Literature DB >> 29117245

An incremental anomaly detection model for virtual machines.

Hancui Zhang1, Shuyu Chen1, Jun Liu2, Zhen Zhou3, Tianshu Wu4.   

Abstract

Self-Organizing Map (SOM) algorithm as an unsupervised learning method has been applied in anomaly detection due to its capabilities of self-organizing and automatic anomaly prediction. However, because of the algorithm is initialized in random, it takes a long time to train a detection model. Besides, the Cloud platforms with large scale virtual machines are prone to performance anomalies due to their high dynamic and resource sharing characters, which makes the algorithm present a low accuracy and a low scalability. To address these problems, an Improved Incremental Self-Organizing Map (IISOM) model is proposed for anomaly detection of virtual machines. In this model, a heuristic-based initialization algorithm and a Weighted Euclidean Distance (WED) algorithm are introduced into SOM to speed up the training process and improve model quality. Meanwhile, a neighborhood-based searching algorithm is presented to accelerate the detection time by taking into account the large scale and high dynamic features of virtual machines on cloud platform. To demonstrate the effectiveness, experiments on a common benchmark KDD Cup dataset and a real dataset have been performed. Results suggest that IISOM has advantages in accuracy and convergence velocity of anomaly detection for virtual machines on cloud platform.

Entities:  

Mesh:

Year:  2017        PMID: 29117245      PMCID: PMC5678885          DOI: 10.1371/journal.pone.0187488

Source DB:  PubMed          Journal:  PLoS One        ISSN: 1932-6203            Impact factor:   3.240


Introduction

As cloud computing continues to develop, cloud platform based on virtualization technology is becoming increasingly popular in the fields of medicine, biology, geology and scientific computing and so on. The scale of virtual machines in cloud platform is continuously growing, and the applications deployed on virtual machines are more and more complex. At the same time, competition for resources in the cloud platform, resource sharing, virtual machine overload are prone to cause abnormalities which will make a part of the virtual machines downtime and will affect the reliability and availability of the entire cloud platform seriously. Therefore, it is highly desirable to provide an effective anomaly detection algorithm for virtual machines in cloud platform [1-4]. Nowadays, statistics, clustering, classification, and nearest-neighbor algorithms are commonly used methods of detecting abnormal [5]. Method under a certain probability model is based on statistical anomaly detection algorithm, nevertheless, a hypothetical probability model has to be predefined [6]. SVM-based [7] algorithms, Bayes networks [8] and neural networks [9] are the main several classification algorithms for anomaly detection used to learn a classify model (classifier) from the training data (labeled data instances) and then to predict a test instance using the classifier. Here, classification-based techniques rely on various labeled instances, which is hard to get and be labeled in real problems. Moreover, for multi-class classification, to get a variety of labeled normal classes is almost impossible. Clustering is an unsupervised learning method, which can find groupings in input instances without any prior knowledge [10-12]. Therefore, comparatively, clustering is a useful tool in dealing with a large, complex and unforeseen dataset with many variables and unknown structures. Self-Organizing Map (SOM) algorithm is a clustering and data analysis algorithm proposed by Kohonen in 1982 [13, 14]. Since that time, it has been widely used and the improvement of the algorithm has been going on. In order to solve the initialization problem of the size of SOM network, Growing SOM algorithm [15]has been proposed. The main idea is to form a single n-dimensional space (e.g. triangle, tetrahedron) as the basic building blocks in the training process of generating dynamic SOM network. Meanwhile, for the purpose of achieving SOM algorithm rapidly, TS-SOM (Tree Structured Sel-Organizing Maps) [16-18] method was proposed to realize the SOM by using the recursive nature of the tree structure itself. Furthermore, in order to address the problem of SOM network size and parameter optimization, Polani [19], Kubota R [20], and Deep K [21]et al. applied Genetic Algorithm to evolve SOM network to figure out the fitness function which optimized SOM network, to get the optimal solution of the initial size of SOM network, and to train the training neighborhood of the SOM network by the optimized function. Due to the characteristics of non-supervisory, non-linear, lower complexity and mapping high-dimensional data into low-dimensional space, SOM has been widely used in pattern recognition [22, 23], biology [24, 25], medical applications [26], climate [27, 28], neural networks [29, 30], image analysis [31] and other fields. However, the application of SOM in anomaly detection for virtual machine is still in its infancy. Hoz E D L [32] et al. presented a Growing Hierarchical SOM (GHSOM) for network intrusion detection on the basis of NSGA-II algorithm for feature selection to reduce the complexity of SOM. A new SOM map arose or not in GHSOM need to be calculated with the quantization error of each unit. Although it reduced the computational complexity of dataset dimension as a result of feature selection, a lot of calculations and comparisons were still required and the training time increase. In addition, they proposed a Probabilistic SOM (PSOM) approach that hybridizes statistical technique and SOM for network intrusion detection where Principal Component Analysis (PCA) and Fisher Discriminant Ratio (FDR) were considered for feature selection and noise removal [33]. In PSOM, the SOM map was trained by a Gaussian Mixture Model (GMM) first, while a further tuning of the map was achieved by calculating the prior probabilities and posterior probability of the SOM units. Consequently, PSOM would spend a lot of training time and computing costs on the input samples to achieve a good classification result. When in case of the large scale and high dynamic of virtual machines under the cloud platform, they would appear a high false positive rate and a low accuracy rate. Jun L [34] et al. applied Self-Organizing Maps method for anomaly detection of cloud platform and presented a unified modeling method based on SOM with a detection region. However, they did not optimize the SOM algorithm and it significant affected the accuracy and speed of detection. Wang H [35] et al. proposed a Simulated Annealing-based SOM (SOMSA) method for intrusion detection. The Simulated Annealing (SA) algorithm was used to refine the weight of SOM to get the optimal point by a form of probability. Nevertheless, SA is a random search algorithm. In each process of refining, the chose of best matched neuron and its neighborhoods is performed in random with probability. As a result, this method achieved the accuracy at the cost of training time due to the characteristic of random search. Based on the process units of anomaly detection, Song Y [36] et al. proposed a Statistic Pattern-based SOM (SP-based SOM) method, which had advantages on a small-scale system. Whereas, because of the feature of complex and dynamic of cloud platform and a large amounts of performance metrics, this method was not suitable for cloud platform with large-scale virtual machines. Moreover, Song Y et al. did not optimize the initialization and the training neighborhood of SOM, which significantly affects the speed of modeling SOM network. To address these problems, this paper presents an Improved Incremental SOM (IISOM) anomaly detection algorithm for virtual machines on cloud platform, in which a heuristic SOM algorithm has been proposed to initialize SOM network and a Weighted Euclidean Distance (WED) method has been used to improve the training neighborhood. As mentioned above, Wang H [35] et al. utilized the Simulated Annealing-based SOM algorithm to obtain global optimal solution, which has advantages in improving the accuracy of anomaly detection for virtual machines on cloud platform. But due to the expense of training time, it is not functional for anomaly detection of virtual machines with high dynamic. Here, in order to obtain a global optimal solution and reduce the training time, IISOM introduces the heuristic-based initialization algorithm to consider the similarity of input data instance and the characteristics of SOM convergence to estimate the weight of SOM, which has the advantages in global optimal clustering the same as SOMSA. Moreover, IISOM is superior to SOMSA subjected to detection accuracy and convergence rate as well as the quality of model. The effectiveness of the proposed method can be substantiated by systematic analysis associated with the benchmark dataset KDD Cup and real dataset. It can be found that the IISOM has a much higher training speed and accuracy than the traditional SOM algorithm and SOMSA algorithm. The rest of this paper is organized as follows. In Materials and Methods, the traditional SOM algorithm and the SOMSA algorithm are described. And according to the lacks of traditional SOM and SOMSA method applied for anomaly detection of virtual machines in cloud platform, the optimistic IISOM method is proposed. Then carry out the experiments to show the performance evaluation. Advantages and limitations of the IISOM are discussed in the discussion part and also we give some expectations for the future work. And finally, conclude this paper.

