Skip to main content

Design of Reactive Systems for Control Network Traffic on the Kubernetes Platform

  • Chapter
  • First Online:
Intelligent Information and Database Systems: Recent Developments (ACIIDS 2019)

Part of the book series: Studies in Computational Intelligence ((SCI,volume 830))

Included in the following conference series:

  • 790 Accesses

Abstract

The container virtualization on the Kubernetes platform brings challenges that need to be addressed when a production or test load is running across the cluster. If applications running in containers are spread across the Kubernetes cluster, resource usage may be inefficient across the environment, which may result in overloading of individual nodes and inefficient load on others. One area where inefficiencies may occur is the load on network lines and network communications. This article discusses two algorithms and approaches that can be applied to the Kubernetes platform while helping to manage network traffic and lines across the cluster, which can make the cluster components more efficient. Both algorithms collect the monitored data from the cluster, but each one the data collected behaves differently, and data transformation and analysis takes place in another part of the system. The first algorithm is an agent-based algorithm that collects and performs basic data analysis and is capable of responding to detected information. The second is the algorithm that collects the data into the central element of the system and then analyzes it and, based on the information obtained, controls the individual components of the cluster.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Apache Mesos. http://mesos.apache.org/. Last Accessed 2 July 2018

  2. Chi, Y., Jiang, T., Li, X., Gao, C.: Design and implementation of cloud platform intrusion prevention system based on SDN. In: 2017 IEEE 2nd International Conference on Big Data Analysis (ICBDA), pp. 847–852. IEEE, Beijing, China (2017)

    Google Scholar 

  3. Datadog. https://www.datadoghq.com/. Last Accessed 2 July 2018

  4. Depren, O., Topallar, M., Anarim, E., Ciliz, M.: An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Exp. Syst. Appl. 29(4), 713–722 (2005)

    Article  Google Scholar 

  5. Docker - build, ship, and run any app, anywhere. https://www.docker.com/. Last Accessed 2 July 2018

  6. Google/cadvisor: analyzes resource usage and performance characteristics of running containers. https://github.com/google/cadvisor. Last Accessed 2 July 2018

  7. Grafana - the open platform for analytics and monitoring. https://grafana.com/. Last Accessed 2 July 2018

  8. Grossmann, M., Klug, C.: Monitoring container services at the network edge. In: 2017 Proceedings of the 29th International Teletraffic Congress (ITC 29), vol. 1, pp. 130–133. IEEE, Genoa, Italy (2017)

    Google Scholar 

  9. Horalek, J., Sobeslav, V.: Analysis of the use of system resources for cloud data security. In: 15th International Conference on Mobile Web and Intelligent Information Systems, MobiWis 2018, Barcelona. Lecture Notes in Computer Science, vol. 10995, pp 101–111. Springer, Berlin (2018)

    Google Scholar 

  10. InfluxData (InfluxDB) - time series database monitoring and analytics. https://www.influxdata.com/. Last Accessed 2 July 2018

  11. Komarek, A., Pavlik, J., Mercl, L., Sobeslav, V.: Hardware layer of ambient intelligence environment implementation. In: Computational Collective Intelligence. ICCCI 2017. Lecture Notes in Computer Science, vol. 10449, pp. 325–334. Springer, Nicosia (2017)

    Google Scholar 

  12. kubernetes/heapster: compute resource usage analysis and monitoring of container clusters. https://github.com/kubernetes/heapster. Last Accessed 2 July 2018

  13. Kubernetes - production-grade container orchestration. https://www.kubernetes.io/. Last Accessed 2 July 2018

  14. Lin, S.-W., Ying, K.-C., Lee, C.-Y., Lee, Z.-J.: An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection. Appl. Soft Comput. 12(10), 99–110 (2016)

    Google Scholar 

  15. LogicMonitor: SaaS-based performance monitoring platform. https://www.logicmonitor.com/. Last Accessed 1 April 2018

  16. Mercl, L., Pavlik, J.: The comparison of container orchestrators. In: Third International Congress on Information and Communication Technology, ICICT 2018, London. Advances in Intelligent Systems and Computing, vol. 797, pp. 677–685. Springer, Singapore (2018)

    Google Scholar 

  17. Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36(1), 42–157 (2013)

    Article  Google Scholar 

  18. Nagios - The industry standard In IT infrastructure monitoring. https://nagios.org/, Last Accessed 1 April 2018

  19. New Relic: digital performance monitoring and management. https://newrelic.com/. Last Accessed 2 July 2018

  20. OpenNMS. https://www.opennms.org/. Last Accessed 2 July 2018

  21. Prometheus - monitoring system; time series database. https://prometheus.io/. Last Accessed 2 July 2018

  22. PRTG network monitor. https://www.paessler.com/prtg. Last Accessed 2 July 2018

  23. Roshan, S., Miche, Y., Akusok, A., Lendasse, A.: Adaptive and online network intrusion detection system using clustering and extreme learning machines. J. Frankl. Inst.-Eng. Appl. Math. 4, 1752–1779 (2018)

    Article  MathSciNet  Google Scholar 

  24. Sohal, A.S., Sandhu, R., Sood, S.K., Chang, V.: A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput. Secur. 74, 340–354 (2018)

    Article  Google Scholar 

  25. Sysdig: kubernetes and docker monitoring, container security and more. https://www.sysdig.com/. Last Accessed 2 July 2018

  26. Tsai, P.-H., Hong, H.-J., Cheng, A.-C., Hsu, C.-H.: Distributed analytics in fog computing platforms using tensorflow and kubernetes. In: 19th Asia-Pacific Network Operations and Management Symposium: Managing a World of Things, APNOMS 2017, pp. 145–150. IEEE, Seoul; South Korea (2017)

    Google Scholar 

  27. Vieira, K., Schulter, A., Westphall, C.B., Westphall, C.M.: Intrusion detection for grid and cloud computing. IT Prof. 12(4), 38–43 (2010)

    Article  Google Scholar 

  28. Weave Scopu. https://www.weave.works/. Last Accessed 2 July 2018

  29. Zabbix - The enterprise-class open source network monitoring solution. https://www.zabbix.com/. Last Accessed 2 July 2018

  30. Zhang, Y., Wang, L., Sun, W., Green, R.C., Alam, M.: Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans. Smart Grid 2(4), 796–808 (2011)

    Article  Google Scholar 

Download references

Acknowledgements

This work and the contribution were supported by a Specific Research Project, Faculty of Informatics and Management, University of Hradec Kralove, Czech Republic.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lubos Mercl .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Mercl, L., Sobeslav, V., Mikulecky, P. (2020). Design of Reactive Systems for Control Network Traffic on the Kubernetes Platform. In: Huk, M., Maleszka, M., Szczerbicki, E. (eds) Intelligent Information and Database Systems: Recent Developments. ACIIDS 2019. Studies in Computational Intelligence, vol 830. Springer, Cham. https://doi.org/10.1007/978-3-030-14132-5_33

Download citation

Publish with us

Policies and ethics