Robustness of Workload Forecasting Models in Cloud Data Centers: A White-Box Adversarial Attack Perspective

被引:0
|
作者
Mahbub, Nosin Ibna [1 ]
Hossain, Md. Delowar [1 ]
Akhter, Sharmen [1 ]
Hossain, Md. Imtiaz [1 ]
Jeong, Kimoon [2 ]
Huh, Eui-Nam [1 ]
机构
[1] Kyung Hee Univ, Dept Comp Sci & Engn, Yongin 17104, South Korea
[2] Korea Inst Sci & Technol Informat KISTI, Daejeon, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Cloud computing; workload prediction; cloud security; deep learning; adversarial attack; PERFORMANCE;
D O I
10.1109/ACCESS.2024.3385863
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has become the cornerstone of modern technology, propelling industries to unprecedented heights with its remarkable and recent advances. However, the fundamental challenge for cloud service providers is real-time workload prediction and management for optimal resource allocation. Cloud workloads are characterized by their heterogeneous, unpredictable, and fluctuating nature, making this task even more challenging. As a result of the remarkable achievements of deep learning (DL) algorithms across diverse fields, scholars have begun to embrace this approach to addressing such challenges. It has become the defacto standard for cloud workload prediction. Unfortunately, DL algorithms have been widely recognized for their vulnerability to adversarial examples, which poses a significant challenge to DL-based forecasting models. In this study, we utilize established white-box adversarial attack generation methods from the field of computer vision to construct adversarial cloud workload examples for four cutting-edge deep learning regression models, including Recurrent Neural Network (RNN), Long Short-Term Memory (LSTM), Gated Recurrent Unit (GRU), 1D Convolutional Neural Network (1D-CNN) and attention-based models. We evaluate our study with three widely recognized cloud benchmark datasets: Google trace, Alibaba trace, and Bitbrain. The findings of our analysis unequivocally indicate that DL-based cloud workload forecasting models are highly vulnerable to adversarial attacks. To the best of our knowledge, we are the first to conduct systematic research exploring the vulnerability of DL-based models for workload forecasting in the cloud data center, highlighting the inherent hazards to both security and cost-effectiveness in cloud data centers. By raising awareness of these vulnerabilities, we advocate the urgent development of robust defensive mechanisms to enhance the security of cloud workload forecasting in a constantly evolving technical landscape.
引用
收藏
页码:55248 / 55263
页数:16
相关论文
共 23 条
  • [1] The White-Box Adversarial Data Stream Model
    Ajtai, Miklos
    Braverman, Vladimir
    Jayram, T. S.
    Silwal, Sandeep
    Sun, Alec
    Woodruff, David P.
    Zhou, Samson
    [J]. PROCEEDINGS OF THE 41ST ACM SIGMOD-SIGACT-SIGAI SYMPOSIUM ON PRINCIPLES OF DATABASE SYSTEMS (PODS '22), 2022, : 15 - 27
  • [2] Robustness of Bayesian Neural Networks to White-Box Adversarial Attacks
    Uchendu, Adaku
    Campoy, Daniel
    Menart, Christopher
    Hildenbrandt, Alexandra
    [J]. 2021 IEEE FOURTH INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND KNOWLEDGE ENGINEERING (AIKE 2021), 2021, : 72 - 80
  • [3] White-Box Multi-Objective Adversarial Attack on Dialogue Generation
    Li, Yufei
    Li, Zexin
    Gao, Yingfan
    Liu, Cong
    [J]. PROCEEDINGS OF THE 61ST ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, ACL 2023, VOL 1, 2023, : 1778 - 1792
  • [4] Adaptive Workload Forecasting in Cloud Data Centers
    Zharikov, Eduard
    Telenyk, Sergii
    Bidyuk, Petro
    [J]. JOURNAL OF GRID COMPUTING, 2020, 18 (01) : 149 - 168
  • [5] Adaptive Workload Forecasting in Cloud Data Centers
    Eduard Zharikov
    Sergii Telenyk
    Petro Bidyuk
    [J]. Journal of Grid Computing, 2020, 18 : 149 - 168
  • [6] A White-Box False Positive Adversarial Attack Method on Contrastive Loss Based Offline Handwritten Signature Verification Models
    Guo, Zhongliang
    Li, Weiye
    Qian, Yifei
    Arandjelovic, Ognjen
    Fang, Lei
    [J]. INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND STATISTICS, VOL 238, 2024, 238
  • [7] NetHint: White-Box Networking for Multi-Tenant Data Centers
    Chen, Jingrong
    Zhang, Hong
    Zhang, Wei
    Luo, Liang
    Chase, Jeffrey
    Stoica, Ion
    Zhuo, Danyang
    [J]. PROCEEDINGS OF THE 19TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI '22), 2022, : 1327 - 1343
  • [8] Boosting robustness of network intrusion detection systems: A novel two phase defense strategy against untargeted white-box optimization adversarial attack
    Roshan, Ms Khushnaseeb
    Zafar, Aasim
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2024, 249
  • [9] Saliency Map-Based Local White-Box Adversarial Attack Against Deep Neural Networks
    Liu, Haohan
    Zuo, Xingquan
    Huang, Hai
    Wan, Xing
    [J]. ARTIFICIAL INTELLIGENCE, CICAI 2022, PT II, 2022, 13605 : 3 - 14
  • [10] wAdvMTD: A Mitigation to White-box Adversarial Examples Using Heterogeneous Models and Moving Target Defense
    Li, Yuanpei
    Zhou, Qinglei
    Li, Shibo
    Li, Bin
    [J]. 2023 3RD ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND COMPUTER SCIENCE, ACCTCS, 2023, : 592 - 597