Materials and methods

Traditional SOM algorithm

Self-Organizing Map (SOM) is a popular neural network model that using unsupervised learning rules to analyze, cluster, and model various datasets. Commonly, it is used to map a high dimension input space into a low dimensional discrete map space. Meanwhile it preserves the topological properties of the original input space [37, 38]. Generally, SOM consists of two layers: the input layer, denoting the runtime measurement vectors, and the output layer, usually consisting of a two-dimensional lattice type of neurons, illustrated by Fig 1. The training of SOM network is usually done in two phases: ordering or self-organizing phase to get a rough training order and then convergence phase to fine-tune the map and to provide the ability for detection. Here we give a brief introduction.
Fig 1

The general structure SOM network.

SOM network consists of the Input Layer and Output Layer. Each input vector X is a D-dimensional vector, and each neurons in the output layer is associated with a coordinate(u, v) and a weight vector W.

The general structure SOM network.

SOM network consists of the Input Layer and Output Layer. Each input vector X is a D-dimensional vector, and each neurons in the output layer is associated with a coordinate(u, v) and a weight vector W. Suppose the input vector of runtime measurements is x(t) = [x1, x2, x3, …, x] ∈ R, and there are N*N neurons in the output space, a two-dimensional lattice network, in which each neuron n is associated with a coordinate(u, v), 1 ≤ u, v ≤ N and a weight vector W. Here, x (1≤ h ≤ D)denotes one system-level performance metrics, such as CPU, memory, disk I/O, or network traffic and so on, and the weight vector W should have the same length as the measurement vector x(t). The SOM network training process is the neuron competition process, which works by computing the distances between the input measurement vector and each neuron’s weight vector in the map and selecting the neuron with the smallest distance as the winning neuron or excited neuron. Several choices can be made for the definition of the distance function such as Euclidean distance, Manhattan distance, Cosine similarity etc. And then the winning neuron’s weight vector as well as its neighborhood neurons are updated as shown in Fig 2. The basic formula for updating the weight vector of a given neuron (u, v) at time t is given in Eq (1).
Fig 2

The nearest neighbors of excited neuron C.

Each neuron is labeled with it’s coordinate (u, v), that is W. C: the excited neuron. The circles with blue line is the nearest neighbors of excited neuron C.

The nearest neighbors of excited neuron C.

