CL-MMAD: A Contrastive Learning Based Multimodal Software Runtime Anomaly Detection Method

  • Shiyi Kong*
  • , Jun Ai
  • , Minyan Lu
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Featured Application: Software runtime anomaly detection is a critical component in AIOps. The proposed method can detect both functional failures and performance failures in software systems, with a particular focus on database systems. This technique can help long-running service systems identify internal partial failures so that they can take action between the partial failures becoming service failures and ensuring the runtime reliability of systems. Software plays a critical role in the infrastructure of modern society. Due to the increasing complexity, it suffers runtime reliability issues. Online anomaly detection can detect partial failures within the program based on manifestations exhibited internally or externally before serious failures occur in the software system, thus enabling timely intervention by operation and maintenance staff to avoid serious losses. This paper introduces CL-MMAD, a novel anomaly detection method based on contrastive learning using multimodal data sources. CL-MMAD uses ResNet-18 to learn the comprehensive feature spaces of software running status. MSE loss is used as the objective to guide the training process and is taken as the anomaly score. Empirical results highlight the superiority of MSE loss over InfoNCE loss and demonstrate CL-MMAD’s effectiveness in detecting both functional failures and performance issues, with a greater ability to detect the latter.

Original languageEnglish
Article number3596
JournalApplied Sciences (Switzerland)
Volume13
Issue number6
DOIs
StatePublished - Mar 2023

Keywords

  • contrastive learning
  • functional failures
  • multimodal learning
  • performance issues
  • software anomaly detection

Fingerprint

Dive into the research topics of 'CL-MMAD: A Contrastive Learning Based Multimodal Software Runtime Anomaly Detection Method'. Together they form a unique fingerprint.

Cite this