Anomaly Detection and Root Cause Localization in Virtual Network Functions

被引:59
作者
Sauvanaud, Carla [1 ]
Lazri, Kahina [2 ]
Kaaniche, Mohamed [1 ]
Kanoun, Karama [1 ]
机构
[1] Univ Toulouse, CNRS, LAAS CNRS, Toulouse, France
[2] Orange Labs, 38 Rue Gen Leclerc, F-92130 Issy Les Moulineax, France
来源
2016 IEEE 27TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE) | 2016年
关键词
Anomaly detection; VNF; monitoring data; machine learning; fault injection; SLA; root cause analysis; RANDOM-FORESTS;
D O I
10.1109/ISSRE.2016.32
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The maturity of hardware virtualization has motivated Communication Service Providers (CSPs) to apply this paradigm to network services. Virtual Network Functions (VNFs) result from this trend and raise new dependability challenges related to network softwarisation that are still not thoroughly explored. This paper describes a new approach to detect Service Level Agreements (SLAs) violations and preliminary symptoms of SLAs violations. In particular, one other major objective of our approach is to help CSP administrators to identify the anomalous VM at the origin of the detected SLA violation, which should enable them to proactively plan for appropriate recovery strategies. To this end, we make use of virtual machine (VM) monitoring data and perform both a per-VM and an ensemble analysis. Our approach includes a supervised machine learning algorithm as well as fault injection tools. The experimental testbed consists of a virtual IP Multimedia Subsystem developed by the Clearwater project. Experimental results show that our approach can achieve high precision and recall, and low false alarm rate and can pinpoint the root anomalous VNF VM causing SLA violations. It can also detect preliminary symptoms of high workloads triggering SLA violations.
引用
收藏
页码:196 / 206
页数:11
相关论文
共 33 条
[1]   CARDWATCH: A neural network based database mining system for credit card fraud detection [J].
Aleskerov, E ;
Freisleben, B ;
Rao, B .
PROCEEDINGS OF THE IEEE/IAFE 1997 COMPUTATIONAL INTELLIGENCE FOR FINANCIAL ENGINEERING (CIFER), 1997, :220-226
[2]  
[Anonymous], 1999, Technometrics, DOI DOI 10.2307/1269742
[3]  
[Anonymous], 2015, NETW SOFTW NETSOFT 2
[4]   Basic concepts and taxonomy of dependable and secure computing [J].
Avizienis, A ;
Laprie, JC ;
Randell, B ;
Landwehr, C .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2004, 1 (01) :11-33
[5]  
Birke Robert., 2013, Dependable Systems and Networks (DSN), 2013 43rd Annual IEEE/IFIP International Conference on, P1
[6]   Deep Packet Inspection as a Service [J].
Bremler-Barr, Anat ;
Harchol, Yotam ;
Hay, David ;
Koral, Yaron .
PROCEEDINGS OF THE 2014 CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES (CONEXT'14), 2014, :271-282
[7]  
Cao LJ, 2015, 2015 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORK (NFV-SDN), P93, DOI 10.1109/NFV-SDN.2015.7387412
[8]  
Choi T., 2014, CFI 14
[9]  
Dean D., 2012, ICAC, DOI [10.1145/2371536.2371572, DOI 10.1145/2371536.2371572]
[10]  
Dean D. J., 2014, 6 USENIX WORKSH HOT