Each neuron is labeled with it’s coordinate (u, v), that is W. C: the excited neuron. The circles with blue line is the nearest neighbors of excited neuron C. Where W(t-1) is the weight vector at time t-1, and x(t) is the input vector of system-lever performance metrics at time t. N is a neighborhood function of the winning neuron or excited neuron C, and a Gaussian function is usually used as the neighborhood function. The function is described in Eq (2). Where N is the neighborhood of the excited neuron C, γ(t) is the learning-rate factor at time t, which determines how much each weight vector changed at time t, I is the index of the excited neuron C, (i, j) is the coordinate of neuron n in the map, δ(t) is the size of the neighborhood at time t. γ(t) and δ(t) is monotonically decreasing with time t. The winning neuron or excited neuron is determined by the squared Euclidean distance between the input vector x(t) and the weight vector W, for each input vector the excited neuron (u, v) is determined in Eq (3). To determine whether the training process of SOM network is convergence, the following inequality Formula Eq (4) is used. Where ε is a sufficient small number we predefined, which denotes the average deviation of the SOM weight vector at time t and t-1, ‖ • ‖ is the Euclidean distance between two vectors.

Simulated annealing-based SOM algorithm

Simulated Annealing-based SOM (SOMSA) algorithm applies Simulated Annealing algorithm to SOM to optimize the training process, which could be divided into two steps. First of all, use traditional SOM algorithm to train input samples to get the Best Matching Neurons (BMN) or winner neurons and their neighborhoods. Secondly, use simulated annealing (SA) algorithm to adjust the weight of BMN and its neighborhoods to find the global optimization solution (clusters). Simulated Annealing (SA) [39] is an optimization algorithm to find a global minimum of a problem among many local minimal, in which containing a solution space with a set of all possible solutions (clusters) and an objective function. In SOMSA, the BMNs and their neighborhoods are regarded as solutions S, and the inter-class total distance as the objective function J. The objective function of SOMSA is described in Eq (5). Where X is the input vector, C is the center of cluster i in solution S, ‖ • ‖ is the Euclidean distance between the input sample X and its cluster center C, J is the sum distance of each input sample to its cluster center. Keep the SA algorithm going on until the optimal performance is achieved. At each iteration it replaces the current cluster center by a random nearby center chosen with a probability p, depending on the difference between the new objective function and the current objective function. If J-J is less than zero, then set S’ as the current optimal cluster solution, otherwise accept the new solution by the probability p. The formula is as Eq (6). Where k is a constant, J is the current objective function with a cluster center that the input sample belongs to, J is the new objective function when the input sample chosen a random nearby cluster center. During the training process, random initial weight W is needed to be set, which is the same as traditional SOM algorithm. Although the SOMSA algorithm optimizes the accuracy and can effectively prevent the local optimum through the probability function, it still costs more time to train SOM network due to the random initial value and the random selection strategies, which cannot detect performance anomalies of large-scale virtual machines on cloud platform in real-time, leading to a low scalability and adaptability. At each iteration more calculations and comparisons are required to performed simultaneously. Moreover, an annealing speed α and the iteration number N have to be predefined, too. In order to address the problem, the following study attempts to improve the scalability, adaptability, accuracy and high convergence rate of SOM model by modeling an incremental SOM model that combines a heuristic-based initial optimization algorithm and a Weighted Euclidean Distance algorithm into SOM.

An improved incremental SOM anomaly detection algorithm

Incremental model-An iterative regression process based on heuristic initialization algorithm

Commonly, when using the SOM method to execute the anomaly detection, at least 1000 samples were needed to make the SOM map into a roughly order. However, under cloud platform, the virtual machines are deployed randomly and dynamically. It is not possible to obtain the performance metrics of virtual machines before deployment. So an incremental model SOM method or an iterative regression SOM is more suitable for anomaly detection of virtual machines on cloud platform. The incremental SOM starts from the initialization optimization of the SOM network. The common method of SOM network initialization is called the random initialization which selects N samples from the input space randomly. N is the number of neurons in SOM, and it constitutes the initial associated weight vector of each neuron. Relevant research [40-43] indicates that although the initial associated weight vector is determined without any prior knowledge, the SOM network is still able to reach the ordering state after several training iterations. However, it obtains the ordering state at the cost of longer training time of SOM model training. In this paper, we proposed a heuristic-based initialization method for SOM network to effectively initialize the SOM network and shorten the training time. By analyzing the convergence phase of SOM, it can be shown that, during the training period of a sample x, the weight of a neuron in SOM network will be tuned as long as the neighborhood size N is reduced to contain only one neuron that is the cluster center itself. The set of those samples are recorded as TS(W), and the equation can be described in Eq (7). Assume that W will eventually converges to , then when there exists a sample x belongs to TS(W), it can be derived as Eq (8). Taking account of all the input samples that belong to TS(W), it can get the relations in Eq (9). where p(x) is the probability density function of the input space. It can be seen obviously that it’s hard to get the distribution and the probability density of the input space to calculate the weight of neuron W, but it can get the approximately estimate value of W based on the input samples, which can be used as the idea initialization value of SOM network. The heuristic-based initialization method is an iteration method by estimating the weight of neuron W use the equation in Eq (10). Where | C | denotes the number of training samples in the cluster C, L is the number of types of input vectors that in cluster C, n(x) is the times of one kind of sample x occur in C, and . The convergence of the training process of the SOM initialization can be checked using Eq (11). where W is the last iteration weight value of neuron n, W is the current weight value of n, ‖ • ‖ is the Euclidean distance between them, and ε is a sufficiently small real number. During the heuristic-based initialization training process, just a small-scale number of samples are collected from the sample dataset. Instead of directly assigning the selected sample vector values to neurons, it trains each neuron by taking account of the number of samples in each cluster and the times one sample occur in the cluster, which makes the trained SOM network close to the final convergence state and improves the training speed efficiently.

