ATOM : Efficient Tracking, Monitoring, and Orchestration of Cloud Resources

Authors

  • K Sandhya Rani  MCA Department, Vignan's Lara Institute of Technology and Science, Vadlamudi, Guntur, Andhra Pradesh, India
  • Kunta Srinu  MCA Department, Vignan's Lara Institute of Technology and Science, Vadlamudi, Guntur, Andhra Pradesh, India

Keywords:

Infrastructure as a Service, cloud, tracking, monitoring, anomaly detection, virtual machine introspection

Abstract

The emergence of Infrastructure as a Service framework brings new opportunities, that conjointly accompanies with new challenges in auto-scaling, resource allocation, and security. A elementary challenge underpinning these issues is that the continuous tracking and monitoring of resource usage within the system. during this paper, we tend to present ATOM, AN efficient and effective framework to automatically track, monitor, ANd orchestrate resource usage in an Infrastructure as a Service (IaaS) system that's wide employed in cloud infrastructure. we tend to use novel trailing methodology to ceaselessly track vital system usage metrics with low overhead, and develop a Principal part Analysis (PCA) primarily based approach to ceaselessly monitor and automatically notice anomalies supported the approximated trailing results. we tend to show a way to dynamically set the trailing threshold supported the detection results, and more, a way to regulate trailing rule to confirm its optimality beneath dynamic workloads. Lastly, once potential anomalies square measure known, we tend to use introspection tools to perform memory forensics on VMs guided by analyzed results from trailing and monitoring to spot malicious behavior within a VM. we tend to demonstrate the extensibility of ATOM through virtual machine (VM) bunch. The performance of our framework is evaluated in AN open supply IaaS system.

