Behavioral Analysis for Virtualized Network Functions: A SOM-based Approach

被引:7
作者
Cucinotta, Tommaso [1 ]
Lanciano, Giacomo [1 ,2 ]
Ritacco, Antonio [1 ]
Vannucci, Marco [1 ]
Artale, Antonino [3 ]
Barata, Joao [4 ]
Sposato, Enrica [3 ]
Basili, Luca [3 ]
机构
[1] Scuola Super Sant Anna, Pisa, Italy
[2] Scuola Normale Super Pisa, Pisa, Italy
[3] Vodafone, Milan, Italy
[4] Vodafone, Lisbon, Portugal
来源
PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE (CLOSER) | 2020年
关键词
Self-organizing Maps; Machine Learning; Network Function Virtualization; ANOMALY DETECTION; ARCHITECTURE;
D O I
10.5220/0009420901500160
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we tackle the problem of detecting anomalous behaviors in a virtualized infrastructure for network function virtualization, proposing to use self-organizing maps for analyzing historical data available through a data center. We propose a joint analysis of system-level metrics, mostly related to resource consumption patterns of the hosted virtual machines, as available through the virtualized infrastructure monitoring system, and the application-level metrics published by individual virtualized network functions through their own monitoring subsystems. Experimental results, obtained by processing real data from one of the NFV data centers of the Vodafone network operator, show that our technique is able to identify specific points in space and time of the recent evolution of the monitored infrastructure that are worth to be investigated by a human operator in order to keep the system running under expected conditions.
引用
收藏
页码:150 / 160
页数:11
相关论文
共 27 条
  • [1] [Anonymous], 2012, NETW FUNCT VIRT
  • [2] Experience Report: Log Mining using Natural Language Processing and Application to Anomaly Detection
    Bertero, Christophe
    Roy, Matthieu
    Sauvanaud, Carla
    Tredan, Gilles
    [J]. 2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2017, : 351 - 360
  • [3] A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
    Buczak, Anna L.
    Guven, Erhan
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1153 - 1176
  • [4] Applying two-stage SOM-based clustering approaches to industrial data analysis
    Canetta, L
    Cheikhrouhou, N
    Glardon, R
    [J]. PRODUCTION PLANNING & CONTROL, 2005, 16 (08) : 774 - 784
  • [5] Cui Z., 2016, MULTISCALE CONVOLUTI
  • [6] A new approach to exploratory analysis of system dynamics using SOM.: Applications to industrial processes
    Diaz, Ignacio
    Dominguez, Manuel
    Cuadrado, Abel A.
    FuerteS, Juan J.
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2008, 34 (04) : 2953 - 2965
  • [7] Metric selection and anomaly detection for cloud operations using log and metric correlation analysis
    Farshchi, Mostafa
    Schneider, Jean-Guy
    Weber, Ingo
    Grundy, John
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 137 : 531 - 549
  • [8] Deep learning for time series classification: a review
    Fawaz, Hassan Ismail
    Forestier, Germain
    Weber, Jonathan
    Idoumghar, Lhassane
    Muller, Pierre-Alain
    [J]. DATA MINING AND KNOWLEDGE DISCOVERY, 2019, 33 (04) : 917 - 963
  • [9] Gulenko A, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), P2716, DOI 10.1109/BigData.2016.7840917
  • [10] A system architecture for real-time anomaly detection in large-scale NFV systems
    Gulenko, Anton
    Wallschlaeger, Marcel
    Schmidt, Florian
    Kao, Odej
    Liu, Feng
    [J]. 11TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2016) / THE 13TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2016) / AFFILIATED WORKSHOPS, 2016, 94 : 491 - 496