2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W) 2016
DOI: 10.1109/dsn-w.2016.17
|View full text |Cite
|
Sign up to set email alerts
|

Towards Black-Box Anomaly Detection in Virtual Network Functions

Abstract: The maturity of hardware virtualization has motivated communication service providers to apply this paradigm to network services. Virtual Network Functions (VNFs) come from this motivation and refer to any virtual execution environment configured to provide a given network service. VNFs constitute a new paradigm and related dependability evaluation mechanisms are still not thoroughly defined. In this paper we propose a preliminary evaluation of an anomaly detection approach applied to VNFs. Our approach uses a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…These two works, only provide detection solutions without fault type identification and localization. One of the non-statistical data driven approaches uses fault injection techniques to generate data and applies a Random Forest (RF) algorithm [7] to detect malfunctions and localize the root cause (one task at a time) in the context of NFV. Although these two approaches [6] [7] achieve good level of accuracy, they do not provide any complexity analysis while using a high number of metrics.…”
Section: Related Workmentioning
confidence: 99%
“…These two works, only provide detection solutions without fault type identification and localization. One of the non-statistical data driven approaches uses fault injection techniques to generate data and applies a Random Forest (RF) algorithm [7] to detect malfunctions and localize the root cause (one task at a time) in the context of NFV. Although these two approaches [6] [7] achieve good level of accuracy, they do not provide any complexity analysis while using a high number of metrics.…”
Section: Related Workmentioning
confidence: 99%
“…They study several use-cases and show the applicability and benefits of adopting the machine learning paradigm to the networking field. Following this trend, anomaly detection in the cloud with machine learning is studied in [10], VNF anomaly detection in [11], traffic control with deep learning in [12], and identification of host roles with supervised learning with sFlow in [13].…”
Section: Related Workmentioning
confidence: 99%
“…Carla Sauvanaud et al in [7] used tree-based algorithm, random forests for anomaly detection on VNF monitoring data. They presented results evaluating receiver operating characteristics (ROC) and the precision call (PR).…”
Section: Anomaly Detection Techniquesmentioning
confidence: 99%