References

  1. Amazon. http://www.aws.amazon.com/. Accessed Nov. 5, 2016.
  2. ITWORLD. http://www.itworld.com/security/428920/attackers-install-ddos-bots-amazon-cloud-exploiting-elasticsearch-weakness. Accessed Nov. 5, 2016.
  3. Amazon. AWS Best Practices for DDoS Resiliency. https://d0.awsstatic. com/whitepapers/DDoS White Paper June2015.pdf. Accessed Nov. 5, 2016.
  4. Eucalyptus. http://www8.hp.com/us/en/cloud/helion-eucalyptus.html. Accessed Nov. 5, 2016.
  5. D Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Yous-eff, and D. Zagorodnov, “The eucalyptus open-source cloud-computing system,” in CCGRID, 2009.
  6. M Du and F. Li, “Spell: Streaming parsing of system event logs,” in ICDM, 2016.
  7. W Dawoud, I. Takouna, and C. Meinel, “Infrastructure as a service security: Challenges and solutions,” in INFOS, 2010.
  8. D J. Dean, H. Nguyen, and X. Gu, “UBL: Unsupervised behavior learn-ing for predicting performance anomalies in virtualized cloud systems,” in ICAC, 2012.
  9. LibVMI. http://libvmi.com/. Accessed Nov. 5, 2016.
  10. D. Johnson, M. Hibler, and E. Eide, “Composable multi-level debugging with Stackdb,” in VEE, 2014.
  11. K. Yi and Q. Zhang, “Multi-dimensional online tracking,” in SODA, 2009.
  12. H. Ringberg, A. Soule, J. Rexford, and C. Diot, “Sensitivity of PCA for traffic anomaly detection,” in SIGMETRICS Performance Evaluation Review, 2007.
  13. A. Lakhina, M. Crovella, and C. Diot, “Diagnosing network-wide traffic anomalies,” in SIGCOMM, 2004.
  14. V. Varadarajan, T. Kooburat, B. Farley, T. Ristenpart, and M. M. Swift, “Resource-freeing attacks: improve your cloud performance (at your neighbor’s expense),” in CCS, 2012.
  15. W. Li, H. H. Yue, S. Valle-Cervantes, and S. J. Qin, “Recursive PCA for adaptive process monitoring,” Journal of process control, 2000.
  16. J. E. Jackson and G. S. Mudholkar, “Control procedures for residuals associated with principal component analysis,” Technometrics, 1979.
  17. L. Huang, M. I. Jordan, A. Joseph, M. Garofalakis, and N. Taft, “In-network PCA and anomaly detection,” in NIPS, 2006.
  18. Volatility. http://www.volatilityfoundation.org/. Accessed Nov. 5, 2016.
  19. A. Bianchi, Y. Shoshitaishvili, C. Kruegel, and G. Vigna, “Blacksheep: detecting compromised hosts in homogeneous crowds,” in CCS, 2012.
  20. M. Ester, H.-P. Kriegel, J. Sander, X. Xu et al., “A density-based algorithm for discovering clusters in large spatial databases with noise.” in KDD, 1996.
  21. D. E. Difallah, A. Pavlo, C. Curino, and P. Cudre-Mauroux, “OLTP-Bench: An extensible testbed for benchmarking relational databases,” PVLDB, 2013.
  22. StackDB. http://www.flux.utah.edu/software/stackdb/doc/all.html#using-eucalyptus-to-run-qemukvm. Accessed Nov. 5, 2016.
  23. I. Goiri, R. Bianchini, S. Nagarakatte, and T. D. Nguyen, “Approx-hadoop: Bringing approximations to mapreduce frameworks,” in ASP-LOS, 2015.
  24. M. T. Al Amin, S. Li, M. R. Rahman, P. T. Seetharamu, S. Wang, T. Abdelzaher, I. Gupta, M. Srivatsa, R. Ganti, R. Ahmed et al., “Social trove: A self-summarizing storage service for social sensing,” in ICAC, 2015.
  25. J. Kelley, C. Stewart, N. Morris, D. Tiwari, Y. He, and S. Elnikety, “Mea-suring and managing answer quality for online data-intensive services,” in ICAC, 2015.
  26. X. Wang, U. Kruger, and G. W. Irwin, “Process monitoring approach using fast moving window PCA,” Industrial & Engineering Chemistry Research, 2005.
  27. Amazon. Amazon cloudwatch. http://aws.amazon.com/cloudwatch/. Ac-cessed Nov. 5, 2016.
  28. OpenStack. http://www.openstack.org/. Accessed Nov. 5, 2016.
  29. Openstack ceilometer. https://wiki.openstack.org/wiki/Ceilometer. Accessed Nov. 5, 2016.
  30. DATADOG. https://www.datadoghq.com/. Accessed Nov. 5, 2016.
  31. librato. https://www.librato.com/. Accessed Nov. 5, 2016.
  32. D. J. Dean, H. Nguyen, P. Wang, and X. Gu, “Perfcompass: toward runtime performance anomaly fault localization for infrastructure-as-a-service clouds,” in HotCloud, 2014.
  33. R. Van Renesse, K. P. Birman, and W. Vogels, “Astrolabe: A robust and scalable technology for distributed system monitoring, management, and data mining,” TOCS, 2003.
  34. P. Yalagandula and M. Dahlin, “A scalable distributed information management system,” in SIGCOMM, 2004.
  35. M. L. Massie, B. N. Chun, and D. E. Culler, “The ganglia distributed monitoring system: design, implementation, and experience,” Parallel Computing, 2004.
  36. N. Jain, D. Kit, P. Mahajan, P. Yalagandula, M. Dahlin, and Y. Zhang, “Star: Self-tuning aggregation for scalable monitoring,” in VLDB, 2007.
  37. J. Liang, X. Gu, and K. Nahrstedt, “Self-configuring information man-agement for large-scale service overlays,” in INFOCOM, 2007.
  38. Y. Zhao, Y. Tan, Z. Gong, X. Gu, and M. Wamboldt, “Self-correlating predictive information tracking for large-scale production systems,” in ICAC, 2009.
  39. D. Moldovan, G. Copil, H.-L. Truong, and S. Dustdar, “MELA: Moni-toring and analyzing elasticity of cloud services,” in CloudCom, 2013.
  40. Amazon. Aws security center. http://aws.amazon.com/security/. Ac-cessed Nov. 5, 2016.
  41. OpenStack. OpenStack Keystone. http://docs.openstack.org/developer/ keystone/. Accessed Nov. 5, 2016.
  42. OpenStack Neutron. https://wiki.openstack.org/wiki/Neutron. Ac-cessed Nov. 5, 2016.
  43. X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan, G. Iannaccone, and A. Lakhina, “Detection and identification of network anomalies using sketch subspaces,” in IMC, 2006.
  44. Y. Liu, L. Zhang, and Y. Guan, “Sketch-based streaming PCA algorithm for network-wide traffic anomaly detection,” in ICDCS, 2010.
  45. L. Huang, X. Nguyen, M. Garofalakis, J. M. Hellerstein, M. I. Jordan, A. D. Joseph, and N. Taft, “Communication-efficient online detection of network-wide anomalies,” in INFOCOM, 2007.
  46. A. S. Ibrahim, J. H. Hamlyn-harris, and J. Grundy, “Emerging security challenges of cloud virtual infrastructure,” in APSEC 2010 Cloud Work-shop, 2010.
  47. L. M. Vaquero, L. Rodero-Merino, and D. Moran,´ “Locking the sky: a survey on iaas cloud security,” Computing, 2011.
  48. C. R. Li, D. Abendroth, X. Lin, Y. Guo, H. wook Baek, E. Eide, R. Ricci, and J. K. V. der Merwe, “Potassium: Penetration testing as a service,” in SoCC, 2015.
  49. T. Garfinkel, M. Rosenblum et al., “A virtual machine introspection based architecture for intrusion detection.” in NDSS, 2003.
  50. J. Pfoh, C. Schneider, and C. Eckert, “A formal model for virtual machine introspection,” in ACM workshop on Virtual machine security, 2009.
  51. B. Dolan-Gavitt, T. Leek, M. Zhivich, J. Giffin, and W. Lee, “Virtuoso: Narrowing the semantic gap in virtual machine introspection,” in IEEE Symposium on Security and Privacy, 2011.
  52. Y. Fu and Z. Lin, “Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection,” in IEEE Symposium on Security and Privacy, 2012.
  53. A. S. Ibrahim, J. Hamlyn-Harris, J. Grundy, and M. Almorsy, “Cloudsec: a security monitoring appliance for virtual machines in the iaas cloud model,” in NSS, 2011.
  54. F. Zhang, J. Chen, H. Chen, and B. Zang, “CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtu-alization,” in SOSP, 2011.
  55. H. W. Baek, A. Srivastava, and J. Van der Merwe, “CloudVMI: Virtual machine introspection as a cloud service,” in IC2E, 2014.
  56. B. Bertholon, S. Varrette, and P. Bouvry, “Certicloud: a novel tpm-based approach to ensure cloud iaas security,” in IEEE Cloud Computing, 2011.
  57. M. Du and F. Li, “ATOM: automated tracking, orchestration and moni-toring of resource usage in infrastructure as a service systems,” in IEEE BigData, 2015.

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
K Sandhya Rani, Kunta Srinu, " ATOM : Efficient Tracking, Monitoring, and Orchestration of Cloud Resources, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 2, pp.71-76, March-April-2018.