{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T08:00:16Z","timestamp":1776931216829,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100014188","name":"Ministry of Science and ICT, South Korea","doi-asserted-by":"publisher","award":["IITP-2025-RS-2023-00259967"],"award-info":[{"award-number":["IITP-2025-RS-2023-00259967"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["RS-2023-00217689"],"award-info":[{"award-number":["RS-2023-00217689"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,13]]},"DOI":"10.1145\/3733812.3765535","type":"proceedings-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T10:54:48Z","timestamp":1763117688000},"page":"50-62","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Lightweight Service Mesh for Intrusion Detection using KD-CNN in Cloud-Native Environments"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-6092-1217","authenticated-orcid":false,"given":"Geonwoo","family":"Yoon","sequence":"first","affiliation":[{"name":"Pusan National University, Busan, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7728-2278","authenticated-orcid":false,"given":"Jae-Seok","family":"Kim","sequence":"additional","affiliation":[{"name":"Pusan National University, Busan, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5089-4580","authenticated-orcid":false,"given":"Seunghyuk","family":"Kim","sequence":"additional","affiliation":[{"name":"Pusan National University, Busan, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7809-5686","authenticated-orcid":false,"given":"Jaeyoung","family":"Jeong","sequence":"additional","affiliation":[{"name":"Pusan National University, Busan, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8893-375X","authenticated-orcid":false,"given":"Millati","family":"Pratiwi","sequence":"additional","affiliation":[{"name":"Pusan National University, Busan, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3556-5082","authenticated-orcid":false,"given":"Yoon-Ho","family":"Choi","sequence":"additional","affiliation":[{"name":"Pusan National University, Busan, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2025,11,14]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Amira Abdallah Aysha Alkaabi Ghaya Alameri Saida\u00a0Hafsa Rafique Nura\u00a0Shifa Musa and Thangavel Murugan. 2024. Cloud network anomaly detection using machine and deep learning techniques-recent research advancements. IEEE Access (2024).","DOI":"10.1109\/ACCESS.2024.3390844"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Zeeshan Ahmad Adnan Shahid\u00a0Khan Cheah Wai\u00a0Shiang Johari Abdullah and Farhan Ahmad. 2021. Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies 32 1 (2021) e4150.","DOI":"10.1002\/ett.4150"},{"key":"e_1_3_3_1_4_2","unstructured":"Jinwon An and Sungzoon Cho. 2015. Variational autoencoder based anomaly detection using reconstruction probability. Special lecture on IE 2 1 (2015) 1\u201318."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Hanaa Attou Azidine Guezzaz Said Benkirane Mourade Azrour and Yousef Farhaoui. 2023. Cloud-based intrusion detection approach using machine learning techniques. Big Data Mining and Analytics (2023).","DOI":"10.26599\/BDMA.2022.9020038"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Arvind\u00a0Kumar Bhardwaj PK Dutta and Pradeep Chintale. 2024. AI-Powered Anomaly Detection for Kubernetes Security: A Systematic Approach to Identifying Threats. Babylonian Journal of Machine Learning 2024 (2024) 142\u2013148.","DOI":"10.58496\/BJML\/2024\/014"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818034"},{"key":"e_1_3_3_1_8_2","first-page":"1597","volume-title":"International conference on machine learning","author":"Chen Ting","year":"2020","unstructured":"Ting Chen, Simon Kornblith, Mohammad Norouzi, and Geoffrey Hinton. 2020. A simple framework for contrastive learning of visual representations. In International conference on machine learning. PmLR, 1597\u20131607."},{"key":"e_1_3_3_1_9_2","volume-title":"2000 USENIX Annual Technical Conference (USENIX ATC 00)","author":"Cho Kenjiro","year":"2000","unstructured":"Kenjiro Cho, Koushirou Mitsuya, and Akira Kato. 2000. Traffic data repository at the { WIDE} project. In 2000 USENIX Annual Technical Conference (USENIX ATC 00)."},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Dylan Chou and Meng Jiang. 