","https://openalex.org/W3030345572"],"abstract_inverted_index":{"Distributed":[0],"tracing":[1],"plays":[2],"a":[3,73,96,104,112,115,142,150,159,193],"vital":[4],"role":[5],"in":[6,61,80,183,199],"microservice":[7],"infrastructure,":[8],"and":[9,120,122],"learning-based":[10,26,195],"trace":[11,36],"analysis":[12],"has":[13],"been":[14],"utilized":[15],"to":[16,51,132],"detect":[17],"anomalies":[18,64,77],"within":[19],"such":[20],"systems.":[21],"However,":[22,60],"existing":[23,175],"approaches":[24],"for":[25],"trace-based":[27,177],"anomaly":[28,49,88,178],"detection":[29,179,202],"face":[30],"certain":[31],"limitations.":[32],"Some":[33],"assume":[34],"that":[35,169],"patterns":[37],"can":[38,145],"be":[39,84,133,146],"learned":[40],"solely":[41,86],"from":[42],"normal":[43,57,70],"executions,":[44],"while":[45],"others":[46],"depend":[47],"on":[48,103],"injection":[50],"generate":[52],"labeled":[53,154],"traces":[54,156],"categorized":[55],"as":[56],"or":[58],"anomalous.":[59],"practical":[62],"scenarios,":[63],"may":[65,78],"also":[66,192],"happen":[67],"during":[68],"the":[69,129,137,174],"execution.":[71],"Moreover,":[72],"wide":[74],"variety":[75],"of":[76,153,163,185,201],"occur":[79],"practice,":[81],"which":[82,110],"cannot":[83],"captured":[85],"through":[87],"injection.":[89],"To":[90],"address":[91],"these":[92],"issues,":[93],"we":[94],"propose":[95],"Trace-Driven":[97],"Anomaly":[98],"Detection":[99],"(TDAD)":[100],"approach":[101],"based":[102],"Span":[105],"Causal":[106],"Graph":[107,116],"(SCG)":[108],"representation,":[109],"trains":[111],"model":[113,130],"using":[114,149],"Neural":[117],"Network":[118],"(GNN)":[119],"Positive":[121],"Unlabeled":[123],"(PU)":[124],"learning.":[125],"This":[126],"technique":[127],"allows":[128],"parameters":[131],"optimized":[134],"by":[135,181,197],"estimating":[136],"underlying":[138],"data":[139],"distribution.":[140],"As":[141],"result,":[143],"TDAD":[144,170],"effectively":[147],"trained":[148],"small":[151],"number":[152,162],"anomalous":[155],"along":[157],"with":[158],"relatively":[160],"large":[161],"unlabeled":[164],"traces.":[165],"Our":[166],"evaluation":[167],"reveals":[168],"outperforms":[171],"not":[172],"only":[173],"unsupervised":[176],"methods":[180],"11.9%":[182],"terms":[184,200],"F":[186],"<inf":[187],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[188],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1</inf>":[189],"-score":[190],"but":[191],"supervised":[194],"benchmark":[196],"12x":[198],"time.":[203]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":3}],"updated_date":"2026-03-11T14:59:36.786465","created_date":"2025-10-10T00:00:00"}
