File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1145/3318216.3363375
- Scopus: eid_2-s2.0-85076260845
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Informer: Irregular traffic detection for containerized microservices RPC in the real world
Title | Informer: Irregular traffic detection for containerized microservices RPC in the real world |
---|---|
Authors | |
Keywords | Anomaly detection Containers GCN Microservices RPC |
Issue Date | 2019 |
Citation | Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC 2019, 2019, p. 389-394 How to Cite? |
Abstract | Containerized microservices have been widely deployed in industry. Meanwhile, security issues also arise. Many security enhancement mechanisms for containerized microservices require predefined rules and policies. However, it is challenging when it comes to thousands of microservices and a massive amount of real-time unstructured data. Hence, automatic policy generation becomes indispensable. In this paper, we focus on the automatic solution for the security problem: irregular traffic detection for RPCs. We propose Informer, which is a two-phase machine learning framework to track the traffic of each RPC and report anomalous points automatically. Firstly, we identify RPC chain patterns by density-based clustering techniques and build a graph for each critical pattern. Next, we solve the irregular RPC traffic detection problem as a prediction problem for time-series of attributed graphs by leveraging spatial-temporal graph convolution networks. Since the framework builds multiple models and makes individual predictions for each RPC chain pattern, it can be efficiently updated upon legitimate changes in any of the graphs. In evaluations, we applied Informer to a dataset containing more than 7 billion lines of raw RPC logs sampled from an large Kubernetes system for two weeks. We provide two case studies of detected real-world threats. As a result, our framework found fine-grained RPC chain patterns and accurately captured the anomalies in a dynamic and complicated microservice production scenario, which demonstrates the effectiveness of Informer. |
Persistent Identifier | http://hdl.handle.net/10722/346748 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chen, Jiyu | - |
dc.contributor.author | Huang, Heqing | - |
dc.contributor.author | Chen, Hao | - |
dc.date.accessioned | 2024-09-17T04:13:01Z | - |
dc.date.available | 2024-09-17T04:13:01Z | - |
dc.date.issued | 2019 | - |
dc.identifier.citation | Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC 2019, 2019, p. 389-394 | - |
dc.identifier.uri | http://hdl.handle.net/10722/346748 | - |
dc.description.abstract | Containerized microservices have been widely deployed in industry. Meanwhile, security issues also arise. Many security enhancement mechanisms for containerized microservices require predefined rules and policies. However, it is challenging when it comes to thousands of microservices and a massive amount of real-time unstructured data. Hence, automatic policy generation becomes indispensable. In this paper, we focus on the automatic solution for the security problem: irregular traffic detection for RPCs. We propose Informer, which is a two-phase machine learning framework to track the traffic of each RPC and report anomalous points automatically. Firstly, we identify RPC chain patterns by density-based clustering techniques and build a graph for each critical pattern. Next, we solve the irregular RPC traffic detection problem as a prediction problem for time-series of attributed graphs by leveraging spatial-temporal graph convolution networks. Since the framework builds multiple models and makes individual predictions for each RPC chain pattern, it can be efficiently updated upon legitimate changes in any of the graphs. In evaluations, we applied Informer to a dataset containing more than 7 billion lines of raw RPC logs sampled from an large Kubernetes system for two weeks. We provide two case studies of detected real-world threats. As a result, our framework found fine-grained RPC chain patterns and accurately captured the anomalies in a dynamic and complicated microservice production scenario, which demonstrates the effectiveness of Informer. | - |
dc.language | eng | - |
dc.relation.ispartof | Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC 2019 | - |
dc.subject | Anomaly detection | - |
dc.subject | Containers | - |
dc.subject | GCN | - |
dc.subject | Microservices | - |
dc.subject | RPC | - |
dc.title | Informer: Irregular traffic detection for containerized microservices RPC in the real world | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1145/3318216.3363375 | - |
dc.identifier.scopus | eid_2-s2.0-85076260845 | - |
dc.identifier.spage | 389 | - |
dc.identifier.epage | 394 | - |