Weighted Euclidean Distance (WED)

Generally, in each iterative training process of SOM, it will compare the Euclidean distance of the input samples to each neurons’ weight vector in the map to determine the training center neuron or winning neuron C, then amend the weight vector of C and its neighborhood neurons according to the neighborhood function. The Euclidean distance measures the distance between two vectors by the square deviations of each dimension of them, during which the variance value of each dimension is treated equally. Nevertheless, actually each dimension x of the input space vector x(t) = [x1, x2, x3, …, x] ∈ R may subject to different distribution. And if the variance of one dimension x of the input vector is much larger than the others, it will cause the imbalance problem of the training center neuron to determine due to the single dimension plays a decisive role, adversely affect the quality of the SOM model. To address the problem, the Weighted Euclidean Distance (WED) method is proposed to represent the contributions of each dimension in the competition process of SOM through calculating the weight of each dimension in the input vector in Eq (12). Where v(x) is the variance of each dimension in input space, sum is the sum of variance of each dimension, that is . According to the weight determined by Eq (12), we get the formula of WED as follow in Eq (13).

Neighborhood-based training domain searching algorithm

As we know, at the convergence phase, each iteration has few impact on the associated weight vector of neurons in the SOM. Meanwhile, system-level performance metrics values can be regarded as substantially stable during a very short time because of the local properties of the virtual machine. Therefore, reducing the search space during the SOM network training process can effectively lessen the search times, decrease the computational complexity, and shorten the training time. Then we combine the WED with neighbor-based searching algorithm together to train the central point of training domain to reduce the complexity of the search operations in the SOM network training process for determining the central point of the training domain. The training process is shown in Fig 3. To describe the system-lever performance metrics of all the virtual machines (vm) in the domain, let the token p as the pointer vector associated with virtual machine k (vm), n as the neuron that matches the current state, C(k) as the central point of the training neighborhood determined by the runtime measurement samples of virtual machine vm at time t. So at time t, p(t) points to C(k). Assuming at time t + 1, p(t + 1) still points to C(k), then get the neighborhood of p(t + 1) at time t + 1, which could be described as Left(p(t + 1)), Right(p(t + 1)), Top(p(t + 1)), Down(p(t + 1)). After that, using WED to compare the input vector vm with C(k) and its neighborhoods to find the best matching neuron n, which has the smallest Weighted Euclidian Distance. If n ≠ C(k), then change the pointer p(t + 1) to point to n and go to next iteration. If n = C(k), replace p(t) with p(t + 1) and end the searching process.
Fig 3

The process of neighborhood-based searching training domain algorithm.

P is the point to virtual machine k, n is the best matching neuron at time t + 1, and C(k) is the excited neuron at time t.

The process of neighborhood-based searching training domain algorithm.

P is the point to virtual machine k, n is the best matching neuron at time t + 1, and C(k) is the excited neuron at time t. Compared with traversal search algorithm, this method only using a small part of the SOM network, which could efficiently shorten the training time to complete and decrease the computing complexity. As stated above, IISOM is an effective anomaly detection algorithm for virtual machines on cloud platform. The IISOM detection model for virtual machines mainly consists of two parts (Fig 4). First is the iterative regress initialization phase. In this phase, the similarity of each data instance and the contributions of each dimension of data are considered and process is iterative until a predetermined minimum value ε is achieved. Due to the initialization process could approximately simulate the distributions of data, the roughly ordering SOM performs well in anomaly detection. Thus, when a new data instance is collected, the anomaly detection takes place in advance. If it is detected to be an anomaly, the alarm is raised. Otherwise, use it to train model until the model convergence. And the second part is the iterative convergence phase, where the neighborhoods of virtual machines are considered. The convergence process of SOM will not be retrained till the changing rate of running virtual machines exceed the threshold η, which is predefined to display the sensitivity to the change of virtual machines and we set it to be 0.4.
Fig 4

The flowchart of anomaly detection for virtual machines based on IISOM.

Experiments and discussions

Experimental environment

In this paper, the open source cloud platform OpenStack [44, 45] was used to build the experimental cloud platform with the physical servers for running virtual machines and the physical servers for running cloud management components. All the physical servers are installed the operation system CentOS6.5, while the former installs the hypervisor Xen3.2 [46], and the latter installs the cloud management components. And 100 virtual machines were deployed on this experimental cloud platform. The runtime performance metrics set of virtual machines in this platform is collected by tools such as libxenstat and libvirt [47, 48]. And during the runtime, three types of fault injection method were used to simulate system failures, that is memory leak, CPU Hog and the network Hog [49-51]. A subset of key performance metrics collected is shown in Fig 5.
Fig 5

A subset of performance metrics.