2021. A survey on data-driven network intrusion detection. ACM Computing Surveys (CSUR) 54 9 (2021) 1\u201336.","DOI":"10.1145\/3472753"},{"key":"e_1_3_3_1_11_2","unstructured":"Google Cloud. 2025. Cloud Threat Horizons Report. https:\/\/cloud.google.com\/resources\/content\/cloud-threat-horizons-report-h2-2025."},{"key":"e_1_3_3_1_12_2","unstructured":"J\u00a0Alexander Curtis and Nasir\u00a0U Eisty. 2024. The Kubernetes Security Landscape: AI-Driven Insights from Developer Discussions. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2409.04647 (2024)."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Narges Ehsani Farrokh Aminifar and Hamed Mohsenian-Rad. 2022. Convolutional autoencoder anomaly detection and classification based on distribution PMU measurements. IET generation transmission & distribution 16 14 (2022) 2816\u20132828.","DOI":"10.1049\/gtd2.12424"},{"key":"e_1_3_3_1_14_2","unstructured":"Jan\u00a0Kaluza Erik\u00a0Troan Preston\u00a0Brown. 2025. logrotate(8) - Linux man page. https:\/\/linux.die.net\/man\/8\/logrotate."},{"key":"e_1_3_3_1_15_2","unstructured":"EtudeWorld. 2025. Save. https:\/\/etudeworld.net."},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TEMSMET51618.2020.9557464"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Jalal Ghadermazi Ankit Shah and Nathaniel\u00a0D Bastian. 2024. Towards real-time network intrusion detection with image-based sequential packets representation. IEEE Transactions on Big Data (2024).","DOI":"10.36227\/techrxiv.23291588.v1"},{"key":"e_1_3_3_1_18_2","unstructured":"Go. 2025. exec. https:\/\/pkg.go.dev\/os\/exec."},{"key":"e_1_3_3_1_19_2","unstructured":"Geoffrey Hinton Oriol Vinyals and Jeff Dean. 2015. Distilling the knowledge in a neural network. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1503.02531 (2015)."},{"key":"e_1_3_3_1_20_2","unstructured":"Jordan Hochenbaum Owen\u00a0S Vallis and Arun Kejariwal. 2017. Automatic anomaly detection in the cloud via statistical learning. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1704.07706 (2017)."},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM54140.2023.10437636"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Chaoqin Huang Qinwei Xu Yanfeng Wang Yu Wang and Ya Zhang. 2022. Self-supervised masking for unsupervised anomaly detection and localization. IEEE Transactions on Multimedia 25 (2022) 4426\u20134438.","DOI":"10.1109\/TMM.2022.3175611"},{"key":"e_1_3_3_1_23_2","unstructured":"istio. 2025. istio. https:\/\/istio.io\/."},{"key":"e_1_3_3_1_24_2","unstructured":"Ariel\u00a0Zelivansky Jay\u00a0Chen Aviv\u00a0Sasson. 2025. Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes. https:\/\/unit42.paloaltonetworks.com\/hildegard-malware-teamtnt\/. Online: (accessed 20-Dec-2025)."},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2016.7535295"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC51166.2024.10622596"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","unstructured":"Seungsoo Lee and Jaehyun Nam. 2023. Kunerva: Automated Network Policy Discovery Framework for Containers. IEEE Access 11 (2023) 95616\u201395631. 10.1109\/ACCESS.2023.3310281","DOI":"10.1109\/ACCESS.2023.3310281"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2019.00026"},{"key":"e_1_3_3_1_29_2","unstructured":"linkerd. 2025. linkerd. https:\/\/linkerd.io\/."},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"crossref","unstructured":"Qian Ma Cong Sun Baojiang Cui and Xiaohui Jin. 2021. A novel model for anomaly detection in network traffic based on kernel support vector machine. Computers & Security 104 (2021) 102215.","DOI":"10.1016\/j.cose.2021.102215"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_3"},{"key":"e_1_3_3_1_32_2","unstructured":"MITRE. 2025. ATT&CK. https:\/\/attack.mitre.org\/."},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"crossref","unstructured":"Ariyo Oluwasanmi Muhammad\u00a0Umar Aftab Edward Baagyere Zhiguang Qin Muhammad Ahmad and Manuel Mazzara. 2021. Attention autoencoder for generative latent representational learning in anomaly detection. Sensors 22 1 (2021) 123.","DOI":"10.3390\/s22010123"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"crossref","unstructured":"Abdurrahman Pekta\u015f and Tankut Acarman. 