Computer Science ›› 2024, Vol. 51 ›› Issue (6A): 230400016-8.doi: 10.11896/jsjkx.230400016

• Network & Communication • Previous Articles     Next Articles

Research Progress of Anomaly Detection in IaaS Cloud Operation Driven by Deep Learning

SI Jia1, LIANG Jianfeng1, XIE Shuo1, DENG Yingjun2   

  1. 1 National Marine Data and Information Service,Tianjin 300171,China
    2 Center for Applied Mathematics,Tianjin University,Tianjin 300072,China
  • Published:2024-06-06
  • About author:SI Jia,born in 1994,postgraduate,assistant engineer.Her main research interests include marine information system and so on.
    DENG Yingjun,born in 1986,Ph.D,lecturer.His main research interests include predictive maintenance and machine learning.
  • Supported by:
    National Marine Data and Information Service Youth Fund Project(202102006) and Open Fund of State Key Laboratory of Marine Resources Utilization in South China Sea(MRUKF2021035).

Abstract: Anomaly detection is an important task in the operation and maintenance of IaaS cloud systems.Through early warning and intervention,serious accidents such as system crashes can be effectively avoided.However,compared to traditional data centers,IaaS cloud systemshave the characteristics of large-scale computing nodes,complex node topology,large monitoring data vo-lume,and lack of data labels,which bring new challenges for IaaS cloud anomaly detection.Starting from the technical framework of deep learning,this paper analyzes the difficulties faced by anomaly detection problems,and summarizes common anomaly detection algorithms and related technologies in IaaS cloud systems.This paper investigates deep learning driven solutions for two typical problems:node anomalies and system anomalies.For node anomalies,detection algorithms driven by temporal data are studied for time-dependent data.For system anomalies,detection algorithms driven by graph data in network topology modeling are investigated.Finally,new issues and challenges in data-driven anomaly detection in IaaS cloud systems are proposed.

Key words: Anomaly detection, IaaS cloud, Time series data, Graph data, Deep learning, Machine learning

CLC Number: 