Four categories of virtual machines’ performance are listed.

A subset of performance metrics.

Four categories of virtual machines’ performance are listed.

Experimental program and results

Experiment 1: Performance evaluate of anomaly detection for virtual machine

The performance of real-time and accuracy of IISOM was evaluated by comparing with the traditional SOM and SOMSA method. Training: first of all, choose several virtual machines from 100 virtual machines deployed on the cloud platform, and randomly select one fault (memory leak, CPU Hog and network Hog) to inject into. Then collect 1000 runtime performance measurements from the 100 virtual machines during 10 rounds (one second per round) as the training data. Anomaly detection: in order to estimate the performance of real-time and accuracy of the methods, one of the three faults was randomly injected into the 100 virtual machines per second and the duration time is 1 minute. The anomalies were then detected by the three trained models, traditional SOM (TSOM) model, SOMSA model and IISOM model. And the detection results were recorded. The experimental results are shown in the following tables, Tables 1 and 2.
Table 1

The comparisons of TSOM, SOMSA and IISOM on the detection time.

Injecttime(s)Responsetime(s)Detectiontime(s)
TSOM12.3377.88
SOMSA12.2173.76
IISOM11.7264.54

The fault is injected in every per second, and response time is the time the model detect the fault. The detection time is the total time during the fault injection.

Table 2

The comparisons of TSOM, SOMSA and IISOM on detection accuracy.

AccuracyRate(%)
TSOM≈ 97.6
SOMSA≈ 98.9
IISOM≈ 99.0

The Accuracy Rate is the rate of correctly detecting the anomalies during the fault injection.

The fault is injected in every per second, and response time is the time the model detect the fault. The detection time is the total time during the fault injection. The Accuracy Rate is the rate of correctly detecting the anomalies during the fault injection. It can be seen from Table 1 that compare to TSOM model and SOMSA model, the IISOM takes the shortest response time to anomalies. For IISOM, it owns to the neighborhood-based domain searching method, which controls the searching domain into a small range for every input samples then speed up the detection time. And SOMSA model achieves a better detection time than TSOM model due to the SA optimization algorithm. Table 2 shows the comparisons of detection accuracy among the TSOM model, SOMSA model and the IISOM model, all of them could obtain a good detection accuracy. Regardless of the detection time, the SOMSA model almost has the same accuracy rate with IISOM model. However, because of the dynamic characteristics of the virtual machines on the cloud platform, a shorten detection time is necessary. So, IISOM method can have a better performance in anomaly detection of virtual machines on the cloud platform than the others.

Experiment 2. The effect of clustering on KDD cup

The objective of this set of experiments was to evaluate the effect of clustering on the benchmark KDD Cup [52] dataset to cluster the kind of anomalies. In KDD Cup dataset, there are 5 types of samples, the normal samples and four kinds of abnormal samples, each sample contains 41 indicators. We select 1000 samples from the KDD Cup dataset as the training dataset, which were labeled as normal, Probe attacked, DOS attacked, U2R attacked and R2L attacked, each 200. Meanwhile, 2000 samples from KDD Cup dataset are selected as testing dataset. Two steps are carried out to evaluate these algorithms: training and detection. 1000 testing samples are used to train the detection models of IISOM, SOMSA and traditional SOM, while 2000 testing samples are used to evaluate the detection performance among these models. The results are shown in Tables 3 and 4.
Table 3

The experimental results of IISOM and traditional SOM on KDD cup test dataset.

ResultIISOMTSOM
Real labelNormalProbeDosU2RR2LNormalProbeDosU2RR2L
Normal3761801536149226
Probe837970617371903
Dos1685460224553724
U2R110919216131719017
R2L1342038114730376

Normal, Probe, Dos, U2R and R2L are five types of KDD Cup dataset.

Table 4

The experimental results of IISOM and SOMSA on KDD cup test dataset.

ResultIISOMSOMSA
Real labelNormalProbeDosU2RR2LNormalProbeDosU2RR2L
Normal3761801537027219
Probe837970615375613
Dos1685460224553724
U2R110919216131719215
R2L1342038110731379

Normal, Probe, Dos, U2R and R2L are five types of KDD Cup dataset.

Normal, Probe, Dos, U2R and R2L are five types of KDD Cup dataset. Normal, Probe, Dos, U2R and R2L are five types of KDD Cup dataset. According to them, we get the results of metrics in Table 5.
Table 5

The metrics results of IISOM, traditional SOM and SOMSA on KDD cup dataset.

AlgorithmTPFPTNFNRTPRFPRpRaccurate
IISOM1498243761020.9360.0600.9840.937
TSOM1474413611260.9210.1020.9730.917
SOMSA1490303701100.9310.0750.9800.930

TP is the number of True Positive samples, FP is the number of False Positive samples, TN is the number of True Negative samples, FN is the number of False Negative samples. R is the rate of TP, R is the rate of FP, R is the rate of precision and R is the accuracy of the Algorithm.

TP is the number of True Positive samples, FP is the number of False Positive samples, TN is the number of True Negative samples, FN is the number of False Negative samples. R is the rate of TP, R is the rate of FP, R is the rate of precision and R is the accuracy of the Algorithm. We estimate the detection accuracy trough four parts. One is the true positive rate R, which describes the sensitivity of the detection algorithm to detect anomalies when an anomaly occurs. R is opposite. R is the rate of precision, which shows the ratio of correctly identified anomalies account for all detected anomalies. R presents the proportion of true positives and false positives account for all testing samples.

Experiment 3. The effect of clustering on real dataset

Due to the runtime performance of virtual machine has high dynamic, experiments on the real dataset are conducted, too. 1000 running data from our cloud platform were selected as the training sample, including normal samples, CPU anomaly samples, memory anomaly samples and network anomaly samples, each 250. Similarly, experiments based on these 2000 testing samples are carried out and the results are shown in Tables 6 and 7.
Table 6

The experimental results of IISOM and traditional SOM on our own test dataset.

ResultIISOMTSOM
Real labelNormalCPUAnomalyMemAnomalyNetAnomalyNormalCPUAnomalyMemAnomalyNetAnomaly
Normal4895334777106
CPUAnomaly247511126475811
MemAnomaly1144832394817
NetAnomaly9128471101311466

CPUAnomaly, MemAnomaly and NetAnomaly are three types of abnormal performance samples collected by fault injection.

Table 7

The experimental results of IISOM and SOMSA on our own test dataset.

ResultIISOMSOMSA
Real labelNormalCPUAnomalyMemAnomalyNetAnomalyNormalCPUAnomalyMemAnomalyNetAnomaly
Normal489533481874
CPUAnomaly247511127477610
MemAnomaly11448324114796
NetAnomaly912847171310470

CPUAnomaly, MemAnomaly and NetAnomaly are three types of abnormal performance samples collected by fault injection.

CPUAnomaly, MemAnomaly and NetAnomaly are three types of abnormal performance samples collected by fault injection. CPUAnomaly, MemAnomaly and NetAnomaly are three types of abnormal performance samples collected by fault injection. Summarized from Tables 6 and 7, we get the metric results in Table 8, that is the true positive rate R and the false positive rate R, the precision R and the accuracy rate R.
Table 8

The metrics results of IISOM, traditional SOM and SOMSA on Real dataset.

AlgorithmTPFPTNFNRTPRFPRpRaccurate
IISOM191811489710.9640.0220.9940.967
TSOM189923477780.9610.0460.9880.959
SOMSA190719481740.9630.0380.9900.962

TP is the number of True Positive samples, FP is the number of False Positive samples, TN is the number of True Negative samples, FN is the number of False Negative samples. R is the rate of TP, R is the rate of FP, R is the rate of precision and R is the accuracy of the Algorithm.

TP is the number of True Positive samples, FP is the number of False Positive samples, TN is the number of True Negative samples, FN is the number of False Negative samples. R is the rate of TP, R is the rate of FP, R is the rate of precision and R is the accuracy of the Algorithm. It can be found from results (Tables 5 and 8) that IISOM has the highest accuracy followed with SOMSA and traditional SOM. IISOM leverages heuristic-based initialization algorithm rather than random initialization used in traditional SOM and SOMSA algorithms, which makes it have a fast learning ability for a runtime performance and detect in time. Though SOMSA uses simulated annealing algorithm to optimize the excited neuron’s weight and its neighborhoods to improve the accuracy, it takes a longer time to train the self-organizing map network by randomly selecting adjacent center neurons to replace the current center neurons. So SOMSA does not work well on anomaly detections for virtual machines with high dynamic. Besides, IISOM algorithm takes into account that the contributions of each dimension to self-organizing map network is different. If each dimension in the input space is treated equally, just like traditional SOM algorithm and SOMSA algorithm, it may lead to the imbalance of self-organizing map network, in which a great change in some dimensions cannot cause the attention of the SOM and a subtle change in some dimensions may result in a serious fluctuation. Weighted Euclidean Distance algorithm uses different weight values to calculate the similarity (Euclidean Distance) between the input space (input samples) and the output space (neurons) to balance the contribution and improve the quality of the trained SOM model. These two experiments (based on KDD Cup dataset and the real dataset) approved the result that IISOM has a higher accuracy than traditional SOM and SOMSA algorithm, improving the true positive rate and lowing the false positive rate.

Experiment 4. Estimate the performance of models

Although IISOM performs better in the known attacks or anomalies in the same testing samples than the other algorithms, there may be of inaccuracy for unknown attacks or anomalies. So, we conduct an experiment on scalability to verify whether IISOM could detect unknown attacks or anomalies better than traditional SOM and SOMSA or not. The results of three SOMs are shown in Table 9.
Table 9

The experimental results of IISOM and traditional SOM on our own test dataset.

Performance AlgorithmDosU2RKnown AnomaliesUnknown Anomalies
RTPRFPRTPRFP
IISOM0.9320.0150.8870.0190.9530.941
TSOM0.8060.0310.6950.0180.9120.7783
SOMSA0.8540.0110.7930.0230.9320.866

Dos and U2R are two attacked samples. Table shows the accuracy of detecting Known Anomalies and unknown anomalies, the rate of false positive and rate of true positive.

