Please use this identifier to cite or link to this item: https://hdl.handle.net/10316/114592
Title: Detecting Anomalies Through Sequential Performance Analysis in Virtualized Environments
Authors: Gonçalves, Charles F. 
Menasché, Daniel Sadoc
Avritzer, Alberto
Antunes, Nuno 
Vieira, Marco 
Keywords: Anomaly detection; modeling; performance; security; virtualization
Issue Date: 2023
Publisher: IEEE
Project: This work is funded by Project ‘‘Agenda Mobilizadora Sines Nexus’’. ref. No. 7113), supported by the Recovery and Resilience Plan (PRR) and by the European Funds Next Generation EU, following Notice No. 02/C05-i01/2022, Component 5-Capitalization and Business Innovation-Mobilizing Agendas for Business Innovation, by national funds through the FCT-Foundation for Science and Technology, I.P., within the scope of the project CISUC-UID/CEC/00326/2020, grant SFRH/BD/144839/2019, by European Social Fund, through the Regional Operational Program Centro 2020, and by CEFET-MG and partially by CAPES, CNPq, and FAPERJ under grants 315110/2020-1, E-26/211.144/2019 and E-26/201.376/2021. 
Serial title, monograph or event: IEEE Access
Volume: 11
Abstract: Virtualization enables cloud computing, allowing for server consolidation with cost reduction. It also introduces new challenges in terms of security and isolation, which are deterrents for the adoption of virtualization in critical systems. Virtualized systems tend to be very complex, and multi-tenancy is the norm, as the hypervisor manages the resources shared among virtual machines. This paper proposes a methodology that uses performance modeling for the detection of anomalies in virtualized environments that can be caused, for instance, by cyberattacks. Experiments are conducted to profile the system operation under normal conditions for its business transactions. The results are used to calibrate a performance model and to understand the impact of its parameters on the false positive probability. During operation, the system is monitored, and deviations are detected by applying a sequential analysis algorithm (the bucket algorithm). The methodology is evaluated using a representative cloud workload (TPCx-V), which was profiled during a set of controlled executions. We consider resource exhaustion anomalies to emulate the effects of attacks affecting the performance of the system. Our results show that the proposed approach is able to successfully detect anomalies, with a lownumber of false positives, and spot possible residual effects of anomalies on the system.
URI: https://hdl.handle.net/10316/114592
ISSN: 2169-3536
DOI: 10.1109/ACCESS.2023.3293643
Rights: openAccess
Appears in Collections:FCTUC Eng.Informática - Artigos em Revistas Internacionais
I&D CISUC - Artigos em Revistas Internacionais

Show full item record

Page view(s)

21
checked on Apr 30, 2024

Download(s)

13
checked on Apr 30, 2024

Google ScholarTM

Check

Altmetric

Altmetric


This item is licensed under a Creative Commons License Creative Commons