Proceedings of the 17th International Conference on Availability, Reliability and Security 2022
DOI: 10.1145/3538969.3543810
|View full text |Cite
|
Sign up to set email alerts
|

Learning State Machines to Monitor and Detect Anomalies on a Kubernetes Cluster

Abstract: These days more companies are shifting towards using cloud environments to provide their services to their client. While it is easy to set up a cloud environment, it is equally important to monitor the system's runtime behaviour and identify anomalous behaviours that occur during its operation. In recent years, the utilisation of Recurrent Neural Networks (RNNs) and Deep Neural Networks (DNNs) to detect anomalies that might occur during runtime has been a trending approach. However, it is unclear how to explai… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…(1) XAI-enabled user assistance covers techniques that are developed and utilized to support model users in making informed decisions, usually with the help of visual analytics dashboards. The explanations are meant to give control back to the user by helping them understand the model [96], and providing additional insights regarding the input data [28]. Since it is the model designers who typically develop the explanations for model users, it is essential to include model users during the evaluation process to understand the explanation efficacy.…”
Section: Systematizationmentioning
confidence: 99%
See 1 more Smart Citation
“…(1) XAI-enabled user assistance covers techniques that are developed and utilized to support model users in making informed decisions, usually with the help of visual analytics dashboards. The explanations are meant to give control back to the user by helping them understand the model [96], and providing additional insights regarding the input data [28]. Since it is the model designers who typically develop the explanations for model users, it is essential to include model users during the evaluation process to understand the explanation efficacy.…”
Section: Systematizationmentioning
confidence: 99%
“…Discoverer [40] and Prospex [38] are two other popular systems for reverse engineering application-level specifications of network protocols. Similarly, Cho et al [35] learn an automaton from botnet traffic to understand its Command and Control (C&C) channels; Lin et al [85] learn an automaton from sensors of a water treatment plant to detect potential sensor malfunction, and Cao et al [28] learn an automaton from the network traffic of a Kubernetes cluster to identify misbehaving pods.…”
Section: Xai-enabled User Assistancementioning
confidence: 99%