Dos and U2R are two attacked samples. Table shows the accuracy of detecting Known Anomalies and unknown anomalies, the rate of false positive and rate of true positive. Two types of attacked samples are selected, in which DOS has the maximum number in the whole KDD Cup testing dataset while U2R (User-to-Root) is the minimum. Using the SOM model we trained in Experiment 2 to test these two kinds of attacked samples. From Table 9, it can be interpreted that IISOM algorithm has a higher true positive rate than traditional SOM and SOMSA. In addition, we compare the accuracy rate of known anomalies detecting with unknown anomalies detecting to evaluate the quality of models. After training and testing, it can be seen from Table 9 that although the false positive rate of IISOM is relatively higher than SOMSA on DOS attacked samples, it has an obvious advantage in unknown anomalies detection than SOMSA. Furthermore, it can be found that whether the intrusion is large or not, IISOM algorithm performance as well as usual. In order to embody the advantage of the IISOM algorithm, two figures are used to reflect the true positive rate R and the false positive rate R. Fig 6 shows the true positive rate of the IISOM, traditional SOM and SOMSA with different iterations. Fig 7 shows the false positive rate of the IISOM, traditional SOM and SOMSA with different iterations.
Fig 6

The true positive rate for IISOM, traditional SOM and SOMSA with different iterations.

Fig 7

The false positive rate for IISOM, traditional SOM and SOMSA with different iterations.

From these two figures, it can be seen that for all the three SOM algorithms, accuracy rate keeps rising with the increase of iteration, while the false rate reduces. For IISOM algorithm, it has a relatively higher true positive rate and a lower false positive rate than the other two algorithms at the same number of iterations. For SOMSA, when the iterations is lower than 400, both true positive rate and false positive rate are relatively smooth, while as the number of iterations continues to increase, the accuracy rate is improved significantly than the traditional SOM.

Experiment 5. Estimate the parameters

The main advantage of the IISOM method is that it could balance the contribution of each dimension in the input space, rapidly and automatically search the Best Matching Neurons (BMN) by competition, avoiding giving any prior knowledge. However, several parameters should be tuned in order to obtain the fitness and smoothness SOM network. Here, we study the performance of IISOM by varying one parameter at a time. The parameters we discuss about are the map size of SOM k, the neighborhood size δ and the learning rate γ. In order to illustrate their influence on the detection, the Table 10 and following Figs (Figs 8 and 9) display the impact on the quality and accuracy of IISOM.
Table 10

The impact of map size of SOM on the quality of IISOM.

Map size of SOMQETE
5 × 50.120.01
10 × 100.110.02
15 × 150.110.01
18 × 180.100.02
21 × 210.090.02

QE is the quantzation error, TE is the topographic error.

Fig 8

The performance for IISOM by varying the initial neighborhood size(radius).

Fig 9

The performance for IISOM by varying the initial learning rate.

QE is the quantzation error, TE is the topographic error. As we can see from Table 10, two types of quantities are used to evaluate the quality of the SOM that is quantization error (QE) and topographic error (TE) [53]. QE is the average distance between each input vector and its cluster center, the smaller the distance, the higher the detection accuracy. TE is the proportion of all input vectors for which first and second cluster centers are not adjacent, a smaller value comes to a smooth model. IISOM automatically balances the influence of each dimension in the input space by weighted Euclidean distance algorithm, which could maintain the topology preservation and reduce the distance between each input samples with its cluster center. Combined with the experimental results, it can be found that the map size of SOM has a few influence on the quality of the IISOM when the initial size of training neighborhood (radius) and learning rate are set to be 3.5 and 1, respectively. To evaluate the neighborhood size (radius) and learning rate well, the map size of SOM is set to be 15 × 15. Fig 8 displays the true positive rate and false positive rate of IISOM with different initial neighborhood size (radius), in which the initial learning rate is set to be 1. Both true positive rate and false positive rate achieve a better value around the radius 3.5, greater than or less than the value the accuracy rate is low. Fig 9 illustrates the performance of IISOM in terms of the number of iterations and the accuracy rate with different initial learning rate. From this figure we can see that the initial learning rate is related to the necessary iterations for convergence, a smaller or larger value will lead to more iterations. In the training process of IISOM, the learning rate is monotone decreasing during the iteration, therefore, it is efficient to choose a good initial learning rate. A small initial learning rate makes a small contribution of each sample to train the SOM network, which causes under fitting the status of testing data to decline the accuracy rate. Vice versa, a large one leads to over fitting, decreasing the convergence velocity. As shown in Fig 9, when the initial learning is 1, the accuracy rate achieves the highest value and the iterations is lowest, in which the initial neighborhood size is set to be 3.5.

Discussion

Cloud platforms with characteristics of resource sharing, allocation in demand and virtualization appear more and more users to lease resources in pay-as-you-go fashion and deploy their own systems on it to improve the utilization of hardware and software resources and reduce the cost. However, due to the ever-growing complexity and dynamic of cloud computing systems, it is susceptible to resource contentions, software bugs, hardware failures or administrators’ mistakes, which can significantly affect the system performance. In order to avoid the performance anomaly, a number of anomaly detection techniques [54-57] were proposed to proactively and reactively detect anomalies, but due to their detection mechanisms, they mostly lack scalability and often require prior knowledge, thus making them unsuitable for virtual machines detection on cloud platforms. Thus, we propose the Improved Incremental SOM (IISOM) algorithm to accelerate detecting process and improve the quality of detection model by considering the virtual machines’ high dynamic and complexity.

