Distributed Online Anomaly Detection for Virtualized Network Slicing Environment

by   Weili Wang, et al.

As the network slicing is one of the critical enablers in communication networks, one anomalous physical node (PN) or physical link (PL) in substrate networks that carries multiple virtual network elements can cause significant performance degradation of multiple network slices. To recover the substrate networks from anomaly within a short time, rapid and accurate identification of whether or not the anomaly exists in PNs and PLs is vital. Online anomaly detection methods that can analyze system data in real-time are preferred. Besides, as virtual nodes and links mapped to PNs and PLs are scattered in multiple slices, the distributed detection modes are required to adapt to the virtualized environment. According to those requirements, in this paper, we first propose a distributed online PN anomaly detection algorithm based on a decentralized one-class support vector machine (OCSVM), which is realized through analyzing real-time measurements of virtual nodes mapped to PNs in a distributed manner. Specifically, to decouple the OCSVM objective function, we transform the original problem to a group of decentralized quadratic programming problems by introducing the consensus constraints. The alternating direction method of multipliers is adopted to achieve the solution for the distributed online PN anomaly detection. Next, by utilizing the correlation of measurements between neighbor virtual nodes, another distributed online PL anomaly detection algorithm based on the canonical correlation analysis is proposed. The network only needs to store covariance matrices and mean vectors of current data to calculate the canonical correlation vectors for real-time PL anomaly analysis. The simulation results on both synthetic and real-world network datasets show the effectiveness and robustness of the proposed distributed online anomaly detection algorithms.


page 1

page 4


Network Anomaly Detection: A Survey and Comparative Analysis of Stochastic and Deterministic Methods

We present five methods to the problem of network anomaly detection. The...

Real-Time Outlier Detection with Dynamic Process Limits

Anomaly detection methods are part of the systems where rare events may ...

QANet: Tensor Decomposition Approach for Query-based Anomaly Detection in Heterogeneous Information Networks

Complex networks have now become integral parts of modern information in...

Learning a Common Substructure of Multiple Graphical Gaussian Models

Properties of data are frequently seen to vary depending on the sampled ...

Anomaly Detection in Vertically Partitioned Data by Distributed Core Vector Machines

Observations of physical processes suffer from instrument malfunction an...

Clustering-based Anomaly Detection for microservices

Anomaly detection is an important step in the management and monitoring ...

A Hierarchical Approach to Conditional Random Fields for System Anomaly Detection

Anomaly detection to recognize unusual events in large scale systems in ...

Please sign up or login with your details

Forgot password? Click here to reset