SOM-based behavioral analysis for virtualized network functions

In this paper, we propose a mechanism based on Self-Organizing Maps for analyzing the resource consumption behaviors and detecting possible anomalies in data centers for Network Function Virtualization (NFV). Our approach is based on a joint analysis of two historical data sets available through two separate monitoring systems: system-level metrics for the physical and virtual machines obtained from the monitoring infrastructure, and application-level metrics available from the individual virtualized network functions. Experimental results, obtained by processing real data from one of the NFV data centers of the Vodafone network operator, highlight some of the capabilities of our system to identify interesting points in space and time of the evolution of the monitored infrastructure.

[1]  Rolf Stadler,et al.  Universal fault detection for NFV using SOM-based clustering , 2015, 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS).

[2]  Bao-Shuh Paul Lin,et al.  Applying Big Data, Machine Learning, and SDN/NFV to 5G Traffic Clustering, Forecasting, and Management , 2018, 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft).

[3]  Rolf Stadler,et al.  vNMF: Distributed fault detection using clustering approach for network function virtualization , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[4]  Ignacio Díaz Blanco,et al.  A new approach to exploratory analysis of system dynamics using SOM. Applications to industrial processes , 2008, Expert Syst. Appl..

[5]  L. Canetta *,et al.  Applying two-stage SOM-based clustering approaches to industrial data analysis , 2005 .

[6]  D Vasumathi,et al.  Review on anomaly based network intrusion detection system , 2017, 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT).

[7]  Lalu Banoth,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .

[8]  Feng Liu,et al.  A System Architecture for Real-time Anomaly Detection in Large-scale NFV Systems , 2016, FNC/MobiSPC.

[9]  M. Pushpa,et al.  Analysis on credit card fraud identification techniques based on KNN and outlier detection , 2017, 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB).

[10]  F. D. VAN DEN BERGa,et al.  Product Uniformity Control – A Research Collaboration of European Steel Industries to Non-Destructive Evaluation of Microstructure and Mechanical Properties , 2018 .