Cloud Native Applications Profiling using a Graph Neural Networks Approach

Amine Boukhtouta, Taous Madi, M. Pourzandi, H. Alameddine
{"title":"Cloud Native Applications Profiling using a Graph Neural Networks Approach","authors":"Amine Boukhtouta, Taous Madi, M. Pourzandi, H. Alameddine","doi":"10.1109/FNWF55208.2022.00046","DOIUrl":null,"url":null,"abstract":"The convergence of Telecommunication and industry operational networks towards cloud native applications has enabled the idea to integrate protection layers to harden security posture and management of cloud native based deployments. In this paper, we propose a data-driven approach to support detection of anomalies in cloud native application based on a graph neural network. The essence of the profiling relies on capturing interactions between different perspectives in cloud native applications through a network dependency graph and transforming it to a computational graph neural network. The latter is used to profile different deployed assets like micro-service types, workloads' namespaces, worker machines, management and orchestration machines as well as clusters. As a first phase of the profiling, we consider a fine-grained profiling on microservice types with an emphasis on network traffic indicators. These indicators are collected on distributed Kubernetes (K8S) deployment premises. Experimental results shows good trade-off in terms of accuracy and recall with respect to micro-service types profiling (around 96%). In addition, we used predictions entropy scores to infer anomalies in testing data. These scores allow to segregate between benign and anomalous graphs, where we identified 19 out of 23 anomalies. Moreover, by using entropy scores, we can conduct a root cause analysis to infer problematic micro-services.","PeriodicalId":300165,"journal":{"name":"2022 IEEE Future Networks World Forum (FNWF)","volume":"418 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Future Networks World Forum (FNWF)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FNWF55208.2022.00046","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The convergence of Telecommunication and industry operational networks towards cloud native applications has enabled the idea to integrate protection layers to harden security posture and management of cloud native based deployments. In this paper, we propose a data-driven approach to support detection of anomalies in cloud native application based on a graph neural network. The essence of the profiling relies on capturing interactions between different perspectives in cloud native applications through a network dependency graph and transforming it to a computational graph neural network. The latter is used to profile different deployed assets like micro-service types, workloads' namespaces, worker machines, management and orchestration machines as well as clusters. As a first phase of the profiling, we consider a fine-grained profiling on microservice types with an emphasis on network traffic indicators. These indicators are collected on distributed Kubernetes (K8S) deployment premises. Experimental results shows good trade-off in terms of accuracy and recall with respect to micro-service types profiling (around 96%). In addition, we used predictions entropy scores to infer anomalies in testing data. These scores allow to segregate between benign and anomalous graphs, where we identified 19 out of 23 anomalies. Moreover, by using entropy scores, we can conduct a root cause analysis to infer problematic micro-services.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用图神经网络方法分析云原生应用程序
电信和工业运营网络向云原生应用程序的融合使得集成保护层的想法成为可能,从而加强基于云原生部署的安全态势和管理。在本文中,我们提出了一种基于图神经网络的数据驱动方法来支持云原生应用中的异常检测。分析的本质依赖于通过网络依赖图捕获云原生应用程序中不同透视图之间的交互,并将其转换为计算图神经网络。后者用于分析不同的部署资产,如微服务类型、工作负载的名称空间、工作机器、管理和编排机器以及集群。作为分析的第一阶段,我们考虑对微服务类型进行细粒度分析,重点放在网络流量指标上。这些指标是在分布式Kubernetes (K8S)部署前提下收集的。实验结果表明,相对于微服务类型分析,在准确性和召回率方面有很好的权衡(约96%)。此外,我们使用预测熵分数来推断测试数据中的异常。这些分数允许在良性和异常图之间进行隔离,其中我们识别了23个异常中的19个。此外,通过使用熵分数,我们可以进行根本原因分析来推断有问题的微服务。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
SliceSecure: Impact and Detection of DoS/DDoS Attacks on 5G Network Slices A Score Function Heuristic for Crosstalk- and Fragmentation-Aware Dynamic Routing, Modulation, Core, and Spectrum Allocation in SDM-EONs Machine Learning Aided Design of Sub-Array MIMO Antennas for CubeSats Based on 3D Printed Metallic Ridge Gap Waveguides A Supra-Disciplinary Open Framework of Knowledge to Address the Future Challenges of a Network of Feelings Resource Allocation with Vickrey-Dutch Auctioning Game for C-RAN Fronthaul
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1