File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Informer: Irregular traffic detection for containerized microservices RPC in the real world

TitleInformer: Irregular traffic detection for containerized microservices RPC in the real world
Authors
KeywordsAdversarial attacks
Anomaly detection
Containers
GCN
Microservices
RPC
Issue Date2022
Citation
High-Confidence Computing, 2022, v. 2, n. 2, article no. 100050 How to Cite?
AbstractContainerized microservices have been widely deployed in the industry. Meanwhile, security issues also arise. Many security enhancement mechanisms for containerized microservices require predefined rules and policies. However, it is challenging when it comes to thousands of microservices and a massive amount of real-time unstructured data. Hence, automatic policy generation becomes indispensable. In this paper, we focus on the automatic solution for the security problem: irregular traffic detection for RPCs. We propose Informer, a two-phase machine learning framework to track the traffic of each RPC and automatically report anomalous points. We first identify RPC chain patterns using density-based clustering techniques and build a graph for each critical pattern. Next, we solve the irregular RPC traffic detection problem as a prediction problem for attributed graphs with time series by leveraging spatial-temporal graph convolution networks. Since the framework builds multiple models and makes individual predictions for each RPC chain pattern, it can be efficiently updated upon legitimate changes in any graphs. In evaluations, we applied Informer to a dataset containing more than 7 billion lines of raw RPC logs sampled from a large Kubernetes system for two weeks. We provide two case studies of detected real-world threats. As a result, our framework found fine-grained RPC chain patterns and accurately captured the anomalies in a dynamic and complicated microservice production scenario, which demonstrates the effectiveness of Informer. Furthermore, we extensively evaluated the risk of adversarial attacks for our prediction model under different reality constraints and showed that the model is robust to such attacks in most real-world scenarios.
Persistent Identifierhttp://hdl.handle.net/10722/346916

 

DC FieldValueLanguage
dc.contributor.authorChen, Jiyu-
dc.contributor.authorHuang, Heqing-
dc.contributor.authorChen, Hao-
dc.date.accessioned2024-09-17T04:14:10Z-
dc.date.available2024-09-17T04:14:10Z-
dc.date.issued2022-
dc.identifier.citationHigh-Confidence Computing, 2022, v. 2, n. 2, article no. 100050-
dc.identifier.urihttp://hdl.handle.net/10722/346916-
dc.description.abstractContainerized microservices have been widely deployed in the industry. Meanwhile, security issues also arise. Many security enhancement mechanisms for containerized microservices require predefined rules and policies. However, it is challenging when it comes to thousands of microservices and a massive amount of real-time unstructured data. Hence, automatic policy generation becomes indispensable. In this paper, we focus on the automatic solution for the security problem: irregular traffic detection for RPCs. We propose Informer, a two-phase machine learning framework to track the traffic of each RPC and automatically report anomalous points. We first identify RPC chain patterns using density-based clustering techniques and build a graph for each critical pattern. Next, we solve the irregular RPC traffic detection problem as a prediction problem for attributed graphs with time series by leveraging spatial-temporal graph convolution networks. Since the framework builds multiple models and makes individual predictions for each RPC chain pattern, it can be efficiently updated upon legitimate changes in any graphs. In evaluations, we applied Informer to a dataset containing more than 7 billion lines of raw RPC logs sampled from a large Kubernetes system for two weeks. We provide two case studies of detected real-world threats. As a result, our framework found fine-grained RPC chain patterns and accurately captured the anomalies in a dynamic and complicated microservice production scenario, which demonstrates the effectiveness of Informer. Furthermore, we extensively evaluated the risk of adversarial attacks for our prediction model under different reality constraints and showed that the model is robust to such attacks in most real-world scenarios.-
dc.languageeng-
dc.relation.ispartofHigh-Confidence Computing-
dc.subjectAdversarial attacks-
dc.subjectAnomaly detection-
dc.subjectContainers-
dc.subjectGCN-
dc.subjectMicroservices-
dc.subjectRPC-
dc.titleInformer: Irregular traffic detection for containerized microservices RPC in the real world-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1016/j.hcc.2022.100050-
dc.identifier.scopuseid_2-s2.0-85132034611-
dc.identifier.volume2-
dc.identifier.issue2-
dc.identifier.spagearticle no. 100050-
dc.identifier.epagearticle no. 100050-
dc.identifier.eissn2667-2952-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats