Using Self-Organizing Maps for the Behavioral Analysis of Virtualized Network Functions

  • Conference paper
  • First Online:
Cloud Computing and Services Science (CLOSER 2020)

Abstract

Detecting anomalous behaviors in a network function virtualization infrastructure is of the utmost importance for network operators. In this paper, we propose a technique, based on Self-Organizing Maps, to address such problem by leveraging on the massive amount of historical system data that is typically available in these infrastructures. Indeed, our method consists of a joint analysis of system-level metrics, provided by the virtualized infrastructure monitoring system and referring to resource consumption patterns of the physical hosts and the virtual machines (or containers) that run on top of them, and application-level metrics, provided by the individual virtualized network functions monitoring subsystems and related to the performance levels of the individual applications. The implementation of our approach has been validated on real data coming from a subset of the Vodafone infrastructure for network function virtualization, where it is currently employed to support the decisions of data center operators. Experimental results show that our technique is capable of identifying specific points in space (i.e., components of the infrastructure) and time of the recent evolution of the monitored infrastructure that are worth to be investigated by human operators in order to keep the system running under expected conditions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://docs.vmware.com/en/vRealize-Operations/index.html.

  2. 2.

    https://github.com/peterwittek/somoclu.

References

  1. Van den Berg, F.D., et al.: Product uniformity control-a research collaboration of European steel industries to non-destructive evaluation of microstructure and mechanical properties. In: Electromagnetic Non-Destructive Evaluation (XXI), 6 September 2017 through 8 September 2017, pp. 120–129 (2018)

    Google Scholar 

  2. Bertero, C., Roy, M., Sauvanaud, C., Tredan, G.: Experience report: log mining using natural language processing and application to anomaly detection. In: 2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE), pp. 351–360. IEEE, October 2017

    Google Scholar 

  3. Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutorials 18(2), 1153–1176 (2015)

    Article  Google Scholar 

  4. Canetta, L., Cheikhrouhou, N., Glardon, R.: Applying two-stage SOM-based clustering approaches to industrial data analysis. Prod. Plann. Control 16(8), 774–784 (2005)

    Article  Google Scholar 

  5. Chen, D.R., Chang, R.F., Huang, Y.L.: Breast cancer diagnosis using self-organizing map for sonography. Ultrasound Med. Biol. 26(3), 405–411 (2000)

    Article  Google Scholar 

  6. Cucinotta, T., et al.: Behavioral analysis for virtualized network functions: a SOM-based approach. In: Proceedings of the 10th International Conference on Cloud Computing and Services Science. Prague, Czech Republic, May 2020

    Google Scholar 

  7. Díaz, I., Domínguez, M., Cuadrado, A.A., Fuertes, J.J.: A new approach to exploratory analysis of system dynamics using SOM. applications to industrial processes. Expert Syst. Appl. 34(4), 2953–2965 (2008)

    Article  Google Scholar 

  8. Farshchi, M., Schneider, J.G., Weber, I., Grundy, J.: Metric selection and anomaly detection for cloud operations using log and metric correlation analysis. J. Syst. Softw. 137, 531–549 (2018)

    Article  Google Scholar 

  9. Fortuin, V., Hüser, M., Locatello, F., Strathmann, H., Rätsch, G.: SOM-VAE: interpretable discrete representation learning on time series. In: International Conference on Learning Representations (2019)

    Google Scholar 

  10. Frey, C.W.: Monitoring of complex industrial processes based on self-organizing maps and watershed transformations. In: 2012 IEEE International Conference on Industrial Technology, pp. 1041–1046. IEEE (2012)

    Google Scholar 

  11. Fuertes, J.J., Domìnguez, M., Reguera, P., Prada, M.A., Dìaz, I., Cuadrado, A.A.: Visual dynamic model based on self-organizing maps for supervision and fault detection in industrial processes. Eng. Appl. Artif. Intell. 23(1), 8–17 (2010)

    Article  Google Scholar 

  12. Gulenko, A., Wallschlager, M., Schmidt, F., Kao, O., Liu, F.: Evaluating machine learning algorithms for anomaly detection in clouds. In: Proceeding of IEEE International Conference on Big Data, pp. 2716–2721. IEEE, December 2016

    Google Scholar 

  13. Gulenko, A., Wallschläger, M., Schmidt, F., Kao, O., Liu, F.: A system architecture for real-time anomaly detection in large-scale NFV systems. Procedia Comput. Sci. 94, 491–496 (2016), the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops

    Google Scholar 

  14. Gupta, L., Samaka, M., Jain, R., Erbad, A., Bhamare, D., Chan, H.A.: Fault and performance management in multi-cloud based NFV using shallow and deep predictive structures. J. Reliable Intell. Environ. 3(4), 21–231 (2017)

    Article  Google Scholar 

  15. Harris, T.: A kohonen SOM based, machine health monitoring system which enables diagnosis of faults not seen in the training set. In: Proceedings of 1993 International Conference on Neural Networks, vol. 1, pp. 947–950. IEEE, Nagoya, Japan (1993)

    Google Scholar 

  16. Hawilo, H., Shami, A., Mirahmadi, M., Asal, R.: NFV: state of the art, challenges, and implementation in next generation mobile networks (vEPC). IEEE Netw. 28(6), 18–26 (2014)

