Show simple item record

dc.contributor.authorJacob, Stephen
dc.contributor.authorQiao, Yuansong
dc.contributor.authorYe, Yuhang
dc.contributor.authorLee, Brian
dc.date.accessioned2022-05-24T12:10:44Z
dc.date.available2022-05-24T12:10:44Z
dc.date.copyright2022
dc.date.issued2022-04-22
dc.identifier.citationJacob, S., Qiao, Y., Ye, Y., Lee, B. (2022). Anomalous distributed traffic: detecting cyber security attacks amongst microservices using graph convolutional networks. Computers & Security. 118. 102728.https://doi.org/10.1016/j.cose.2022.102728en_US
dc.identifier.issn0167-4048
dc.identifier.urihttp://research.thea.ie/handle/20.500.12065/3991
dc.description.abstractCurrently, microservices are trending as the most popular software application design architecture. Software organisations are also being targeted by more cyber-attacks every day and newer security measures are in high demand. One available measure is the application of anomaly detection, which is defined as the discovery of irregular or unusual activity that occurs to a greater or lesser degree than normal occurrences in a data series. In this paper, we continue existing work where various real-world cyber-attacks are executed against a running microservices application, and the application traffic is logged and returned in the form of distributed traces. A Diffusion Convolutional Recurrent Neural Network is used to model the set of distributed traces and learn the spatial and temporal dependencies of the application traffic. Subsequently, the model is used to make predictions for ongoing microservice activity and threshold-based anomaly detection is applied to detect irregular microservice activity indicating the presence of seeded cyber security attacks, or anomalies. The cyber-attacks used to evaluate this approach include a brute force attack, a batch registration of bot accounts and a distributed denial of service attack.en_US
dc.language.isoengen_US
dc.publisherElsevieren_US
dc.relation.ispartofComputers & Securityen_US
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectCyber securityen_US
dc.subjectMicroservicesen_US
dc.subjectDistributed tracingen_US
dc.subjectAnomaly detectionen_US
dc.subjectGraph convolutional networken_US
dc.subjectTraffic forecastingen_US
dc.titleAnomalous distributed traffic: detecting cyber security attacks amongst microservices using graph convolutional networksen_US
dc.typeinfo:eu-repo/semantics/articleen_US
dc.contributor.affiliationTechnological University of the Shannon Midlands Midwesten_US
dc.contributor.sponsorf Athlone Institute of Technology under its Presidents Seed Fund (2021) and Science Foundation Ireland (SFI)en_US
dc.description.peerreviewyesen_US
dc.identifier.doi10.1016/j.cose.2022.102728en_US
dc.identifier.orcidhttps://orcid.org/ 0000-0003-2297-4343en_US
dc.identifier.orcidhttps://orcid.org/ 0000-0002-1543-1589en_US
dc.identifier.orcidhttps://orcid.org/ 0000-0003-4608-1451en_US
dc.identifier.orcidhttps://orcid.org/ 0000-0002-8475-4074en_US
dc.identifier.volume118en_US
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessen_US
dc.subject.departmentSoftware Research Institute TUS:MMen_US
dc.type.versioninfo:eu-repo/semantics/publishedVersionen_US
dc.relation.projectidSFI 16/RC/3918en_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivatives 4.0 International
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivatives 4.0 International