{"id":"https://openalex.org/W4416200027","doi":"https://doi.org/10.1145/3733812.3765535","title":"Lightweight Service Mesh for Intrusion Detection using KD-CNN in Cloud-Native Environments","display_name":"Lightweight Service Mesh for Intrusion Detection using KD-CNN in Cloud-Native Environments","publication_year":2025,"publication_date":"2025-10-13","ids":{"openalex":"https://openalex.org/W4416200027","doi":"https://doi.org/10.1145/3733812.3765535"},"language":null,"primary_location":{"id":"doi:10.1145/3733812.3765535","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3733812.3765535","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3733812.3765535","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 Cloud Computing Security Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3733812.3765535","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5117539778","display_name":"Geon-Woo Yoon","orcid":"https://orcid.org/0009-0006-6092-1217"},"institutions":[{"id":"https://openalex.org/I4921948","display_name":"Pusan National University","ror":"https://ror.org/01an57a31","country_code":"KR","type":"education","lineage":["https://openalex.org/I4921948"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Geonwoo Yoon","raw_affiliation_strings":["Pusan National University, Busan, Republic of Korea"],"raw_orcid":"https://orcid.org/0009-0006-6092-1217","affiliations":[{"raw_affiliation_string":"Pusan National University, Busan, Republic of Korea","institution_ids":["https://openalex.org/I4921948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076607185","display_name":"Jae-Seok Kim","orcid":"https://orcid.org/0000-0001-7728-2278"},"institutions":[{"id":"https://openalex.org/I4921948","display_name":"Pusan National University","ror":"https://ror.org/01an57a31","country_code":"KR","type":"education","lineage":["https://openalex.org/I4921948"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jae-Seok Kim","raw_affiliation_strings":["Pusan National University, Busan, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0001-7728-2278","affiliations":[{"raw_affiliation_string":"Pusan National University, Busan, Republic of Korea","institution_ids":["https://openalex.org/I4921948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090008217","display_name":"S.H. Kim","orcid":"https://orcid.org/0009-0004-5089-4580"},"institutions":[{"id":"https://openalex.org/I4921948","display_name":"Pusan National University","ror":"https://ror.org/01an57a31","country_code":"KR","type":"education","lineage":["https://openalex.org/I4921948"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seunghyuk Kim","raw_affiliation_strings":["Pusan National University, Busan, Republic of Korea"],"raw_orcid":"https://orcid.org/0009-0004-5089-4580","affiliations":[{"raw_affiliation_string":"Pusan National University, Busan, Republic of Korea","institution_ids":["https://openalex.org/I4921948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001982221","display_name":"Jaeyoung Jeong","orcid":"https://orcid.org/0009-0007-7809-5686"},"institutions":[{"id":"https://openalex.org/I4921948","display_name":"Pusan National University","ror":"https://ror.org/01an57a31","country_code":"KR","type":"education","lineage":["https://openalex.org/I4921948"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jaeyoung Jeong","raw_affiliation_strings":["Pusan National University, Busan, Republic of Korea"],"raw_orcid":"https://orcid.org/0009-0007-7809-5686","affiliations":[{"raw_affiliation_string":"Pusan National University, Busan, Republic of Korea","institution_ids":["https://openalex.org/I4921948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014697960","display_name":"Millati Pratiwi","orcid":"https://orcid.org/0009-0004-8893-375X"},"institutions":[{"id":"https://openalex.org/I4921948","display_name":"Pusan National University","ror":"https://ror.org/01an57a31","country_code":"KR","type":"education","lineage":["https://openalex.org/I4921948"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Millati Pratiwi","raw_affiliation_strings":["Pusan National University, Busan, Republic of Korea"],"raw_orcid":"https://orcid.org/0009-0004-8893-375X","affiliations":[{"raw_affiliation_string":"Pusan National University, Busan, Republic of Korea","institution_ids":["https://openalex.org/I4921948"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068130953","display_name":"Yoon-Ho Choi","orcid":"https://orcid.org/0000-0002-3556-5082"},"institutions":[{"id":"https://openalex.org/I4921948","display_name":"Pusan National University","ror":"https://ror.org/01an57a31","country_code":"KR","type":"education","lineage":["https://openalex.org/I4921948"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Yoon-Ho