Unlock instant, AI-driven research and patent intelligence for your innovation.

Call chain anomaly detection method, computer equipment and readable storage medium

An anomaly detection and call chain technology, applied in the computer field, can solve the problems of dependency, inability to detect structural anomalies, and inability to support fine-grained root cause location.

Active Publication Date: 2022-04-19
TSINGHUA UNIV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And it solves many problems of the existing technology, such as: unable to detect structural anomalies, relying on supervised data, unable to use complete call chain information, unable to handle complex patterns of call chain index data, high time and space overhead, and unable to support fine-grained root cause location

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Call chain anomaly detection method, computer equipment and readable storage medium
  • Call chain anomaly detection method, computer equipment and readable storage medium
  • Call chain anomaly detection method, computer equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Embodiments of the present application are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary, and are intended to explain the present application, and should not be construed as limiting the present application.

[0039] A call chain anomaly detection method of the present application will be described below with reference to the accompanying drawings.

[0040] The input of the call chain anomaly detection problem refers to the call chain data; the output of the call chain anomaly detection problem refers to whether each call chain is abnormal and the specific abnormal part;

[0041] figure 1 Process each call chain in the embodiment of this application into a graph composed of spans, specifically, as figure 1 As shown, each square ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a calling link abnormal detection method, which relates to the field of computer technology. The method includes the following steps: step S10, processing the calling link into a graph composed of spans; step S20, embedding the calling chain in the Each span is encoded as a high-dimensional vector; step S30, obtain the probability distribution of the normal mode of the high-dimensional vector through the deep Bayesian model; step S40, judge the abnormality of the call chain to be detected according to the obtained probability distribution. The present invention adopting the above scheme can simultaneously detect structural abnormality and index abnormality and can distinguish which kind of abnormality. In addition, the present invention can make full use of the complete call chain data to process complex patterns and support fine-grained root cause location , thereby improving the time and space efficiency.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a call chain abnormality detection method, computer equipment and a readable storage medium. Background technique [0002] Using distributed architecture, such as service-oriented architecture (service-oriented architecture, SOA) or microservice architecture (microservice architecture), is the mainstream trend of modern software system construction. This type of architecture has the characteristics of rapid iteration, easy expansion and automation. [0003] For SOA or microservice architecture, the entire system is split into dozens to thousands of small services, and each service may run in one or more instances. Each of these services only focuses on a small part of the functions, and the completion of complete user requests needs to be implemented with each other through remote process communication (RPC) methods such as HTTP API (application programming interface). Compar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/62G06F16/901
CPCG06F16/9024G06F18/24155
Inventor 裴丹李则言
Owner TSINGHUA UNIV