to detect a password guessing cyber security attack.
Distributed tracing is typically used to detect perfor-
mance issues in microservices applications but to the
best of our knowledge, distributed tracing has not pre-
viously been used to detect cyber security attacks.
In particular, we detected a simulated password
guess attack against our application using the gener-
ated distributed traces. Due to the fact that a password
guessing attack can only be detected by examining a
number of requests the technique can be categorized
as group-based anomaly detection. We calculated the
distribution of normal application request traffic, and
compared this distribution to that of the anomalous
data. The frequency distribution for the password at-
tack is further from the normal data than the normal
validation data sets and using the mean and standard
deviation of frequency distance of the validating data
sets, the distance from normal data is greater than two
standard deviations above the mean. This value is a
candidate for an anomaly detection threshold.
We also determined that it is not feasible to de-
tect certain types of cyber-security attacks against a
microservices-based application using this approach.
We argued that it is not possible to detect a type of
NoSQL Injection attack which results in multiple ob-
jects being returned from a NoSQL database instead
of a single object. This would not result in any sub-
stantial changes to the distributed logging data and
hence would not be detectable.
6 FURTHER WORK
At the moment, our work is preliminary and only rep-
resents the behaviour of a microservice application
using sequences of microservice calls. We plan to
use call graphs instead of sequences of calls to rep-
resent behaviour. Call graphs would be comprised of
nodes which correspond to microservices, and edges
corresponding to the calls between the microservices.
Graph-related approaches have previously been used
to model microservices (Aubet et al., 2018) and de-
tect anomalous performance issues in such applica-
tions (Le et al., 2011).
The Euclidean distance metric in Eq. 3 takes no
account of the order in which sequences occur. To ad-
dress this limitation, we intend to train a neural net-
work to learn the normal behaviour of the sequences
of call graphs. A Long Short Term Memory (LSTM)
deep learning network model is suited to modeling se-
quential data and identifying long-term dependencies
in the sequences. Our LSTM model would be used
to assign a probability value to each sequence of call
graphs. An anomaly would be triggered if a sequence
of call graphs was found to have a lower probability
than most sequences. Recent work has demonstrated
that LSTM neural networks can learn the behaviour of
time-series data and subsequently detect anomalous
data (Malhotra et al., 2015) (Nedelkoski et al., 2019).
Finally, we will also examine the possibility of strate-
gic attacks designed to circumvent the anomaly detec-
tion mechanism and examine ways to prevent these
types of attacks.
ACKNOWLEDGEMENTS
This publication has emanated from research con-
ducted with the financial support of Athlone Insti-
tute of Technology under its President’s Seed Fund
(2020) and Science Foundation Ireland (SFI) under
Grant Number SFI 16/RC/3918, co-funded by the Eu-
ropean Regional Development Fund.
REFERENCES
Aubet, F.-X., Pahl, M.-O., Liebald, S., and Norouzian,
M. R. (2018). Graph-based anomaly detection for iot
microservices. Measurements, 120(140):160.
Belmar, C. (2019). A nosql injection primer (with mongo).
Brostoff, S. and Sasse, M. A. (2003). “ten strikes and you’re
out”: Increasing the number of login attempts can im-
prove password usability. Human-Computer Intera-
tion, Security.
Chandola, V., Banerjee, A., and Kumar, V. (2009).
Anomaly detection: A survey. ACM computing sur-
veys (CSUR), 41(3):1–58.
Dhanabal, L. and Shantharajah, S. (2015). A study on
nsl-kdd dataset for intrusion detection system based
on classification algorithms. International Journal of
Advanced Research in Computer and Communication
Engineering, 4(6):446–452.
Gan, Y. and Delimitrou, C. (2018). The architectural impli-
cations of cloud microservices. IEEE Computer Ar-
chitecture Letters, 17(2):155–158.
Gan, Y., Zhang, Y., Cheng, D., Shetty, A., Rathi, P., Katarki,
N., Bruno, A., Hu, J., Ritchken, B., Jackson, B., et al.
(2019a). An open-source benchmark suite for mi-
croservices and their hardware-software implications
for cloud & edge systems. In Proceedings of the
Twenty-Fourth International Conference on Architec-
tural Support for Programming Languages and Oper-
ating Systems, pages 3–18.
Gan, Y., Zhang, Y., Hu, K., Cheng, D., He, Y., Pancholi, M.,
and Delimitrou, C. (2019b). Leveraging deep learn-
ing to improve performance predictability in cloud mi-
croservices with seer. ACM SIGOPS Operating Sys-
tems Review, 53(1):34–39.
Gan, Y., Zhang, Y., Hu, K., Cheng, D., He, Y., Pancholi,
M., and Delimitrou, C. (2019c). Seer: Leveraging big
ICISSP 2021 - 7th International Conference on Information Systems Security and Privacy
594