An Approach of Collecting Performance Anomaly Dataset for NFV Infrastructure

  • Qingfeng Du
  • Yu HeEmail author
  • Tiandi Xie
  • Kanglin Yin
  • Juan Qiu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11336)


Network Function Virtualization (NFV) technology is widely used in industry and academia. Meanwhile, it brings a lot of challenges to the NFV applications’ reliability, such as anomaly detection, anomaly location, anomaly prediction and so on. All of these studies need a large number of anomaly data information. This paper designs a method for collecting anomaly data from Infrastructure as a Service (IaaS), and constructs an anomaly database for NFV applications. Three types of anomaly datasets are created for anomaly study, including datasets of workload with performance data, fault-load with performance data and violation of Service Level Agreement (SLA) with performance. In order to simulate an anomaly in a production environment better, we use Kubernetes to build a distributed environment, and to accelerate the occurrence of anomalies, a fault injection system is utilized. Our aim is to provide more valuable anomaly data for reliability research in NFV environments.


Anomaly database NFV Kubernetes IaaS Clearwater Performance monitoring Fault injection 


  1. 1.
    Liu, J., Jiang, Z., Kato, N., Akashi, O., Takahara, A.: Reliability evaluation for NFV deployment of future mobile broadband networks. IEEE Wirel. Commun. 23(3), 90–96 (2016)CrossRefGoogle Scholar
  2. 2.
    Pieters, M., Wiering, M.: Comparison of machine learning techniques for multi-label genre classification. In: Verheij, B., Wiering, M. (eds.) BNAIC 2017. CCIS, vol. 823, pp. 131–144. Springer, Cham (2018). Scholar
  3. 3.
    Sauvanaud, C., Lazri, K., Kaâniche, M., Kanoun, K.: Anomaly detection and root cause localization in virtual network functions. In: 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), pp. 196–206. IEEE (2016)Google Scholar
  4. 4.
    Bhardwaj, S., Jain, L., Jain, S.: Cloud computing: a study of infrastructure as a service (IAAS). Int. J. Eng. Inf. Technol. 2(1), 60–63 (2010)Google Scholar
  5. 5.
    Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, pp. 1–6. IEEE (2009)Google Scholar
  6. 6.
    Thill, M., Konen, W., Bäck, T.: Online anomaly detection on the webscope S5 dataset: a comparative study. In: 2017 Evolving and Adaptive Intelligent Systems (EAIS), pp. 1–8, May 2017Google Scholar
  7. 7.
    Natella, R., Cotroneo, D., Madeira, H.S.: Assessing dependability with software fault injection: a survey. ACM Comput. Surv. (CSUR) 48(3), 44 (2016)CrossRefGoogle Scholar
  8. 8.
    Delvaux, J., Verbauwhede, I.: Fault injection modeling attacks on 65 nm arbiter and RO sum PUFs via environmental changes. IEEE Trans. Circuits Syst. I: Regular Papers 61(6), 1701–1713 (2014)CrossRefGoogle Scholar
  9. 9.
    King, C.: Stress-ng (2018)Google Scholar
  10. 10.
    Wang, Y., Li, X.: Achieve high availability about point-single failures in openstack. In: 2015 4th International Conference on Computer Science and Network Technology (ICCSNT), vol. 01, pp. 45–48, December 2015Google Scholar
  11. 11.
    Aversa, R., Panza, N., Tasquier, L.: An agent-based platform for cloud applications performance monitoring. In: 2015 Ninth International Conference on Complex, Intelligent, and Software Intensive Systems, pp. 535–540, July 2015Google Scholar
  12. 12.
    Buczak, A.L., Guven, E.: A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Commun. Surv. Tutor. 18(2), 1153–1176 (2016). SecondquarterCrossRefGoogle Scholar
  13. 13.
    Iglesias, F., Zseby, T.: Analysis of network traffic features for anomaly detection. Mach. Learn. 101(1–3), 59–84 (2015)MathSciNetCrossRefGoogle Scholar
  14. 14.
    Kulkarni, A., Pino, Y., French, M., Mohsenin, T.: Real-time anomaly detection framework for many-core router through machine-learning techniques. ACM J. Emerg. Technol. Comput. Syst. (JETC) 13(1), 10 (2016)Google Scholar
  15. 15.
    Erfani, S.M., Rajasegarar, S., Karunasekera, S., Leckie, C.: High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning. Pattern Recogn. 58, 121–134 (2016)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Qingfeng Du
    • 1
    • 2
  • Yu He
    • 1
    • 2
    Email author
  • Tiandi Xie
    • 1
    • 2
  • Kanglin Yin
    • 1
    • 2
  • Juan Qiu
    • 1
    • 2
  1. 1.School of Software EngineeringTongji UniversityShanghaiChina
  2. 2.Software Engineering R&D CentreTongji UniversityShanghaiChina

Personalised recommendations