Unlock instant, AI-driven research and patent intelligence for your innovation.

Call link abnormity detection method, computer equipment and readable storage medium

An anomaly detection and call chaining technology, applied in the computer field, can solve problems such as dependence, inability to detect structural anomalies, and inability to support fine-grained root cause location

Active Publication Date: 2021-10-19
TSINGHUA UNIV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And it solves many problems of the existing technology, such as: unable to detect structural anomalies, relying on supervised data, unable to use complete call chain information, unable to handle complex patterns of call chain index data, high time and space overhead, and unable to support fine-grained root cause location

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Call link abnormity detection method, computer equipment and readable storage medium
  • Call link abnormity detection method, computer equipment and readable storage medium
  • Call link abnormity detection method, computer equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Embodiments of the present application are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary, and are intended to explain the present application, and should not be construed as limiting the present application.

[0039] A call chain anomaly detection method of the present application will be described below with reference to the accompanying drawings.

[0040] The input of the call chain anomaly detection problem refers to the call chain data; the output of the call chain anomaly detection problem refers to whether each call chain is abnormal and the specific abnormal part;

[0041] figure 1 Process each call chain in the embodiment of this application into a graph composed of spans, specifically, as figure 1 As shown, each square ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a call link abnormity detection method, and relates to the technical field of computers. The method comprises the following steps: S10, processing a call link into a graph composed of span; S20, coding each span in the call link into a high-dimensional vector according to a graph embedding method; S30, obtaining probability distribution of a normal mode of the high-dimensional vector through a deep Bayesian model; and S40, judging the abnormity of the to-be-detected call link according to the obtained probability distribution. By the adoption of the scheme, structure abnormity and index abnormity can be detected at the same time, the abnormity can be distinguished, in addition, complete call link data can be fully utilized to process a complex mode, fine-grained root cause positioning is supported, and then the time and space efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a call chain abnormality detection method, computer equipment and a readable storage medium. Background technique [0002] Using distributed architecture, such as service-oriented architecture (service-oriented architecture, SOA) or microservice architecture (microservice architecture), is the mainstream trend of modern software system construction. This type of architecture has the characteristics of rapid iteration, easy expansion and automation. [0003] For SOA or microservice architecture, the entire system is split into dozens to thousands of small services, and each service may run in one or more instances. Each of these services only focuses on a small part of the functions, and the completion of complete user requests needs to be implemented with each other through remote process communication (RPC) methods such as HTTP API (application programming interface). Compar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/62G06F16/901
CPCG06F16/9024G06F18/24155
Inventor 裴丹李则言
Owner TSINGHUA UNIV