Automatic Misconfiguration Troubleshooting with PeerPressure Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang Microsoft Research Presenter:

Slides:



Advertisements
Similar presentations
Dream Report: Advanced Manual Data Entry
Advertisements

1 Dynamic Adaptation of Temporal Event Correlation Rules Rean Griffith‡, Gail Kaiser‡ Joseph Hellerstein*, Yixin Diao* Presented by Rean Griffith
Dream Report: The Technical Basics Renee Sikes Applications Engineer Dream Report Brand Manager.
Managing Computers With Intel AMT Greg Rusu
XENMON: QOS MONITORING AND PERFORMANCE PROFILING TOOL Diwaker Gupta, Rob Gardner, Ludmila Cherkasova 1.
A KLT-Based Approach for Occlusion Handling in Human Tracking Chenyuan Zhang, Jiu Xu, Axel Beaugendre and Satoshi Goto 2012 Picture Coding Symposium.
R. Barret, P. Maglio, E. Kandogan, J. Bailey, Usable Autonomic Computing Systems: the Administrators' Perspective, ICAC 2004Usable Autonomic Computing.
Chapter 6: Database Evolution Title: AutoAdmin “What-if” Index Analysis Utility Authors: Surajit Chaudhuri, Vivek Narasayya ACM SIGMOD 1998.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 6: Configure and Troubleshoot Local User and Group Accounts.
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 1 Introduction to Database Management.
Chemotherapy Flow Sheet Eric Maurer Advisor: Ron Giles Supervisor: Phil Bolenbaugh.
HENGHA: DATA HARVESTING DETECTION ON HIDDEN DATABASES Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi University of California, Santa Barbara CCSW 2010.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 11 Database Performance Tuning and Query Optimization.
Computer Genomics: Towards Self- Change and Configuration Management ( Yi-Min Wang Senior Researcher & Group Manager.
5.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 5: Working with File Systems.
Security in SQL Jon Holmes CIS 407 Fall Outline Surface Area Connection Strings Authenticating Permissions Data Storage Injections.
APPX/Net Presented By: Gary Rogers. APPX/Net APPX/Net is a utility that allows an Appx engine running on one computer to read and write AppxIO data on.
Microsoft ® Application Virtualization 4.5 Infrastructure Planning and Design Series.
Chapter 1 Introduction to Database Management. McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc. All rights reserved. Welcome! Database technology:
Microsoft Desktop Virtualization Migrating to Windows 7 With MED-V.
1 Automatic Misconfiguration Disagnosis with PeerPressure Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, and Yi-Min Wang Microsoft Research OSDI 2004,
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
Report : Zhen Ming Wu 2008 IEEE 9th Grid Computing Conference.
Introduction to HP LoadRunner Getting Familiar with LoadRunner >>>>>>>>>>>>>>>>>>>>>>
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, Sixth Edition Chapter 9, Part 11 Satisfying Customer Needs.
Technology Expectations in an Aeros Environment October 15, 2014.
Database Design - Lecture 1
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 10 Database Performance Tuning and Query Optimization.
Introduction Overview Static analysis Memory analysis Kernel integrity checking Implementation and evaluation Limitations and future work Conclusions.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use.
Patch Management Only part of the solution….. Bob Isaak Mar 04, 2004.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Dream Report: Secure and Reliable Reporting Renee Sikes Applications Engineer Dream Report Brand Manager.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Introduction to Database Management. 1-2 Outline  Database characteristics  DBMS features  Architectures  Organizational roles.
Ideas to Improve SharePoint Usage 4. What are these 4 Ideas? 1. 7 Steps to check SharePoint Health 2. Avoid common Deployment Mistakes 3. Analyze SharePoint.
Ian Alderman A Little History…
Enterprise Resource Planning(ERP)
Towards a Billion Routing Lookups per Second in Software  Author: Marko Zec, Luigi, Rizzo Miljenko Mikuc  Publisher: SIGCOMM Computer Communication Review,
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Evidence Correlation November 2011.
CISC Machine Learning for Solving Systems Problems Presented by: Alparslan SARI Dept of Computer & Information Sciences University of Delaware
CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Chapter 10 Chapter 10: Managing the Distributed File System, Disk Quotas, and Software Installation.
Online Music Store. MSE Project Presentation III
The Million Point PI System – PI Server 3.4 The Million Point PI System PI Server 3.4 Jon Peterson Rulik Perla Denis Vacher.
Deploying Software with Group Policy Chapter Twelve.
Yaping Zhu with: Jennifer Rexford (Princeton University) Aman Shaikh and Subhabrata Sen (ATT Research) Route Oracle: Where Have.
Data Leakage Detection by R.Kartheek Reddy 09C31D5807 (M.Tech CSE)
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Privacy-Preserving and Content-Protecting Location Based Queries.
Hypothesis Testing Steps for the Rejection Region Method State H 1 and State H 0 State the Test Statistic and its sampling distribution (normal or t) Determine.
IPariksha Automating Examination System. Brief iPariksha is a complete online examination system designed and developed for accelerating the manual examination.
Hands-On Microsoft Windows Server Implementing User Profiles A local user profile is automatically created at the local computer when you log on.
Online Newspaper CMS 1 Date: 27/12/2012. Contents Introduction Project Management Requirement Specifications Design Description Test Documentation Summary.
SQL Server Statistics DEMO SQL Server Statistics SREENI JULAKANTI,MCTS.MCITP,MCP. SQL SERVER Database Administration.
AA202: Performance Enhancers for Laserfiche Connie Anderson, Technical Writer.
SQL Server 2016 – New Features Tilahun Endihnew March 12, 2016.
SQL Server Statistics DEMO SQL Server Statistics SREENI JULAKANTI,MCTS.MCITP SQL SERVER Database Administration.
SketchVisor: Robust Network Measurement for Software Packet Processing
What’s new in SQL Server 2017 for BI?
Database backed DNS.
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Outline Introduction Characteristics of intrusion detection systems
Download dumps - Microsoft Real Exam Questions Dumps4download
Dynamics AX Performance
JULIE McLAIN-HARPER LINKEDIN: JM HARPER
Best Practices in Higher Education Student Data Warehousing Forum
Presentation transcript:

Automatic Misconfiguration Troubleshooting with PeerPressure Helen J. Wang, John C. Platt, Yu Chen, Ruyun Zhang, Yi-Min Wang Microsoft Research Presenter: Sara Salahi Northwestern University

Agenda Importance of this work Key ideas PeerPressure: Architecture & Algorithm Prototype Performance Future Work

Tech support = 17% total cost of ownership of today’s desktop PCs Large amount of Tech support is spent on troubleshooting Many troubleshooting cases are due to misconfiguration Misconfiguration is often caused by data that is in shared persistent stores (e.g. Windows registry) Importance Authors focus on this

Key Ideas: Misconfigurations Can have many different “root causes” –Seemingly innocuous changes to shared system configurations –System bugs –Security patches may introduce incompatible registry settings –Failed uninstallation of applications –Manual intervention using Registry editor

Key Ideas: The Golden State “Golden State” – a perfect configuration Assume that the golden state is in the mass Combine statistical golden state with Bayesian statistics to identify anomalous misconfigurations on “sick” machines

Key Ideas: Goals of Troubleshooting Effectiveness –System should identify a small set of sick configuration candidates in a short amount of time Automation –Minimize number of manual steps and number of users involved

PeerPressure: Architecture 1) Sick computer  2) I found you 3) Turns user- or machine-specific entries into canonicalized form 4) Database containing a number of machine configuration snapshots 5) Bayesian estimation used to calculate probability of a suspect being sick

Manual Steps –User runs faulty application to record suspects –User determines if sickness is cured Manual steps involve only the troubleshooting user and no second-party PeerPressure: Architecture

PeerPressure: Algorithm Intuition and Objectives e1: Probably healthy e2: Most probably sick e3: “Natural biological diversity” Type I : application configuration states –e1 and e2 Type II : operational states (timestamps, caches etc) –e3 –Want to weed out; most likely false positives

PeerPressure: Algorithm Formulation: (3) + (1)  when m=0, P(S|V) = 1 Bayesian estimation used to overcome this. Vector p j : probability of event happening and its outcome being V j ; p j follows Direchtlet distribution. m j : count of number of values matching suspect value

PeerPressure: Algorithm Asymptotic Analysis:

Prototype GeneBank Database: Microsoft SQL Server 2000 containing snapshots from 87 Windows XP PCs PeerPressure troubleshooter implemented in C# “Data Sanitization” –Unification of different representations of the same value Dual Intel Xeon 2.4 GHz CPU workstation with 1 Gb RAM hosts SQL Server

Performance Response Time vs. Number of Suspects 20 real-world troubleshooting cases used Database queries dominate troubleshooting response time (one query per suspect entry)

Prototype: GeneBank Registry characteristics in GeneBank Unseen – values that are unknown to the GeneBank, increments observed cardinality by 1 –Any entry from GeneBank has cardinality of at least 2 Entries that do no exist on some sample machines have value no entry When cardinality is low, conformity among samples is strong

Performance Root-Cause Ranking Results 87% have cardinality of 2, 94% no more than 3, 97% no more than 4

Performance False Positives Large cardinality of root-cause entry Relation between root-cause entry and other entries in the suspect set GeneBank is not pristine

Performance Impact of Sample Set Size

Performance Sick Machine Sensitivity Format: RootCauseRanking (NumberOfTies) / NumberOfSuspects

Future Work Multi-gene troubleshooting –Multiple sick entries among suspects Cross-application misconfiguration Heavy customization of apps can break assumption of strong conformance in most configuration entries GeneBank maintenance – privacy issue