论文标题
一种基于模型的异常检测交易检测时间和错误警报率的方法
A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm Rate
论文作者
论文摘要
现代计算系统的复杂性和普遍性是异常的沃土,包括安全性和隐私漏洞。在本文中,我们提出了一种新方法,该方法解决了实施异常检测方法的实际挑战。具体而言,全面定义正常行为并获取有关不同云环境中异常的数据是一项挑战。为了应对这些挑战,我们专注于基于系统性能签名的异常检测方法。特别是,性能签名具有检测零日攻击的潜力,因为这些方法基于检测性能偏差,并且不需要详细的攻击历史知识。所提出的方法利用分析性能模型和实验,并允许以原则性的方式控制误报率。使用TPCX-V工作负载评估了该方法,该方法是在一组执行过程中使用资源耗尽异常进行了介绍的,该异常模仿影响系统性能的异常效果。所提出的方法能够成功地检测出异常,误报数量较低(精度为90%-98%)。
The complexity and ubiquity of modern computing systems is a fertile ground for anomalies, including security and privacy breaches. In this paper, we propose a new methodology that addresses the practical challenges to implement anomaly detection approaches. Specifically, it is challenging to define normal behavior comprehensively and to acquire data on anomalies in diverse cloud environments. To tackle those challenges, we focus on anomaly detection approaches based on system performance signatures. In particular, performance signatures have the potential of detecting zero-day attacks, as those approaches are based on detecting performance deviations and do not require detailed knowledge of attack history. The proposed methodology leverages an analytical performance model and experimentation and allows to control the rate of false positives in a principled manner. The methodology is evaluated using the TPCx-V workload, which was profiled during a set of executions using resource exhaustion anomalies that emulate the effects of anomalies affecting system performance. The proposed approach was able to successfully detect the anomalies, with a low number of false positives (precision 90%-98%).