Using Self-Organizing Maps for the Behavioral Analysis of Virtualized Network Functions

被引:3
作者
Lanciano, Giacomo [1 ,2 ]
Ritacco, Antonio [1 ]
Brau, Fabio [1 ]
Cucinotta, Tommaso [1 ]
Vannucci, Marco [1 ]
Artale, Antonino [3 ]
Barata, Joao [4 ]
Sposato, Enrica [3 ]
机构
[1] Scuola Super Sant Anna, Pisa, Italy
[2] Scuola Normale Super Pisa, Pisa, Italy
[3] Vodafone, Milan, Italy
[4] Vodafone, Lisbon, Portugal
来源
CLOUD COMPUTING AND SERVICES SCIENCE, CLOSER 2020 | 2021年 / 1399卷
关键词
Self-organizing maps; Machine learning; Network function virtualization; ANOMALY DETECTION; SOM; ARCHITECTURE; DIAGNOSIS; LOG;
D O I
10.1007/978-3-030-72369-9_7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Detecting anomalous behaviors in a network function virtualization infrastructure is of the utmost importance for network operators. In this paper, we propose a technique, based on Self-Organizing Maps, to address such problem by leveraging on the massive amount of historical system data that is typically available in these infrastructures. Indeed, our method consists of a joint analysis of system-level metrics, provided by the virtualized infrastructure monitoring system and referring to resource consumption patterns of the physical hosts and the virtual machines (or containers) that run on top of them, and application-level metrics, provided by the individual virtualized network functions monitoring subsystems and related to the performance levels of the individual applications. The implementation of our approach has been validated on real data coming from a subset of the Vodafone infrastructure for network function virtualization, where it is currently employed to support the decisions of data center operators. Experimental results show that our technique is capable of identifying specific points in space (i.e., components of the infrastructure) and time of the recent evolution of the monitored infrastructure that are worth to be investigated by human operators in order to keep the system running under expected conditions.
引用
收藏
页码:153 / 177
页数:25
相关论文
共 36 条
[1]   Experience Report: Log Mining using Natural Language Processing and Application to Anomaly Detection [J].
Bertero, Christophe ;
Roy, Matthieu ;
Sauvanaud, Carla ;
Tredan, Gilles .
2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2017, :351-360
[2]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[3]   Applying two-stage SOM-based clustering approaches to industrial data analysis [J].
Canetta, L ;
Cheikhrouhou, N ;
Glardon, R .
PRODUCTION PLANNING & CONTROL, 2005, 16 (08) :774-784
[4]   Breast cancer diagnosis using self-organizing map for sonography [J].
Chen, DR ;
Chang, RF ;
Huang, YL .
ULTRASOUND IN MEDICINE AND BIOLOGY, 2000, 26 (03) :405-411
[5]  
Cucinotta T., 2020, P 10 INT C CLOUD COM
[6]   A new approach to exploratory analysis of system dynamics using SOM.: Applications to industrial processes [J].
Diaz, Ignacio ;
Dominguez, Manuel ;
Cuadrado, Abel A. ;
FuerteS, Juan J. .
EXPERT SYSTEMS WITH APPLICATIONS, 2008, 34 (04) :2953-2965
[7]   Metric selection and anomaly detection for cloud operations using log and metric correlation analysis [J].
Farshchi, Mostafa ;
Schneider, Jean-Guy ;
Weber, Ingo ;
Grundy, John .
JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 137 :531-549
[8]   Deep learning for time series classification: a review [J].
Fawaz, Hassan Ismail ;
Forestier, Germain ;
Weber, Jonathan ;
Idoumghar, Lhassane ;
Muller, Pierre-Alain .
DATA MINING AND KNOWLEDGE DISCOVERY, 2019, 33 (04) :917-963
[9]  
Fortuin V., 2019, INT C LEARN REPR
[10]  
Frey CW, 2012, 2012 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), P1040