On the effectiveness of isolation-based anomaly detection in cloud data centers

被引:25
作者
Calheiros, Rodrigo N. [1 ]
Ramamohanarao, Kotagiri [2 ]
Buyya, Rajkumar [2 ]
Leckie, Christopher [2 ]
Versteeg, Steve [3 ]
机构
[1] Western Sydney Univ, Sch Comp Engn & Math, Penrith, NSW, Australia
[2] Univ Melbourne, Sch Comp & Informat Syst, Melbourne, Vic, Australia
[3] CA Technol, Melbourne, Vic, Australia
关键词
anomaly detection; cloud computing; data centers; time-series; NETWORKS;
D O I
10.1002/cpe.4169
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The high volume of monitoring information generated by large-scale cloud infrastructures poses a challenge to the capacity of cloud providers in detecting anomalies in the infrastructure. Traditional anomaly detection methods are resource-intensive and computationally complex for training and/or detection, what is undesirable in very dynamic and large-scale environment such as clouds. Isolation-based methods have the advantage of low complexity for training and detection and are optimized for detecting failures. In this work, we explore the feasibility of Isolation Forest, an isolation-based anomaly detection method, to detect anomalies in large-scale cloud data centers. We propose a method to code time-series information as extra attributes that enable temporal anomaly detection and establish its feasibility to adapt to seasonality and trends in the time-series and to be applied online and in real-time.
引用
收藏
页数:12
相关论文
共 36 条
[1]  
[Anonymous], J SYST STWARE
[2]  
[Anonymous], P 32 IEEE INT C DIST
[3]  
[Anonymous], 2014, P ACM S CLOUD COMP
[4]  
Bay S.D, 2003, KDD 03, P29, DOI [10.1145/956750.956758, DOI 10.1145/956750.956758]
[5]  
Bhaduri K., 2011, 2011 IEEE International Conference on Data Mining Workshops, P137, DOI 10.1109/ICDMW.2011.62
[6]  
Breiman L., 2001, Machine Learning, V45, P5
[7]   Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility [J].
Buyya, Rajkumar ;
Yeo, Chee Shin ;
Venugopal, Srikumar ;
Broberg, James ;
Brandic, Ivona .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (06) :599-616
[8]  
Davis Ian, 2013, 2013 5th International Workshop on Principles of Engineering Service-Oriented Systems (PESOS), P37, DOI 10.1109/PESOS.2013.6635975
[9]  
Dean D., 2012, ICAC, DOI [10.1145/2371536.2371572, DOI 10.1145/2371536.2371572]
[10]   An isolation principle based distributed anomaly detection method in wireless sensor networks [J].
Ding Z.-G. ;
Du D.-J. ;
Fei M.-R. .
International Journal of Automation and Computing, 2015, 12 (04) :402-412