  • TP311.1
[1]JIANG P.Development and Application of Smart Ocean CloudPlatform under the Internet of Things[J].Journal of Marine Information Technology and Application,2022,3:10-17.
[2]SUN C,WANG Y,PAN Z,et al.Design and implementation of island information management and display system based on cloud storage technology[J].Marine Science Bulletin,2019,2:233-240.
[3]QIU J,DU Q,QIAN C.KPI-TSAD:A Time-Series AnomalyDetector for KPI Monitoring in Cloud Applications[J].Symmetry,2019,11:1350.
[4]GUERRON X,ABRAHO S,INSFRAN E,et al.A taxonomy of quality metrics for cloud services[J].IEEE Access,2020,8:131461-131498.
[5]MENG W,LIU Y,ZHU Y,et al.LogAnomaly:UnsupervisedDetection of Sequential and Quantitative Anomalies in Unstructured Logs[C]//Twenty-Eighth International Joint Conference on Artificial Intelligence(IJCAI-19).2019:4739-4745.
[6]XIU Z.Request Tracing and Anomalies Detecting System inCloud[D].Wuhan:Huazhong University of Science and Technology,2014.
[7]LAVIN A,AHMAD S.Evaluating Real-Time Anomaly Detection Algorithms-The Numenta Anomaly Benchmark[C]//IEEE 14th International Conference on Machine Learning and Applications(ICMLA).2015:38-44.
[8]LI Z Y,ZHAO N W,ZHANG S L,et al.Constructing Large-Scale Real-World Benchmark Datasets for AIOps[J/OL].(2022-08-08)[2023-03-08].https://doi.org/10.48550/arXiv.2208.03938.
[9]ZHANG X,LIN Q,XU Y,et al.Cross-dataset time series ano-maly detection for cloud systems[C]//USENIX Annual Technical Conference.USENIX Association,2019:1063-1076.
[10]LIU H,LU S,MUSUVATHI M,et al.What bugs cause production cloud incidents?[C]//Proceedings of the Workshop on Hot Topics in Operating System.ACM,2019:155-162.
[11]VISHWANATH K V,NAGAPPAN N.Characterizing CloudComputing Hardware Reliability[C]//Proceedings of the 1st ACM Symposium on Cloud Computing.ACM,2010:193-204.
[12]SOHL-DICKSTEIN J,WEISS E A,MAHESWARANATHAN N,et al.Deep Unsupervised Learning Thermodynamics[C]//Proceedings of the 32nd International Conference on International Conference on Machine Learning.ACM,2015:2256-2265.
[13]HO J,JAIN A,ABBEEL P.Denoising Diffusion ProbabilisticModels[J/OL].(2020-12-16)[2023-03-08].https://arxiv.org/abs/2006.11239.
[14]SIFFER A,FOUQUE P A,TERMIER A,et al.Anomaly Detection in Streams with Extreme Value Theory[C]//Proceedings of the 23rd ACM SIGKDD International Conference on Know-ledge Discovery and Data Mining.ACM,2017:1067-1075.
[15]WARD R A,WU X,BOTTOU L.AdaGrad stepsizes:sharpconvergence over nonconvex landscapes[C]//Proceedings of the 36th International Conference on Machine Learning.2019:6677-6686.
[16]KINGMA D,BA J.Adam:A Method for Stochastic Optimization[J/OL].(2017-01-30)[2023-03-08]https://doi.org/10.48550/arXiv.1412.6980.
[17]SETTLES B.Active Learning Literature Survey[J/OL].(2012-03-15)[2023-04-01].http://digital.library.wisc.edu/1793/60660.
[18]HAN S,WU Q,ZHANG H,et al.Log-based Anomaly Detection with Robust Feature Extraction and Online Learning[J].IEEE Transactions on Information Forensics and Security,2021,16:2300-2311.
[19]ZHAO Y,NASRULLAH Z,HRYNIEWICKI M K,et al.LSCP:Locally Selective Combination in Parallel Outlier Ensembles[C]//Proceedings of the 2019 SIAM International Confe-rence on Data Mining.2019:585-593.
[20]MALHOTRA P,VIG L,SHROFF G,et al.Long Short Term Memory Networks for Anomaly Detection in Time Series[C]//23rd European Symposium on Artificial Neural Networks,Computational Intelligence and Machine Learning.2015.
[21]LI D,CHEN D,SHI L,et al.MAD-GAN:Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks[C]//Artificial Neural Networks and Machine Lear-ning(ICANN 2019):Text and Time Series:28th International Conference on Artificial Neural Networks.ACM,2019:703-716.
[22]SU Y,ZHAO Y,NIU C,et al.Robust Anomaly Detection for Multivariate Time Series through Stochastic Recurrent Neural Network[C]//Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining.2019:2828-2837.
[23]BAI S J,ZICO K J,KOLTUN V,et al.An Empirical Evaluation of Generic Convolutional and Recurrent Networks for Sequence Modeling[J/OL].(2018-04-19)[2023-04-08].https://doi.org/10.48550/arXiv.1803.01271.
[24]HE Y,ZHAO J.Temporal Convolutional Networks for Anomaly Detection in Time Series[J].Journal of Physics:Conference Series,2019,1213:042050.
[25]THILL M,KONEN W,WANG H,et al.Temporal convolu-tional autoencoder for unsupervised anomaly detection in time series[J].Applied Soft Computing,2021,3:107751.
[26]PHAM T,LEE J,PARK C.MST-VAE:Multi-Scale Temporal Variational Autoencoder for Anomaly Detection in Multivariate Time Series[J].Applied Sciences,2022,12(19):10078.
[27]VASWANI A,SHAZEER N,PARMAR N,et al.Attention Is All You Need[J/OL].(2017-12-06)[2023-03-08].https://doi.org/10.48550/arXiv.1706.03762.
[28]XU J,WU H,WANG J,et al.Anomaly Transformer:Time Series Anomaly Detection with Association Discrepancy[J/OL].(2022-06-29)[2023-03-08].https://doi.org/10.48550/arXiv.2110.02642.
[29]TULI S,CASALE G,JENNINGS N R.TranAD:Deep Trans-former Networks for Anomaly Detection in Multivariate Time Series Data[J].Pro.VLDB Endow,2022,15:1201-1214.
[30]AHMAD S,LAVIN A,PURDY S,et al.Unsupervised real-time anomaly detection for streaming data[J].Neurocomputing,2017,262:134-147.