2019. A deep learning method to detect network intrusion through flow-based features. International Journal of Network Management 29 3 (2019) e2050.","DOI":"10.1002\/nem.2050"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW60847.2023.00080"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"crossref","unstructured":"Akond Rahman Shazibul\u00a0Islam Shamim Dibyendu\u00a0Brinto Bose and Rahul Pandita. 2023. Security misconfigurations in open source kubernetes manifests: An empirical study. ACM Transactions on Software Engineering and Methodology (2023).","DOI":"10.1145\/3579639"},{"key":"e_1_3_3_1_38_2","unstructured":"redhat. 2025. The state of Kubernetes security report: 2024 edition. https:\/\/www.redhat.com\/en\/engage\/state-kubernetes-security-report-2024\/."},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"crossref","unstructured":"K Samunnisa G\u00a0Sunil\u00a0Vijaya Kumar and K Madhavi. 2023. Intrusion detection system in distributed cloud computing: Hybrid clustering and classification methods. Measurement: Sensors 25 (2023) 100612.","DOI":"10.1016\/j.measen.2022.100612"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"crossref","unstructured":"Md\u00a0Shazibul\u00a0Islam Shamim Farzana\u00a0Ahamed Bhuiyan and Akond Rahman. 2020. Xi commandments of kubernetes security: A systematization of knowledge related to kubernetes security practices. 2020 IEEE Secure Development (SecDev) (2020) 58\u201364.","DOI":"10.1109\/SecDev45635.2020.00025"},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"crossref","unstructured":"Tal Shapira and Yuval Shavitt. 2021. FlowPic: A generic representation for encrypted traffic classification and applications identification. IEEE Transactions on Network and Service Management 18 2 (2021) 1218\u20131232.","DOI":"10.1109\/TNSM.2021.3071441"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"crossref","unstructured":"Iman Sharafaldin Arash\u00a0Habibi Lashkari Ali\u00a0A Ghorbani et\u00a0al. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1 2018 (2018) 108\u2013116.","DOI":"10.5220\/0006639801080116"},{"key":"e_1_3_3_1_43_2","unstructured":"Amardeep Singh and Julian Jang-Jaccard. 2022. Autoencoder-based unsupervised intrusion detection using multi-scale convolutional recurrent networks. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2204.03779 (2022)."},{"key":"e_1_3_3_1_44_2","doi-asserted-by":"crossref","unstructured":"Chuanlong Yin Yuefei Zhu Jinlong Fei and Xinzheng He. 2017. A deep learning approach for intrusion detection using recurrent neural networks. Ieee Access 5 (2017) 21954\u201321961.","DOI":"10.1109\/ACCESS.2017.2762418"},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"crossref","unstructured":"Geonwoo Yoon. 2025. Lighweight Service Mesh for Intrusion Detection using KD-CNN in Cloud-Native Environment. https:\/\/github.com\/Yoongunwo\/Lightweight_Service_Mesh_for_Intrusion_Detection_using_KD-CNN_in_Cloud-Native_Environment.","DOI":"10.1145\/3733812.3765535"},{"key":"e_1_3_3_1_46_2","doi-asserted-by":"crossref","unstructured":"Xueqin Zhang Jiahao Chen Yue Zhou Liangxiu Han and Jiajun Lin. 2019. A multiple-layer representation learning model for network-based attack detection. IEEE Access 7 (2019) 91992\u201392008.","DOI":"10.1109\/ACCESS.2019.2927465"},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"crossref","unstructured":"Yu Zhou Xiaomin Liang Wei Zhang Linrang Zhang and Xing Song. 2021. VAE-based deep SVDD for anomaly detection. Neurocomputing 453 (2021) 131\u2013140.","DOI":"10.1016\/j.neucom.2021.04.089"},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"crossref","unstructured":"Ying Zhou Thomas\u00a0A Mazzuchi and Shahram Sarkani. 2020. M-AdaBoost-A based ensemble system for network intrusion detection. Expert Systems with Applications 162 (2020) 113864.","DOI":"10.1016\/j.eswa.2020.113864"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"CCSW '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2025 Cloud Computing Security Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3733812.3765535","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T18:56:43Z","timestamp":1767985003000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733812.3765535"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"references-count":47,"alternative-id":["10.1145\/3733812.3765535","10.1145\/3733812"],"URL":"https:\/\/doi.org\/10.1145\/3733812.3765535","relation":{},"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"2025-11-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}