Semi-Supervised Range-Based Anomaly Detection for Cloud Systems

被引:4
作者
Deka, Pratyush Kr. [1 ]
Verma, Yash [2 ]
Bin Bhutto, Adil [3 ]
Elmroth, Erik [3 ]
Bhuyan, Monowar [3 ]
机构
[1] Synechron Technol Pvt Ltd, Technol Dept, Pune 411057, India
[2] Ernst & Young Global LLP Spotmentor, People Advisory Serv Dept, Gurugram 122018, India
[3] Umea Univ, Dept Comp Sci, S-90187 Umea, Sweden
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2023年 / 20卷 / 02期
关键词
Anomaly detection; cloud reliability; LSTM encoder-decoder; time series reconstruction; dynamic density; range-based evaluation metrics;
D O I
10.1109/TNSM.2022.3225753
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The inherent characteristics of cloud systems often lead to anomalies, which pose challenges for high availability, reliability, and high performance. Detecting anomalies in cloud key performance indicators (KPI) is a critical step towards building a secure and trustworthy system with early mitigation features. This work is motivated by (i) the efficacy of recent reconstruction-based anomaly detection (AD), (ii) the misrepresentation of the accuracy of time series anomaly detection because point-based Precision and Recall are used to evaluate the efficacy for range-based anomalies, and (iii) detects performance and security anomalies when distributions shift and overlaps. In this paper, we propose a novel semi-supervised dynamic density-based detection rule that uses the reconstruction error vectors in order to detect anomalies. We use long short-term memory networks based on encoder-decoder (LSTM-ED) architecture to reconstruct the normal KPI time series. We experiment with both testbed and a diverse set of real-world datasets. The experimental results show that the dynamic density approach exhibits better performance compared to other detection rules using both standard and range-based evaluation metrics. We also compare the performance of our approach with state-of-the-art methods, outperforms in detecting both performance and security anomalies.
引用
收藏
页码:1290 / 1304
页数:15
相关论文
共 60 条
[41]   Intrusion Detection in the Cloud [J].
Roschke, Sebastian ;
Cheng, Feng ;
Meinel, Christoph .
EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, :729-734
[42]  
Sak H, 2014, Arxiv, DOI [arXiv:1402.1128, DOI 10.48550/ARXIV.1402.1128, 10.48550/arXiv.1402.1128]
[43]   Chronos: DDoS Attack Detection Using Time-Based Autoencoder [J].
Salahuddin, Mohammad A. ;
Pourahmadi, Vahid ;
Alameddine, Hyame Assem ;
Bari, Md Faizul ;
Boutaba, Raouf .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (01) :627-641
[44]   Anomaly detection and diagnosis for cloud services: Practical experiments and lessons learned [J].
Sauvanaud, Carla ;
Kaaniche, Mohamed ;
Kanoun, Karama ;
Lazri, Kahina ;
Silvestre, Guthemberg Da Silva .
JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 139 :84-106
[45]  
Sharafaldin I, 2019, INT CARN CONF SECU
[46]   Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization [J].
Sharafaldin, Iman ;
Lashkari, Arash Habibi ;
Ghorbani, Ali A. .
ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, :108-116
[47]   Anomaly Detection in Streams with Extreme Value Theory [J].
Siffer, Alban ;
Fouque, Pierre-Alain ;
Termier, Alexandre ;
Largouet, Christine .
KDD'17: PROCEEDINGS OF THE 23RD ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2017, :1067-1075
[48]   A Statistical Technique for Online Anomaly Detection for Big Data Streams in Cloud Collaborative Environment [J].
Smrithy, G. S. ;
Balakrishnan, Ramadoss .
2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2016, :108-111
[49]  
Solaimani M, 2014, IEEE INT CONF BIG DA, P1086, DOI 10.1109/BigData.2014.7004343
[50]  
Sutskever I, 2014, ADV NEUR IN, V27