Strengths and limitations

From the experimental results, it can be seen that IISOM is superior to the traditional SOM and SOMSA algorithm for anomaly detection of virtual machines. With the help of heuristic-based initialization method and neighborhood-based searching method, IISOM greatly enhances the detection accuracy and the detection rate. Besides, by considering the contribution of each dimension of the performance metrics, the IISOM algorithm outperforms the traditional SOM and SOMSA algorithm, achieving a highest quality model than the others. There are nonetheless several limitations of the current IISOM method. The parameters of map size of SOM, learning rate and neighborhood size still have to be predefined by empirical, and the current heuristic-based initialization method takes on the opinion that the initial weight value of neurons would approximately reflect the data distribution. But the data distribution is usually unknown in advance, several iterative regression computations have to be done during the initialization.

Future work

Anomaly detection for virtual machines on cloud platforms has a high demand of algorithm for detection accuracy, self adaption and real-time capability. As the lack of adaptive map size, a data-driven density-based detection method will be introduced into the IISOM to improve the detection model. In addition, with the growing scale of cloud platform, it will be increasingly subjected to novel attacks and other anomalies. Thus, incorporating some novelty detection method into this IISOM method is a promising future direction. What’s more, to enhance the technology and keep up with the trends, we plan to apply this IISOM to some new fields, such as mobile Augmented Reality [58], Mobile Landmark Recognition [59], Mobile Visual Location Recognition [60], Image processing [61, 62] and so on, to deal with the high dimensional data and meet the demands of real-time capability.

Conclusion

Considering with the feature of complexity and high dynamicity of cloud platform, the Improved Incremental SOM (IISOM) algorithm is proposed to identify and predict anomalies to keep the platform dependable. Weighted Euclidean Distance (WED) method and a heuristic-based initial method are incorporated into the Self-organizing Map (SOM) algorithm to reduce computational overhead, shorten the training time and self-adaptation in dynamic environment. To evaluate the proposed algorithm, five experiments are performed. Experiment 1 is carried out to evaluate the real-time property and detection accuracy of the IISOM compared to SOMSA and TSOM. The different detection models based on KDD Cup dataset and real dataset are trained through experiments 2 and 3 to evaluate the performance. Experiment 4 is set to estimate the quality or performance of the models when encounters unknown anomalies. Compared with traditional SOM and SOMSA on the four experiments, it shows that IISOM has more advantages in detecting accuracy, convergence velocity, and performance even though the anomalies are large and unknown. For further analysis of IISOM algorithm, several important parameters are considered in Experiment 5. From which, it can be summarized that the map size of SOM k has few influence in the model training process due to the dimensional balance based on WED algorithm, while the initial neighborhood size δ and the initial learning rate γ are sensitive to the model training. It can be found that the model performs well when δ is 3.5 and γ is 1.
  11 in total

1.  Self-organizing and self-evolving neurons: a new neural network for optimization.

Authors:  Sitao Wu; Tommy W S Chow
Journal:  IEEE Trans Neural Netw       Date:  2007-03

2.  Clustering of the self-organizing map.

Authors:  J Vesanto; E Alhoniemi
Journal:  IEEE Trans Neural Netw       Date:  2000

3.  Pedestrian detection: an evaluation of the state of the art.

Authors:  Piotr Dollár; Christian Wojek; Bernt Schiele; Pietro Perona
Journal:  IEEE Trans Pattern Anal Mach Intell       Date:  2012-04       Impact factor: 6.226

4.  A novel representation of genomic sequences for taxonomic clustering and visualization by means of self-organizing maps.

Authors:  Soledad Delgado; Federico Morán; Antonio Mora; Juan Julián Merelo; Carlos Briones
Journal:  Bioinformatics       Date:  2014-10-24       Impact factor: 6.937

5.  Self-organizing maps based on limit cycle attractors.

Authors:  Di-Wei Huang; Rodolphe J Gentili; James A Reggia
Journal:  Neural Netw       Date:  2014-12-18

6.  Visualizing the topical structure of the medical sciences: a self-organizing map approach.

Authors:  André Skupin; Joseph R Biberstine; Katy Börner
Journal:  PLoS One       Date:  2013-03-12       Impact factor: 3.240

7.  Self-correcting maps of molecular pathways.

Authors:  Andrey Rzhetsky; Tian Zheng; Chani Weinreb
Journal:  PLoS One       Date:  2006-12-20       Impact factor: 3.240

8.  A heuristic placement selection of live virtual machine migration for energy-saving in cloud computing environment.

Authors:  Jia Zhao; Liang Hu; Yan Ding; Gaochao Xu; Ming Hu
Journal:  PLoS One       Date:  2014-09-24       Impact factor: 3.240

9.  Applications of self-organizing maps for ecomorphological investigations through early ontogeny of fish.

Authors:  Tommaso Russo; Michele Scardi; Stefano Cataudella
Journal:  PLoS One       Date:  2014-01-23       Impact factor: 3.240

10.  Bioinformatics on the cloud computing platform Azure.

Authors:  Hugh P Shanahan; Anne M Owen; Andrew P Harrison
Journal:  PLoS One       Date:  2014-07-22       Impact factor: 3.240

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.