[31]HE Z,CHEN P,LI X,et al.A Spatiotemporal Deep LearningApproach for Unsupervised Anomaly Detection in Cloud Systems[J].IEEE Transactions on Neural Networks and Learning Systems,2023,34(4):1705-1719.
[32]DENG A,HOOI B.Graph Neural Network-Based Anomaly Detection in Multivariate Time Series[C]//Proceedings of the AAAI Conference on Artificial Intelligence,2021,35(5):4027-4035.
[33]SCARSELLI F,GORI M,TSOIA C,et al.The Graph Neural Network Model[J].IEEE Transactions on Neural Networks,2009,20(1):61-80.
[34]KIPF T,WELLING M.Semi-Supervised Classification withGraph Convolutional Networks[J/OL].(2017-02-22)[2023-03-08].https://doi.org/10.48550/arXiv.1609.02907907K.
[35]VELIKOVI P,CUCURULL G,CASANOVA A,et al.GraphAttention Networks[J/OL].(2018-02-04)[2023-03-08].https://doi.org/10.48550/arXiv.1710.10903.
[36]ZHENG L,LI Z,LI J,et al.AddGraph:Anomaly Detection in Dynamic Graph Using Attention-based Temporal GCN[C]//Twenty-Eighth International Joint Conference on Artificial Intelligence(IJCAI-19).2019:4419-4425.
[37]WANG S,LI W,HOU S,et al.STA-GAN:A Spatio-Temporal Attention Generative Adversarial Network for Missing Value Imputation in Satellite Data[J].Remote Sensing,2022,15:88.
[38]YU W,WEI C,AGGARWAL C C,et al.NetWalk:A FlexibleDeep Embedding Approach for Anomaly Detection in Dynamic Networks[C]//The 24th ACM SIGKDD International Confe-rence on Knowledge Discovery & Data Mining.2018:2672-2681.
[39]MA X,WU J,XUE S,et al.A Comprehensive Survey on Graph Anomaly Detection with Deep Learning[J].IEEE Transactions on Knowledge and Data Engineering,2023,35(12):12012-12038.
[40]ZHAO N,ZHU J,LIU R,et al.Label-Less:A Semi-Automatic Labelling Tool for KPI Anomalies[C]//IEEE Conference on Computer Communications(INFOCOM 2019).IEEE,2019:1882-1890.
[41]ZHANG X,LIN Q,XU Y,et al.Cross-dataset Time SeriesAnomaly Detection for Cloud Systems[C]//USENIX Annual Technical Conference.2019:1063-1076.
[42]VERLEYSEN M,FRENA Y.Classification in the Presence of Label Noise:A Survey[J].IEEE Transactions on Neural Networks and Learning Systems,2014,25(5):845-869.
[43]ZHAO N,CHEN J,YU Z,et al.Identifying bad software changes via multimodal anomaly detection for online service systems[C]//Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering.2021:527-539.
[1] WANG Yingjie, ZHANG Chengye, BAI Fengbo, WANG Zumin. Named Entity Recognition Approach of Judicial Documents Based on Transformer [J]. Computer Science, 2024, 51(6A): 230500164-9.
[2] LIANG Fang, XU Xuyao, ZHAO Kailong, ZHAO Xuanfeng, ZHANG Guijun. Remote Template Detection Algorithm and Its Application in Protein Structure Prediction [J]. Computer Science, 2024, 51(6A): 230600225-7.
[3] PENG Bo, LI Yaodong, GONG Xianfu, LI Hao. Method for Entity Relation Extraction Based on Heterogeneous Graph Neural Networks and TextSemantic Enhancement [J]. Computer Science, 2024, 51(6A): 230700071-5.
[4] ZHANG Tianchi, LIU Yuxuan. Research Progress of Underwater Image Processing Based on Deep Learning [J]. Computer Science, 2024, 51(6A): 230400107-12.
[5] WANG Guogang, DONG Zhihao. Lightweight Image Semantic Segmentation Based on Attention Mechanism and Densely AdjacentPrediction [J]. Computer Science, 2024, 51(6A): 230300204-8.
[6] WANG Zhaodan, ZOU Weiqin, LIU Wenjie. Buggy File Identification Based on Recommendation Lists [J]. Computer Science, 2024, 51(6A): 230600088-8.
[7] LIU Wei, SONG You, ZHUO Peiyan, WU Weiqiang, LIAN Xin. Study on Kcore-GCN Anti-fraud Algorithm Fusing Multi-source Graph Features [J]. Computer Science, 2024, 51(6A): 230600040-7.
[8] WANG Li, CHEN Gang, XIA Mingshan, HU Hao. DUWe:Dynamic Unknown Word Embedding Approach for Web Anomaly Detection [J]. Computer Science, 2024, 51(6A): 230300191-5.
[9] CHEN Xiangxiao, CUI Xin, DU Qin, TANG Haoyao. Study on Optimization of Abnormal Traffic Detection Model Based on Machine Learning [J]. Computer Science, 2024, 51(6A): 230700051-5.
[10] ZHANG Le, YU Ying, GE Hao. Mural Inpainting Based on Fast Fourier Convolution and Feature Pruning Coordinate Attention [J]. Computer Science, 2024, 51(6A): 230400083-9.
[11] WU Yibo, HAO Yingguang, WANG Hongyu. Rice Defect Segmentation Based on Dual-stream Convolutional Neural Networks [J]. Computer Science, 2024, 51(6A): 230600107-8.
[12] HOU Linhao, LIU Fan. Remote Sensing Image Fusion Combining Multi-scale Convolution Blocks and Dense Convolution Blocks [J]. Computer Science, 2024, 51(6A): 230400110-6.
[13] HUANG Yuanhang, BIAN Shan, WANG Chuntao. Gaussian Enhancement Module for Reinforcing High-frequency Details in Camera ModelIdentification [J]. Computer Science, 2024, 51(6A): 230700125-5.
[14] SUN Yang, DING Jianwei, ZHANG Qi, WEI Huiwen, TIAN Bowen. Study on Super-resolution Image Reconstruction Using Residual Feature Aggregation NetworkBased on Attention Mechanism [J]. Computer Science, 2024, 51(6A): 230600039-6.
[15] SHI Songhao, WANG Xiaodan, YANG Chunxiao, WANG Yifei. SAR Image Target Recognition Based on Cross Domain Few Shot Learning [J]. Computer Science, 2024, 51(6A): 230800136-7.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!