File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1016/j.hcc.2022.100050
- Scopus: eid_2-s2.0-85132034611
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Article: Informer: Irregular traffic detection for containerized microservices RPC in the real world
Title | Informer: Irregular traffic detection for containerized microservices RPC in the real world |
---|---|
Authors | |
Keywords | Adversarial attacks Anomaly detection Containers GCN Microservices RPC |
Issue Date | 2022 |
Citation | High-Confidence Computing, 2022, v. 2, n. 2, article no. 100050 How to Cite? |
Abstract | Containerized microservices have been widely deployed in the industry. Meanwhile, security issues also arise. Many security enhancement mechanisms for containerized microservices require predefined rules and policies. However, it is challenging when it comes to thousands of microservices and a massive amount of real-time unstructured data. Hence, automatic policy generation becomes indispensable. In this paper, we focus on the automatic solution for the security problem: irregular traffic detection for RPCs. We propose Informer, a two-phase machine learning framework to track the traffic of each RPC and automatically report anomalous points. We first identify RPC chain patterns using density-based clustering techniques and build a graph for each critical pattern. Next, we solve the irregular RPC traffic detection problem as a prediction problem for attributed graphs with time series by leveraging spatial-temporal graph convolution networks. Since the framework builds multiple models and makes individual predictions for each RPC chain pattern, it can be efficiently updated upon legitimate changes in any graphs. In evaluations, we applied Informer to a dataset containing more than 7 billion lines of raw RPC logs sampled from a large Kubernetes system for two weeks. We provide two case studies of detected real-world threats. As a result, our framework found fine-grained RPC chain patterns and accurately captured the anomalies in a dynamic and complicated microservice production scenario, which demonstrates the effectiveness of Informer. Furthermore, we extensively evaluated the risk of adversarial attacks for our prediction model under different reality constraints and showed that the model is robust to such attacks in most real-world scenarios. |
Persistent Identifier | http://hdl.handle.net/10722/346916 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chen, Jiyu | - |
dc.contributor.author | Huang, Heqing | - |
dc.contributor.author | Chen, Hao | - |
dc.date.accessioned | 2024-09-17T04:14:10Z | - |
dc.date.available | 2024-09-17T04:14:10Z | - |
dc.date.issued | 2022 | - |
dc.identifier.citation | High-Confidence Computing, 2022, v. 2, n. 2, article no. 100050 | - |
dc.identifier.uri | http://hdl.handle.net/10722/346916 | - |
dc.description.abstract | Containerized microservices have been widely deployed in the industry. Meanwhile, security issues also arise. Many security enhancement mechanisms for containerized microservices require predefined rules and policies. However, it is challenging when it comes to thousands of microservices and a massive amount of real-time unstructured data. Hence, automatic policy generation becomes indispensable. In this paper, we focus on the automatic solution for the security problem: irregular traffic detection for RPCs. We propose Informer, a two-phase machine learning framework to track the traffic of each RPC and automatically report anomalous points. We first identify RPC chain patterns using density-based clustering techniques and build a graph for each critical pattern. Next, we solve the irregular RPC traffic detection problem as a prediction problem for attributed graphs with time series by leveraging spatial-temporal graph convolution networks. Since the framework builds multiple models and makes individual predictions for each RPC chain pattern, it can be efficiently updated upon legitimate changes in any graphs. In evaluations, we applied Informer to a dataset containing more than 7 billion lines of raw RPC logs sampled from a large Kubernetes system for two weeks. We provide two case studies of detected real-world threats. As a result, our framework found fine-grained RPC chain patterns and accurately captured the anomalies in a dynamic and complicated microservice production scenario, which demonstrates the effectiveness of Informer. Furthermore, we extensively evaluated the risk of adversarial attacks for our prediction model under different reality constraints and showed that the model is robust to such attacks in most real-world scenarios. | - |
dc.language | eng | - |
dc.relation.ispartof | High-Confidence Computing | - |
dc.subject | Adversarial attacks | - |
dc.subject | Anomaly detection | - |
dc.subject | Containers | - |
dc.subject | GCN | - |
dc.subject | Microservices | - |
dc.subject | RPC | - |
dc.title | Informer: Irregular traffic detection for containerized microservices RPC in the real world | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1016/j.hcc.2022.100050 | - |
dc.identifier.scopus | eid_2-s2.0-85132034611 | - |
dc.identifier.volume | 2 | - |
dc.identifier.issue | 2 | - |
dc.identifier.spage | article no. 100050 | - |
dc.identifier.epage | article no. 100050 | - |
dc.identifier.eissn | 2667-2952 | - |