Learning State Machines to Monitor and Detect Anomalies on a Kubernetes Cluster

06/28/2022
by   Clinton Cao, et al.
0

These days more companies are shifting towards using cloud environments to provide their services to their client. While it is easy to set up a cloud environment, it is equally important to monitor the system's runtime behaviour and identify anomalous behaviours that occur during its operation. In recent years, the utilisation of rnn and dnn to detect anomalies that might occur during runtime has been a trending approach. However, it is unclear how to explain the decisions made by these networks and how these networks should be interpreted to understand the runtime behaviour that they model. On the contrary, state machine models provide an easier manner to interpret and understand the behaviour that they model. In this work, we propose an approach that learns state machine models to model the runtime behaviour of a cloud environment that runs multiple microservice applications. To the best of our knowledge, this is the first work that tries to apply state machine models to microservice architectures. The state machine model is used to detect the different types of attacks that we launch on the cloud environment. From our experiment results, our approach can detect the attacks very well, achieving a balanced accuracy of 99.2

READ FULL TEXT
research
03/04/2022

Network Services Anomalies in NFV: Survey, Taxonomy, and Verification Methods

Network Function Virtualization (NFV) has emerged as a disruptive networ...
research
03/11/2023

Automatic Detection of Signalling Behaviour from Assistance Dogs as they Forecast the Onset of Epileptic Seizures in Humans

Epilepsy or the occurrence of epileptic seizures, is one of the world's ...
research
03/25/2020

Quality Assurance of Heterogeneous Applications: The SODALITE Approach

A key focus of the SODALITE project is to assure the quality and perform...
research
04/11/2019

On Machine Learning DoS Attack Identification from Cloud Computing Telemetry

The detection of Denial of Service (DoS) attacks remains a challenge for...
research
11/22/2021

IAD: Indirect Anomalous VMMs Detection in the Cloud-based Environment

Server virtualization in the form of virtual machines (VMs) with the use...
research
10/04/2022

Detecting Anomalies within Smart Buildings using Do-It-Yourself Internet of Things

Detecting anomalies at the time of happening is vital in environments li...

Please sign up or login with your details

Forgot password? Click here to reset