Choi","raw_affiliation_strings":["Pusan National University, Busan, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0002-3556-5082","affiliations":[{"raw_affiliation_string":"Pusan National University, Busan, Republic of Korea","institution_ids":["https://openalex.org/I4921948"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5117539778"],"corresponding_institution_ids":["https://openalex.org/I4921948"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.37862837,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"50","last_page":"62"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.3666999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.3666999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.35370001196861267,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.18140000104904175,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6603000164031982},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6464999914169312},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.6165000200271606},{"id":"https://openalex.org/keywords/polygon-mesh","display_name":"Polygon mesh","score":0.5444999933242798},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.527999997138977},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5216000080108643},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.508400022983551},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.3262999951839447}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.791100025177002},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6603000164031982},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6464999914169312},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.6165000200271606},{"id":"https://openalex.org/C31487907","wikidata":"https://www.wikidata.org/wiki/Q1154597","display_name":"Polygon mesh","level":2,"score":0.5444999933242798},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.527999997138977},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5216000080108643},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.508400022983551},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.41440001130104065},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3774999976158142},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34310001134872437},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.3262999951839447},{"id":"https://openalex.org/C2778505942","wikidata":"https://www.wikidata.org/wiki/Q18344624","display_name":"Microservices","level":3,"score":0.3208000063896179},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31709998846054077},{"id":"https://openalex.org/C2781018962","wikidata":"https://www.wikidata.org/wiki/Q5164884","display_name":"Container (type theory)","level":2,"score":0.3109999895095825},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.298799991607666},{"id":"https://openalex.org/C110698143","wikidata":"https://www.wikidata.org/wiki/Q651389","display_name":"Patrolling","level":2,"score":0.29660001397132874},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.2957000136375427},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.2921000123023987},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2815000116825104},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.27950000762939453},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.27549999952316284},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.26840001344680786},{"id":"https://openalex.org/C68859911","wikidata":"https://www.wikidata.org/wiki/Q1503724","display_name":"Pattern matching","level":2,"score":0.2680000066757202},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.2612999975681305},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.25780001282691956}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3733812.3765535","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3733812.3765535","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3733812.3765535","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 Cloud Computing Security Workshop","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3733812.3765535","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3733812.3765535","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3733812.3765535","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 Cloud Computing Security Workshop","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G205307225","display_name":null,"funder_award_id":"IITP-2025-RS-2023-00259967","funder_id":"https://openalex.org/F4320328359","funder_display_name":"Ministry of Science and ICT, South