    Article  Google Scholar 

  17. Haykin, S.: Neural Networks: A Comprehensive Foundation, 3rd edn. Prentice-Hall Inc, USA (2007)

    MATH  Google Scholar 

  18. Ismail Fawaz, H., Forestier, G., Weber, J., Idoumghar, L., Muller, P.-A.: Deep learning for time series classification: a review. Data Min. Knowl. Discov. 33(4), 917–963 (2019). https://doi.org/10.1007/s10618-019-00619-1

    Article  MathSciNet  Google Scholar 

  19. Kashiparekh, K., Narwariya, J., Malhotra, P., Vig, L., Shroff, G.: ConvTimeNet: a pre-trained deep convolutional neural network for time series classification. In: International Joint Conference on Neural Networks, IJCNN 2019 Budapest, Hungary, 14–19 July 2019, pp. 1–8. IEEE (2019)

    Google Scholar 

  20. Le, L., Sinh, D., Lin, B.P., Tung, L.: Applying big data, machine learning, and SDN/NFV to 5G traffic clustering, forecasting, and management. In: 4th IEEE Conference on Network Softwarization and Workshops, pp. 168–176, June 2018

    Google Scholar 

  21. Malhotra, P., TV, V., Vig, L., Agarwal, P., Shroff, G.: TimeNet: pre-trained deep recurrent neural network for time series classification. In: 25th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, 2017, Bruges, Belgium (2017)

    Google Scholar 

  22. Malini, N., Pushpa, M.: Analysis on credit card fraud identification techniques based on KNN and outlier detection. In: 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 255–258, February 2017

    Google Scholar 

  23. Mancini, R., Ritacco, A., Lanciano, G., Cucinotta, T.: XPySom: high-performance self-organizing maps. In: IEEE 32nd International Symposium on Computer Architecture and High Performance Computing (SBAC-PAD). Porto, Portugal (2020)

    Google Scholar 

  24. Miyazawa, M., Hayashi, M., Stadler, R.: VNMF: distributed fault detection using clustering approach for network function virtualization. In: IFIP/IEEE International Symposium on Integrated Network Management, pp. 640–645, May 2015

    Google Scholar 

  25. NFV Industry Specif. Group: Network Functions Virtualisation. Introductory White Paper (2012)

    Google Scholar 

  26. Niwa, T., Miyazawa, M., Hayashi, M., Stadler, R.: Universal fault detection for NFV using SOM-based clustering. In: 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 315–320, August 2015

    Google Scholar 

  27. Ostberg, P.O., et al.: Reliable capacity provisioning for distributed cloud/edge/fog computing applications. In: EuCNC 2017 - European Conference on Networks and Communications, pp. 1–6. IEEE, June 2017

    Google Scholar 

  28. Pitakrat, T., Okanović, D., van Hoorn, A., Grunske, L.: Hora: architecture-aware online failure prediction. J. Syst. Softw. 137, 669–685 (2018)

    Article  Google Scholar 

  29. Rousseeuw, P.J.: Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. J. Comput. Appl. Math. 20, 53–65 (1987)

    Article  Google Scholar 

  30. Samrin, R., Vasumathi, D.: Review on anomaly based network intrusion detection system. In: 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques, pp. 141–147, December 2017

    Google Scholar 

  31. Sauvanaud, C., Kaâniche, M., Kanoun, K., Lazri, K., Da Silva Silvestre, G.: Anomaly detection and diagnosis for cloud services: practical experiments and lessons learned. J. Syst. Softw. 139, 84–106 (2018)

    Article  Google Scholar 

  32. Van Gassen, S., et al.: FlowSOM: using self-organizing maps for visualization and interpretation of cytometry data. Cytometry A 87(7), 636–645 (2015)

    Article  Google Scholar 

  33. Vannucci, M., Colla, V.: Novel classification method for sensitive problems and uneven datasets based on neural networks and fuzzy logic. Appl. Soft Comput. 11(2), 2383–2390 (2011)

    Article  Google Scholar 

  34. Wallschläger, M., Gulenko, A., Schmidt, F., Kao, O., Liu, F.: Automated anomaly detection in virtualized services using deep packet inspection. Procedia Comput. Sci. 110, 510–515 (2017)

    Article  Google Scholar 

  35. Watanabe, Y., Otsuka, H., Sonoda, M., Kikuchi, S., Matsumoto, Y.: Online failure prediction in cloud datacenters by real-time message pattern learning. In: CloudCom 2012 - Proceedings: 2012 4th IEEE International Conference on Cloud Computing Technology and Science, pp. 504–511. IEEE, December 2012

    Google Scholar 

  36. Wittek, P., Gao, S.C., Lim, I.S., Zhao, L.: Somoclu: an efficient parallel library for self-organizing maps. J. Stat. Softw. 78(9), June 2017

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Giacomo Lanciano .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lanciano, G. et al. (2021). Using Self-Organizing Maps for the Behavioral Analysis of Virtualized Network Functions. In: Ferguson, D., Pahl, C., Helfert, M. (eds) Cloud Computing and Services Science. CLOSER 2020. Communications in Computer and Information Science, vol 1399. Springer, Cham. https://doi.org/10.1007/978-3-030-72369-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-72369-9_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-72368-2

  • Online ISBN: 978-3-030-72369-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation