Published July 4, 2024
| Version v4
Dataset
Open
Replication Package - How Industry Tackles Anomalies during Runtime: Approaches and Key Monitoring Parameters
Creators
Contributors
Contact persons:
Project members:
Supervisor:
Description
This replication package includes general remarks on anomaly detection approaches identified via an extension of a literature study (Soldani, J., & Brogi, A. (2022). Anomaly detection and failure root cause analysis in (micro) service-based cloud applications: A survey. ACM Computing Surveys (CSUR), 55(3), 1-39.) and 15 interview participants from various domains to address the methodology and findings for anomalies, anomaly detection approaches and key monitoring parameters extracted from runtime monitoring data types (logs, traces, metrics) to detect anomalies.
Due to confidentiality, we cannot provide the video recordings or transcripts.
This replication package contains:
- Interview_Guidelines.pdf: includes the pilot-tested interview questions split up into introduction, use case elaboration, and parameters that explain system behavior and questions. Furthermore, we include short summaries expressing our intention via the questions
- Procedure_Interview_Participant_Selection.pdf: explains the applied purposive sampling selection strategy, the email used to contact industry interview partners and the demographic information collected from the interviews
- RQ1_Inductive_Coding.pdf: summarises the interview participants' statements regarding the interpretations and characteristics of an anomaly and industry examples
- RQ1_IEEE_Definitions_over_Years.pdf: summary of identified IEEE definitions regarding anomalies
- RQ2_Inductive_Coding.pdf: summarises the interview participants' statements regarding rule-based and AI-based and advantages/disadvantages thereof
- RQ3_Overview_Interviews_IndustryPaper.xlxs: summarises the interview participants' statements & anomaly detection tools of papers that evaluated their approach with industry datasets, regarding parameters suitable for detecting anomalies. Furthermore, it includes methodological information (such as inclusion/exclusion criteria, excluded papers, and the sample based dual blind review)
- Overview_AllPapers.xlxs: summarises all identified literature studies (anomaly detection approaches that are evaluated via industry datasets and via benchmark datasets)
Files
Interview_Guidlines.pdf
Files
(5.2 MB)
Name | Size | Download all |
---|---|---|
md5:9779ac6e249dbf356985b6f8e9c5ee7f
|
134.2 kB | Preview Download |
md5:11e7ce0edf2e7fab95b5b48fa6a86444
|
60.0 kB | Download |
md5:862f7154369b9969ebf4a401aba89c1b
|
4.3 MB | Preview Download |
md5:93d13840f5d94f0513bfb865c2d86abf
|
126.9 kB | Preview Download |
md5:cc3bde39e6258f50ff05a01a00d39689
|
245.8 kB | Preview Download |
md5:362c89e7949cb1a1956b5d704633694d
|
188.1 kB | Preview Download |
md5:fa5c33a8306dcebb398973dd38de381f
|
166.7 kB | Download |
Additional details
Dates
- Available
-
2024-05-13