Adversarial Impact on Anomaly Detection in Cloud Datacenters

被引:4
作者
Deka, Pratyush Kr. [1 ]
Bhuyan, Monowar H. [2 ,3 ,4 ]
Kadobayashi, Youki [2 ]
Elmroth, Erik [3 ]
机构
[1] Galgotias Univ, Sch Comp Sci & Engn, Greater Noida, India
[2] NAIST, Lab Cyber Resilience, Nara 6300192, Japan
[3] Umea Univ, Dept Comp Sci, Umea 90187, Sweden
[4] Assam Kaziranga Univ, Dept Comp Sci & Engn, Jorhat, Assam, India
来源
2019 IEEE 24TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2019) | 2019年
关键词
Adversarial learning; Anomaly detection; Poisoning; attack; Cloud services; Datacenter;
D O I
10.1109/PRDC47002.2019.00049
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud datacenters are engineered to meet the requirements of generalised and specialised workloads including mission-critical applications that not only generate tremendous amounts of data traces but also opens opportunities for attackers. The increasing volume and rapid changing behaviour of metric streams (e.g., CPU, network, latency, memory) in the cloud datacenters create difficulties to ensure high availability, security, and performance to cloud service providers. Several anomaly detection techniques have been developed to combat system anomalies in cloud datacenters. By injecting a fraction of well-crafted malicious samples in cloud datacenter traces, attackers can subvert the learning process and results in unacceptable false alarms. These security issues cause threats to all categories of anomaly detection. Hence, it is crucial to assess these techniques against adversaries to improve scalability and robustness. We propose a linear regression-based optimisation framework with the ability to poison data in the training phase and demonstrate its effectiveness on cloud datacenter traces. Finally, we investigate the worst-case analysis of poisoning attacks on robust statistics-based anomaly detection techniques to quantify and assess the detection accuracy. We validate this framework using benchmark resource traces obtained from Yahoo's service cluster as well as traces collected from an experimental testbed with realistic service composition.
引用
收藏
页码:188 / 197
页数:10
相关论文
共 25 条
[1]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336
[2]  
Biggio B., 2013, P 2013 ACM WORKSHOP, P87
[3]   Wild patterns: Ten years after the rise of adversarial machine learning [J].
Biggio, Battista ;
Roli, Fabio .
PATTERN RECOGNITION, 2018, 84 :317-331
[4]   Security Evaluation of Pattern Classifiers under Attack [J].
Biggio, Battista ;
Fumera, Giorgio ;
Roli, Fabio .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (04) :984-996
[5]  
Chakraborty A., 2018, arXiv
[6]  
Chen X., 2017, ARXIV171205526
[7]  
Dalvi Nilesh, 2004, P 10 ACM SIGKDD INT, P99, DOI [DOI 10.1145/1014052.1014066, 10.1145/ 1014052.1014066]
[8]   RANDOM SAMPLE CONSENSUS - A PARADIGM FOR MODEL-FITTING WITH APPLICATIONS TO IMAGE-ANALYSIS AND AUTOMATED CARTOGRAPHY [J].
FISCHLER, MA ;
BOLLES, RC .
COMMUNICATIONS OF THE ACM, 1981, 24 (06) :381-395
[9]   The Cost of a Cloud: Research Problems in Data Center Networks [J].
Greenberg, Albert ;
Hamilton, James ;
Maltz, David A. ;
Patel, Parveen .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2009, 39 (01) :68-73
[10]  
Gu T., 2017, P MACH LEARN COMP SE