Deep Learning-Based Spatial-Temporal Graph Architectures for Resilient Microservice Orchestration and Anomalous Traffic Detection In Cloud-Native Environments
Abstract
The rapid transition from monolithic software architectures to containerized microservices has introduced unprecedented complexities in network traffic management and security monitoring. As these systems scale, they become increasingly vulnerable to sophisticated Distributed Denial of Service (DDoS) attacks, cross-site scripting (XSS), and brute-force intrusions. This research explores the integration of Graph Neural Networks (GNNs) and Diffusion Convolutional Recurrent Neural Networks (DCRNNs) to model the intricate spatial-temporal dependencies inherent in microservice communication graphs. By treating service interactions as dynamic graph structures, we develop a robust framework for anomaly detection and traffic forecasting. The methodology leverages horizontal offloading mechanisms and near-memory reconfigurable network interface cards to optimize Remote Procedure Calls (RPCs) while maintaining security-as-a-service protocols. Our findings indicate that spatial-temporal correlation models significantly outperform traditional machine learning approaches in detecting low-volume HTTP floods and bot-driven attacks. This article provides an extensive theoretical elaboration on the convergence of deep learning and cloud-native security, offering a comprehensive taxonomy of modern cyber-threats and a roadmap for self-adaptive microservice infrastructures.
Keywords
Microservices, Graph Neural Networks, Anomaly Detection
References
- Imperva. What does DDoS mean? | distributed denial of service explained | imperva. 2021.
- Kung-Hsiang H.T.D.S.. A gentle introduction to graph neural networks (basics, deepwalk, and graphsage). 2019.
- Lazarev N., Adit N., Xiang S., Zhang Z., Delimitrou C. Dagger: towards efficient rpcs in cloud microservices with near-memory reconfigurable nics. IEEE Comput. Archit. Lett., 19 (2) (2020), pp. 134-138.
- Le D.Q., Jeong T., Roman H.E., J.W.K. Hong. Traffic dispersion graph based anomaly detection. Proceedings of the Second Symposium on Information and Communication Technology (2011), pp. 36-41.
- Lee B., Jacob S.. [dataset] | gitlab | stephenj - repository. 2019.
- Lee J., Bae H., Yoon S. Anomaly detection by learning dynamics from a graph. IEEE Access, 8 (2020), pp. 64356-64365.
- Li Y., Yu R., Shahabi C., Liu Y. Diffusion convolutional recurrent neural network: data-driven traffic forecasting. arXiv preprint arXiv:170701926 (2017).
- Lv Y., Duan Y., Kang W., Li Z., Wang F.Y. Traffic flow prediction with big data: a deep learning approach. IEEE Trans. Intell. Transp. Syst., 16 (2) (2014), pp. 865-873.
- Ma X., Dai Z., He Z., Ma J., Wang Y., Wang Y. Learning traffic as images: a deep convolutional neural network for large-scale transportation network speed prediction. Sensors, 17 (4) (2017), p. 818.
- Mallick T., Balaprakash P., Rask E., Macfarlane J. Graph-partitioning-based diffusion convolutional recurrent neural network for large-scale traffic forecasting. Transp. Res. Rec., 2674 (9) (2020), pp. 473-488.
- Mallick T., Balaprakash P., Rask E., Macfarlane J. Transfer learning with graph neural networks for short-term highway traffic forecasting. 2020 25th International Conference on Pattern Recognition (ICPR), IEEE (2021), pp. 10367-10374.
- Pathak A. An analysis of various tools, methods and systems to generate fake accounts for social media. Northeastern University Boston, Massachusetts. 2014.
- Polato M., Sperduti A., Burattin A., de Leoni M. Time and activity sequence prediction of business process instances. Computing, 100 (9) (2018), pp. 1005-1031.
- PortSwigger. What is cross-site scripting (XSS) and how to prevent it? | web security academy.
- Radware. Http flood (http ddos attack). 2021.
- Revuelto S., Socha K., Meintanis S., 2017. DDoS overview and response guide.
- Sciences S.. What are bot attacks? Bot mitigation for web apps & APIs.
- Slee M., Agarwal A., Kwiatkowski M. Thrift: scalable cross-language services implementation. Facebook white paper, 5 (8) (2007), p. 127.
- Somu N., Daw N., Bellur U., Kulkarni P. Panopticon: A comprehensive benchmarking tool for serverless applications. 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS), IEEE (2020), pp. 144-151.
- Sun Y., Nanda S., Jaeger T. Security-as-a-service for microservices-based cloud applications. 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), IEEE (2015), pp. 50-57.
- Tax N., Verenich I., La Rosa M., Dumas M. Predictive business process monitoring with LSTM neural networks. International Conference on Advanced Information Systems Engineering, Springer (2017), pp. 477-492.
- Varonis. What is a brute force attack?
- Wu Y., Tan H. Short-term traffic flow forecasting with spatial-temporal correlation in a hybrid deep learning framework. arXiv preprint arXiv:161201022 (2016).
- Wu Z., Pan S., Chen F., Long G., Zhang C., Philip S.Y. A comprehensive survey on graph neural networks. IEEE Trans. Neural Netw. Learn. Syst., 32 (1) (2020), pp. 4-24.
- Xu H., Caramanis C., Mannor S. Robustness and regularization of support vector machines. J. Mach. Learn. Res., 10 (7) (2009).
- Mostafa, M. A. A. and Khater, A. M. (2019). Horizontal Offloading Mechanism for IoT Application in Fog Computing Using Microservices Case Study: Traffic Management System. In 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), pages 640–647.
- Muccini, H., Sharaf, M., and Weyns, D. (2016). Selfadaptation for cyber-physical systems: a systematic literature review. In Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. Association for Computing Machinery.
- Nabi, S. and Ahmed, M. (2021). OG-RADL: overall performance-based resource-aware dynamic loadbalancer for deadline constrained Cloud tasks. J Supercomput.
- Neves, F., Vilaca, R., and Pereira, J. (2020). Black-box inter-application traffic monitoring for adaptive container placement. In Proceedings of the 35th Annual ACM Symposium on Applied Computing, SAC ’20, pages 259–266, New York, NY, USA. Association for Computing Machinery.
- Nguyen, P. and Nahrstedt, K. (2017). MONAD: SelfAdaptive Micro-Service Infrastructure for Heterogeneous Scientific Workflows. In 2017 IEEE International Conference on Autonomic Computing (ICAC), pages 187–196.
- K. S. Hebbar, “MACHINE LEARNING-ASSISTED SERVICE BOUNDARY DETECTION FOR MODULARIZING LEGACY SYSTEMS,” International Journal of Applied Engineering & Technology, vol. 04,no.02, pp. 401-414, Sep. 2022, https://romanpub.com/resources/ijaet-v4-2-2022-48.pdf