Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1051937.1051963guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support

Published: 31 October 2003 Publication History

Abstract

We describe a new approach, called Strider, to Change and Configuration Management and Support (CCMS). Strider is a black-box approach: without relying on specifications, it uses state differencing to identify potential causes of differing program behaviors, uses state tracing to identify actual, run-time state dependencies, and uses statistical behavior modeling for noise filtering. Strider is a state-based approach: instead of linking vague, high-level descriptions and symptoms to relevant actions, it models management and support problems in terms of individual, named pieces of low-level configuration state and provides precise mappings to user-friendly information through a computer genomics database. We use troubleshooting of configuration failures to demonstrate that the Strider approach reduces problem complexity by several orders of magnitude, making root cause analysis possible.

References

[1]
{AHH+02} Apap, F., A. Honig, S. Hershkop, E. Eskin, and S. J. Stolfo, "Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses," Proc. of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID), 2002.
[2]
{B95} Burgess, M., "A Site Configuration Engine," Computing Systems, Vol. 8, p. 309, 1995.
[3]
{CG91} Church, K. W. and W. A. Gale, "A Comparison of the Enhanced Good-Turing and Deleted Estimation Methods for Estimating Probabilities of English Bigrams," Computer Speech and Language, Vol. 5, pp. 19-54, 1991.
[4]
{CG99} Couch, Alva and M. Gilfix, "It's Elementary, Dear Watson: Applying Logic Programming to Convergent System Management Processes," Proc. of LISA, 1999.
[5]
{CKF+02} Chen, M., E. Kiciman, E. Fratkin, A. Fox, and E. Brewer, "Pinpoint: Problem Determination in Large, Dynamic, Internet Services," Proc. Int. Conf. on Dependable Systems and Networks (IPDS Track), 2002.
[6]
{DG01} Dennis, C. and R. Gallagher, The Human Genome, Nature Publishing Group, 2001.
[7]
{ECH+01} Engler, D., D. Y. Chen, S. Hallem, A. Chou, and B. Chelf, "Bugs as Deviant Behavior: A General Approach to Inferring Errors in Systems Code," Proc. ACM Symp. on Operating Systems Principles, October, 2001.
[8]
{G53} Good, I. J., "The Population Frequencies of Species and the Estimation of Population Parameters," Biometrika, Vol. 40, pp. 237-264, 1953.
[9]
{GWO01} Götsch, V., A. Wuersch, and T. Oetiker, "Gossips: System and Service Monitor," Proc. of LISA, 2001.
[10]
{HD02} Hart, J. and J. D'Amelia, "An Analysis of RPM Validation Drift," Proc. LISA, 2002.
[11]
{KE02} Keller, A. and C. Ensel, "An Approach for Managing Service Dependencies with XML and the Resource Description Framework," Journal of Network and Systems Management, Vol. 10, Num. 2, June, 2002.
[12]
{LAZ+03} Liblit, B., A. Aiken, A. X. Zheng, and M. I. Jordan, "Bug Isolation via Remote Program Sampling," Proc. Programming Language Design and Implementation (PLDI), pp. 141-154, 2003.
[13]
{LC01} Larsson, M. and I. Crnkovic, "Configuration Management for Component-based Systems," Proc. Int. Conf. on Software Engineering (ICSE), May 2001.
[14]
{O00} Osterlund, R., "PIKT: Problem Informant/Killer Tool," Proc. LISA, 2000.
[15]
{RPM97} Bailey, E., Maximum RPM, 1997.
[16]
{RSB03} Redstone, J. A., M. M. Swift, B. N. Bershad, "Using Computers to Diagnose Computer Problems," Proc. HotOS, 2003.
[17]
{SC01} Sun, Y. and A. L. Couch, "Global Analysis of Dynamic Library Dependencies," Proc. of LISA, 2001.
[18]
{SR} Windows XP System Restore, http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnwxp/html/windowsxpsystemrestore.asp.
[19]
{SR00} Solomon, D. A. and M. Russinovich, "Inside Microsoft Windows 2000," Microsoft Press, 3rd edition, Sept., 2000.
[20]
{TH98} Traugott, S. and J. Huddleston, "Bootstrapping an Infrastructure," Proc. LISA, 1998.
[21]
{TRI} Tripwire, http://www.tripwire.com/.
[22]
{WVS03} Wang, Y. M., C. Verbowski, and D. R. Simon, "Persistent-state Checkpoint Comparison for Troubleshooting Configuration Failures," Proc. Int. Conf. on Dependable Systems and Networks (DSN), 2003.

Cited By

View all
  • (2021)Static detection of silent misconfigurations with deep interaction analysisProceedings of the ACM on Programming Languages10.1145/34855175:OOPSLA(1-30)Online publication date: 15-Oct-2021
  • (2021)An Evolutionary Study of Configuration Design and Implementation in Cloud SystemsProceedings of the 43rd International Conference on Software Engineering10.1109/ICSE43902.2021.00029(188-200)Online publication date: 22-May-2021
  • (2020)Testing configuration changes in context to prevent production failuresProceedings of the 14th USENIX Conference on Operating Systems Design and Implementation10.5555/3488766.3488808(735-751)Online publication date: 4-Nov-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
LISA '03: Proceedings of the 17th USENIX conference on System administration
October 2003
307 pages

Publisher

USENIX Association

United States

Publication History

Published: 31 October 2003

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Static detection of silent misconfigurations with deep interaction analysisProceedings of the ACM on Programming Languages10.1145/34855175:OOPSLA(1-30)Online publication date: 15-Oct-2021
  • (2021)An Evolutionary Study of Configuration Design and Implementation in Cloud SystemsProceedings of the 43rd International Conference on Software Engineering10.1109/ICSE43902.2021.00029(188-200)Online publication date: 22-May-2021
  • (2020)Testing configuration changes in context to prevent production failuresProceedings of the 14th USENIX Conference on Operating Systems Design and Implementation10.5555/3488766.3488808(735-751)Online publication date: 4-Nov-2020
  • (2020)Automated reasoning and detection of specious configuration in large systems with symbolic executionProceedings of the 14th USENIX Conference on Operating Systems Design and Implementation10.5555/3488766.3488807(719-734)Online publication date: 4-Nov-2020
  • (2020)Understanding and discovering software configuration dependencies in cloud and datacenter systemsProceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3368089.3409727(362-374)Online publication date: 8-Nov-2020
  • (2019)Towards Continuous Access Control Validation and ForensicsProceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security10.1145/3319535.3363191(113-129)Online publication date: 6-Nov-2019
  • (2017)ConfTestProceedings of the 21st International Conference on Evaluation and Assessment in Software Engineering10.1145/3084226.3084244(88-97)Online publication date: 15-Jun-2017
  • (2016)Early detection of configuration errors to reduce failure damageProceedings of the 12th USENIX conference on Operating Systems Design and Implementation10.5555/3026877.3026925(619-634)Online publication date: 2-Nov-2016
  • (2016)PerfCompass: Online Performance Anomaly Fault Localization and Inference in Infrastructure-as-a-Service CloudsIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2015.244439227:6(1742-1755)Online publication date: 12-May-2016
  • (2015)Using Probability Densities to Evolve more Secure Software ConfigurationsProceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense10.1145/2809826.2809831(27-32)Online publication date: 12-Oct-2015
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media