Advanced Search
Volume 45 Issue 1
Jan.  2023
Turn off MathJax
Article Contents
TANG Lun, WANG Kai, ZHANG Yue, ZHOU Xinlong, CHEN Qianbin. Service Function Chain Anomaly Detection Based on Distributed Generative Adversarial Network in Network Slicing Scenario[J]. Journal of Electronics & Information Technology, 2023, 45(1): 262-271. doi: 10.11999/JEIT211261
Citation: TANG Lun, WANG Kai, ZHANG Yue, ZHOU Xinlong, CHEN Qianbin. Service Function Chain Anomaly Detection Based on Distributed Generative Adversarial Network in Network Slicing Scenario[J]. Journal of Electronics & Information Technology, 2023, 45(1): 262-271. doi: 10.11999/JEIT211261

Service Function Chain Anomaly Detection Based on Distributed Generative Adversarial Network in Network Slicing Scenario

doi: 10.11999/JEIT211261
Funds:  The National Natural Science Foundation of China (62071078), The Science and Technology Research Program of Chongqing Municipal Education Commission (KJZD-M201800601), Sichuan and Chongqing Key R&D Projects (2021YFQ0053)
  • Received Date: 2021-11-12
  • Rev Recd Date: 2022-04-02
  • Available Online: 2022-04-17
  • Publish Date: 2023-01-17
  • For the problem of Service Function Chain (SFC) anomalies due to hardware and software anomalies in network slicing scenarios, a Distributed Generative Adversarial Network (GAN)-based Time Series anomaly detection model (DTSGAN) is proposed. First, to learn the characteristics of normal data in SFC, a distributed GAN architecture is proposed for anomaly detection of multiple Virtual Network Functions (VNFs) contained in SFC. Then, a feature extractor based on sliding window data is constructed for time series data, and the feature sequence is obtained by extracting two derived characteristics and eight statistical features of the data to mine the deep-level features. Finally, in order to learn and reconstruct data characteristics, a three-layer codec constructed by Time Convolutional Network (TCN) and Auto-Encoder (AE) is proposed as a distributed generator, which measures the difference between reconstructed data and input data by anomaly score function to detect the state of VNF, and then completes the anomaly detection of SFC. The effectiveness and stability of the proposed model are verified on the dataset Clearwater using four evaluation metrics: accuracy, precision, recall and F1 score.
  • loading
  • [1]
    ESCOLAR A M, CALERO J, and WANG Q. SliceNetVSwitch: Definition, design and implementation of 5G multi-tenant network slicing in software data paths[J]. IEEE Transactions on Network and Service Management, 2020, 17(4): 2212–2225. doi: 10.1109/TNSM.2020.3029653
    [2]
    CHERRARED S, IMADALI S, FABRE E, et al. A survey of fault management in network virtualization environments: Challenges and solutions[J]. IEEE Transactions on Network and Service Management, 2019, 16(4): 1537–1551. doi: 10.1109/TNSM.2019.2948420
    [3]
    SAUVANAUD C, LAZRI K, KAANICHE M, et al. Anomaly detection and root cause localization in virtual network functions[C]. 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), Ottawa, Canada, 2016: 196–206.
    [4]
    COTRONEO D, NATELLA R, and ROSIELLO S. A fault correlation approach to detect performance anomalies in virtual network function chains[C]. 2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE), Toulouse, France, 2017: 90–100.
    [5]
    BLAISE A, WONG S, and AGHVAMI A H. Virtual network function service chaining anomaly detection[C]. 2018 25th International Conference on Telecommunications (ICT), Saint-Malo, France, 2018: 411–415.
    [6]
    BASHAR M A and NAYAK R. TAnoGAN: Time series anomaly detection with generative adversarial networks[C]. 2020 IEEE Symposium Series on Computational Intelligence (SSCI), Canberra, Australia, 2020: 1778–1785.
    [7]
    DONG Weishan, YUAN Ting, YANG Kai, et al. Autoencoder regularized network for driving style representation learning[C]. Twenty-Sixth International Joint Conference on Artificial Intelligence, Melbourne, Australia, 2017: 1603–1609.
    [8]
    KINGMA D P and BA L J. Adam: A method for stochastic optimization[C]. International Conference on Learning Representations 2015, San Diego, USA, 2015.
    [9]
    JIANG Wenqian, HONG Yang, ZHOU Beitong, et al. A GAN-based anomaly detection approach for imbalanced industrial time series[J]. IEEE Access, 2019, 7: 143608–143619. doi: 10.1109/ACCESS.2019.2944689
    [10]
    BENDRISS J. Cognitive management of SLA in software-based networks[D]. [Ph. D. dissertation], Institut National des Télécommunications, 2018.
    [11]
    DONAHUE J, KRÄHENBÜHL P, and DARRELL T. Adversarial feature learning[J]. arXiv: 1605.09782, 2016.
    [12]
    RADFORD A, METZ L, and CHINTALA S. Unsupervised representation learning with deep convolutional generative adversarial networks[J]. arXiv: 1511.06434, 2015.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(8)  / Tables(3)

    Article Metrics

    Article views (744) PDF downloads(115) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return