Adversarial Impact on Anomaly Detection in Cloud Datacenters

被引:1
|
作者
Deka, Pratyush Kr. [1 ]
Bhuyan, Monowar H. [2 ,3 ,4 ]
Kadobayashi, Youki [2 ]
Elmroth, Erik [3 ]
机构
[1] Galgotias Univ, Sch Comp Sci & Engn, Greater Noida, India
[2] NAIST, Lab Cyber Resilience, Nara 6300192, Japan
[3] Umea Univ, Dept Comp Sci, Umea 90187, Sweden
[4] Assam Kaziranga Univ, Dept Comp Sci & Engn, Jorhat, Assam, India
关键词
Adversarial learning; Anomaly detection; Poisoning; attack; Cloud services; Datacenter;
D O I
10.1109/PRDC47002.2019.00049
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud datacenters are engineered to meet the requirements of generalised and specialised workloads including mission-critical applications that not only generate tremendous amounts of data traces but also opens opportunities for attackers. The increasing volume and rapid changing behaviour of metric streams (e.g., CPU, network, latency, memory) in the cloud datacenters create difficulties to ensure high availability, security, and performance to cloud service providers. Several anomaly detection techniques have been developed to combat system anomalies in cloud datacenters. By injecting a fraction of well-crafted malicious samples in cloud datacenter traces, attackers can subvert the learning process and results in unacceptable false alarms. These security issues cause threats to all categories of anomaly detection. Hence, it is crucial to assess these techniques against adversaries to improve scalability and robustness. We propose a linear regression-based optimisation framework with the ability to poison data in the training phase and demonstrate its effectiveness on cloud datacenter traces. Finally, we investigate the worst-case analysis of poisoning attacks on robust statistics-based anomaly detection techniques to quantify and assess the detection accuracy. We validate this framework using benchmark resource traces obtained from Yahoo's service cluster as well as traces collected from an experimental testbed with realistic service composition.
引用
下载
收藏
页码:188 / 197
页数:10
相关论文
共 50 条
  • [41] Time Series Anomaly Detection With Adversarial Reconstruction Networks
    Liu, Shenghua
    Zhou, Bin
    Ding, Quan
    Hooi, Bryan
    Zhang, Zhengbo
    Shen, Huawei
    Cheng, Xueqi
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (04) : 4293 - 4306
  • [42] Generative Adversarial Networks for anomaly detection in aerial images
    Contreras-Cruz, Marco A.
    Correa-Tome, Fernando E.
    Lopez-Padilla, Rigoberto
    Ramirez-Paredes, Juan-Pablo
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 106
  • [43] Hard Anomaly Detection: An Adversarial Data Augmentation Solution
    Teng, Hu
    Wang, Cheng
    Yang, Qing
    Chen, Xue
    2023 23RD IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW 2023, 2023, : 1065 - 1075
  • [44] Graph Convolutional Adversarial Networks for Spatiotemporal Anomaly Detection
    Deng, Leyan
    Lian, Defu
    Huang, Zhenya
    Chen, Enhong
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2022, 33 (06) : 2416 - 2428
  • [45] SEQUENTIAL ADVERSARIAL ANOMALY DETECTION WITH DEEP FOURIER KERNEL
    Zhu, Shixiang
    Yuchi, Henry Shaowu
    Zhang, Minghe
    Xie, Yao
    2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 3345 - 3349
  • [46] Anomaly Detection Based on Discriminative Generative Adversarial Network
    Appiah, Benjamin
    Qin, Zhiguang
    Nartey, Obed Tettey
    Agemang, Brighter
    Kanpogninge, Ansuura JohnBosco Aristotle
    International Journal of Network Security, 2021, 23 (04) : 718 - 724
  • [47] Generative Adversarial Networks for anomaly detection on decentralised data
    Katzefa, Marc
    Cullen, Andrew C.
    Alpcan, Tansu
    Leckie, Christopher
    ANNUAL REVIEWS IN CONTROL, 2022, 53 : 329 - 337
  • [48] Robust anomaly detection via adversarial counterfactual generation
    Liguori, Angelica
    Ritacco, Ettore
    Pisani, Francesco Sergio
    Manco, Giuseppe
    KNOWLEDGE AND INFORMATION SYSTEMS, 2024, : 7437 - 7468
  • [49] AESMOTE: Adversarial Reinforcement Learning With SMOTE for Anomaly Detection
    Ma, Xiangyu
    Shi, Wei
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 943 - 956
  • [50] Trends and Challenges in Cloud Datacenters
    Bilal, Kashif
    Malik, Saif Ur Rehman
    Khan, Samee U.
    Zomaya, Albert Y.
    IEEE CLOUD COMPUTING, 2014, 1 (01) : 10 - 20