Korea"},{"id":"https://openalex.org/G3684178173","display_name":null,"funder_award_id":"RS-2023-00259967","funder_id":"https://openalex.org/F4320328359","funder_display_name":"Ministry of Science and ICT, South Korea"},{"id":"https://openalex.org/G3981516922","display_name":null,"funder_award_id":"RS-2023-00217689","funder_id":"https://openalex.org/F4320328359","funder_display_name":"Ministry of Science and ICT, South Korea"},{"id":"https://openalex.org/G8101136816","display_name":null,"funder_award_id":"RS-2023-00217689","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"}],"funders":[{"id":"https://openalex.org/F4320320671","display_name":"National Research Foundation","ror":"https://ror.org/05s0g1g46"},{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"},{"id":"https://openalex.org/F4320324891","display_name":"Iran Telecommunication Research Center","ror":"https://ror.org/01a3g2z22"},{"id":"https://openalex.org/F4320328359","display_name":"Ministry of Science and ICT, South Korea","ror":"https://ror.org/01wpjm123"},{"id":"https://openalex.org/F4320335489","display_name":"Institute for Information and Communications Technology Promotion","ror":"https://ror.org/01g0hqq23"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416200027.pdf"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W2293837963","https://openalex.org/W2296509296","https://openalex.org/W2507651908","https://openalex.org/W2520233939","https://openalex.org/W2762776925","https://openalex.org/W2789828921","https://openalex.org/W2900293028","https://openalex.org/W2944096373","https://openalex.org/W2959392253","https://openalex.org/W3048836559","https://openalex.org/W3093410479","https://openalex.org/W3094094693","https://openalex.org/W3128286744","https://openalex.org/W3145680685","https://openalex.org/W3159911466","https://openalex.org/W3204332199","https://openalex.org/W3205985117","https://openalex.org/W4206834552","https://openalex.org/W4212859154","https://openalex.org/W4285293775","https://openalex.org/W4311462070","https://openalex.org/W4315480688","https://openalex.org/W4362703719","https://openalex.org/W4379652892","https://openalex.org/W4386275779","https://openalex.org/W4391557953","https://openalex.org/W4392153424","https://openalex.org/W4394939094","https://openalex.org/W4401929209","https://openalex.org/W4402156839"],"related_works":[],"abstract_inverted_index":{"Cloud-native":[0],"environments":[1],"are":[2],"increasingly":[3],"vulnerable":[4,13],"to":[5,35,41,143],"lateral":[6,116],"movement":[7,117],"attacks":[8],"that":[9,68,122],"exploit":[10],"misconfigured":[11],"or":[12],"containers.":[14],"Traditional":[15],"service":[16,51],"meshes":[17],"rely":[18],"on":[19],"static":[20],"configurations":[21],"and":[22,33,71,113,162],"lack":[23],"runtime":[24],"adaptability,":[25],"while":[26,135],"conventional":[27],"NIDS":[28],"operate":[29],"globally,":[30],"introducing":[31],"latency":[32,140,158],"failing":[34],"reflect":[36],"the":[37,95,123,154],"behavioral":[38],"patterns":[39],"specific":[40],"containerized":[42],"services.":[43],"To":[44],"address":[45],"these":[46],"limitations,":[47],"we":[48],"propose":[49],"a":[50,65,77,86,92],"mesh":[52],"with":[53,64,91,145,151],"integrated":[54],"NIDS,":[55],"implemented":[56],"in":[57,132,148,172],"Kubernetes.":[58],"Each":[59],"application":[60],"container":[61],"is":[62],"paired":[63],"lightweight":[66,78],"proxy":[67],"intercepts":[69],"traffic":[70],"performs":[72],"real-time":[73],"anomaly":[74],"detection":[75,100,133,152],"using":[76,109],"CNN":[79],"encoder":[80],"obtained":[81],"through":[82],"knowledge":[83,136],"distillation":[84,137],"from":[85,101],"self-supervised":[87],"teacher":[88],"model.":[89],"Combined":[90],"One-Class":[93],"SVM,":[94],"system":[96,155],"enables":[97],"unsupervised,":[98],"service-specific":[99],"unlabeled":[102],"benign":[103],"traffic.":[104],"We":[105],"evaluate":[106],"our":[107],"approach":[108],"real-world":[110],"microservice":[111],"deployments":[112],"MITRE":[114],"ATT&CK-based":[115],"scenarios.":[118],"Experimental":[119],"results":[120],"show":[121],"proposed":[124],"KD-CNN+OCSVM":[125],"model":[126],"outperforms":[127],"existing":[128],"deep":[129],"learning":[130],"methods":[131],"accuracy,":[134],"reduces":[138],"inference":[139],"by":[141],"up":[142],"88.74%":[144],"minimal":[146],"degradation":[147],"performance.":[149],"Even":[150],"enabled,":[153],"maintains":[156],"end-to-end":[157],"below":[159],"14":[160],"ms":[161],"throughput":[163],"above":[164],"600":[165],"req/s,":[166],"indicating":[167],"its":[168],"suitability":[169],"for":[170],"deployment":[171],"resource-constrained":[173],"cloud-native":[174],"environments.":[175]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-11-14T00:00:00"}
