[1]郑杰生,谢彬瑜,吴广财,等.一种基于模式识别的微服务异常检测方法[J].计算机技术与发展,2020,30(11):123-127.[doi:10. 3969 / j. issn. 1673-629X. 2020. 11. 023]
 ZHENG Jie-sheng,XIE Bin-yu,WU Guang-cai,et al.An Anomaly Detection Approach for Microservices Based on Pattern Recognition[J].,2020,30(11):123-127.[doi:10. 3969 / j. issn. 1673-629X. 2020. 11. 023]
点击复制

一种基于模式识别的微服务异常检测方法()

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
30
期数:
2020年11期
页码:
123-127
栏目:
安全与防范
出版日期:
2020-11-10

文章信息/Info

Title:
An Anomaly Detection Approach for Microservices Based on Pattern Recognition
文章编号:
1673-629X(2020)11-0123-05
作者:
郑杰生1谢彬瑜1吴广财1陈 非1花 磊2
1. 广东电力信息科技有限公司,广东 广州 510000; 2. 苏州博纳讯动软件有限公司,江苏 苏州 215000
Author(s):
ZHENG Jie-sheng1XIE Bin-yu1WU Guang-cai1CHEN Fei1HUA Lei2
1. Guangdong Electric Power Information Technology Co. ,Ltd. ,Guangzhou 510000,China; 2. Suzhou Bona Xundong Software Co. ,Ltd. ,Suzhou 215000,China
关键词:
微服务云计算异常检测系统调用运行监测
Keywords:
microservicescloud computinganomaly detectionsystem calloperation monitoring
分类号:
TP312
DOI:
10. 3969 / j. issn. 1673-629X. 2020. 11. 023
摘要:
云计算数据中心面向多租户部署异构软件应用,能够优化资源配置以有效提升资源利用率,然而基于微服务架构的软件应用的异构性和动态性对云计算数据中心的运行维护管理带来了困难。 已? 有运行监测技术通常采用统一模型分析应用运行状态,然而基于微服务架构的多样化软件应用的行为差异巨大,难以通过单一模型刻画。 该文提出一种基于系统调用模式识别的微服务异常检测? 方法。 使用系统调用追踪技术监测微服务的运行状态,基于贝叶斯学习刻画软件应用的行为,根据行为特点对微服务进行自动化分类,在特定类型下基于自动编码器建立微服务运行状态模型,根据模型检测当前微服务的异常行为。 实验结果表明,所提出的方法具有较低的性能开销,能够有效区分微服务类型,并且准确检测微服务异常。
Abstract:
The data centers of cloud computing deploy heterogeneous software applications for multi-tenants,which can optimize resource allocation to effectively improve resource utilization. However, the heterogeneity and dynamics of emerging microservice architectures raise difficulties to the operation and maintenance of data centers. The existing operation monitoring technology usu-ally adopts unified model to analyze the application operation state,but the behavior of diversified software applications based on micro-service architecture is quite different,so it is difficult to describe through a single model. We propose an anomaly detection approach for microservices based on system call pattern recognition. The system call tracing technology is employed to monitor the running status of microservices and describe the behavior of software application based on Bayesian learning. Automatic classification of microservices is carried out according to the behavior characteristics. In a specific type,a microservices operation state model is established based on the automatic encoder. According to the model,abnormal behaviors of the current microservices are detected. Experiment shows that the proposed approach has low performance overhead,can effectively distinguish the types of microservices,and accurately detect typical anomalies.

相似文献/References:

[1]王茜,朱志祥,史晨昱,等.应用于数据库安全保护的加解密引擎系统[J].计算机技术与发展,2014,24(01):143.
 WANG Qian[],ZHU Zhi-xiang[],SHI Chen-yu[],et al.Encryption and Decryption Engine System Applying to Database Security and Detection[J].,2014,24(11):143.
[2]陈丹伟 黄秀丽 任勋益.云计算及安全分析[J].计算机技术与发展,2010,(02):99.
 CHEN Dan-wei,HUANG Xiu-li,REN Xun-yi.Analysis of Cloud Computing and Cloud Security[J].,2010,(11):99.
[3]孙放 陈云芳 林杭锋.适用于富客户端的云计算模型[J].计算机技术与发展,2010,(08):96.
 SUN Fang,CHEN Yun-fang,LIN Hang-feng.Cloud Computing Model Applicable to Rich Client Applications[J].,2010,(11):96.
[4]郭苑 张顺颐 孙雁飞.物联网关键技术及有待解决的问题研究[J].计算机技术与发展,2010,(11):180.
 GUO Yuan,ZHANG Shun-yi,SUN Yan-fei.Research of Key Technologies and Unresolved Questions of Internet of Things[J].,2010,(11):180.
[5]李玲娟 张敏.云计算环境下关联规则挖掘算法的研究[J].计算机技术与发展,2011,(02):43.
 LI Ling-juan,ZHANG Min.Research on Algorithms of Mining Association Rule under Cloud Computing Environment[J].,2011,(11):43.
[6]王德政 申山宏 周宁宁.云计算环境下的数据存储[J].计算机技术与发展,2011,(04):81.
 WANG De-zheng,SHEN Shan-hong,ZHOU Ning-ning.Data Storage in Cloud Computing Environment[J].,2011,(11):81.
[7]宋丽华 姜家轩 张建成 田长录 马文征.黄河三角洲云计算平台关键技术的研究[J].计算机技术与发展,2011,(06):40.
 SONG Li-hua,JIANG Jia-xuan,ZHANG Jian-cheng,et al.Research of Key Technologies of Cloud Computing of Yellow River Delta[J].,2011,(11):40.
[8]田宏伟 解福 倪俊敏.云计算环境下基于粒子群算法的资源分配策略[J].计算机技术与发展,2011,(12):22.
 TIAN Hong-wei,XIE Fu,NI Jun-min.Resource Allocation Algorithm Based on Particle Swarm Algorithm in Cloud Computing Environment[J].,2011,(11):22.
[9]张慧 邢培振.云计算环境下信息安全分析[J].计算机技术与发展,2011,(12):164.
 ZHANG Hui,XING Pei-zhen.Information Security Analysis in Cloud Computing Environment[J].,2011,(11):164.
[10]张建成[] 宋丽华[] 鹿全礼[] 郭锐[] 刘永泉[].云计算方案分析研究[J].计算机技术与发展,2012,(01):165.
 ZHANG Jian-cheng,SONG Li-hua,LU Quan-li,et al.Study and Analysis of Cloud Computing Procedure[J].,2012,(11):165.
[11]郑杰生,谢彬瑜,吴广财,等.一种基于 Lasso 回归的微服务性能建模方法[J].计算机技术与发展,2020,30(12):216.[doi:10. 3969 / j. issn. 1673-629X. 2020. 12. 038]
 ZHENG Jie-sheng,XIE Bin-yu,WU Guang-cai,et al.A Lasso Regression Based Performance Modeling Method for Microservices[J].,2020,30(11):216.[doi:10. 3969 / j. issn. 1673-629X. 2020. 12. 038]
[12]马勤政,徐中伟,梅 萌.基于 Kubernetes 的列控系统测试容器云平台设计[J].计算机技术与发展,2021,31(06):52.[doi:10. 3969 / j. issn. 1673-629X. 2021. 06. 010]
 MA Qin-zheng,XU Zhong-wei,MEI Meng.Design of Container Cloud Platform for Test of Train Control SystemBased on Kubernetes[J].,2021,31(11):52.[doi:10. 3969 / j. issn. 1673-629X. 2021. 06. 010]

更新日期/Last Update: 2020-11-10