Methods and Means of Analyzing Application Security via Distributed Tracing

2024;
: pp. 69 - 87
1
Lviv Polytechnic National University, Ukraine
2
Lviv Polytechnic National University, Lviv, Ukraine

Summary The article describes methods and means of digital security that are utilizing distributed tracing to detect, investigate, and prevent security incidents. The described methods and means are applicable to solutions of any scale – from large enterprises to pet projects; of any domain – healthcare, banking, government, retail, etc. The article takes a comprehensive approach to digital security including identification, alerting, prevention, investigation, and audit of existing security incidents. Described approaches to application security via tracing are focused on general purpose applications, but they can be extended to cover a domain specific use-case. All Approaches are production tested and utilized in existing distributed IT systems in one way or another, however certain examples and use-cases are intentionally simplified for the demonstration purposes and ease of understanding. Nevertheless, it must be understood that methods and means described in the article complement existing security practices and cannot replace all of them, however they may improve overall security of the system by decreasing incident detection time, decreasing resources and efforts needed to investigate breaches or passing a security audit.

  1. Parker, A., Spoonhower, D., Mace, J., Sigelman, B., & Isaacs, R. (2020). Distributed tracing in practice: Instrumenting, analyzing, and debugging microservices. O’Reilly Media.
  2. Gorige, D., Al-Masri, E., Kanzhelev, S., & Fattah, H. (2020, October). Privacy-risk detection in microservices composition using distributed tracing. In 2020 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE) (pp. 250–253). Ieee.
  3. Meng, L., Ji, F., Sun, Y., & Wang, T. (2021). Detecting anomalies in microservices with execution trace comparison. Future Generation Computer Systems, 116, 291–301.
  4. Rios, J., Jha, S., & Shwartz, L. (2022, July). Localizing and explaining faults in microservices using distributed tracing. In 2022 IEEE 15th International Conference on Cloud Computing (CLOUD) (pp. 489–499). IEEE.
  5. Jacob, S., Qiao, Y., & Lee, B. (2021). Detecting Cyber Security Attacks against a Microservices Application using Distributed Tracing. In ICISSP (pp. 588–595).
  6. Khanahmadi, M., Shameli Sendi, A., Jabbarifar, M., Fournier, Q., & Dagenais, M. (2023). Detection of microservice based software anomalies based on OpenTracing in cloud. Software: Practice and Experience, 53(8), 1681–1699.
  7. Mateus-Coelho, N., Cruz-Cunha, M., & Ferreira, L. G. (2021).  Security  in  microservices architectures. Procedia Computer Science, 181, 1225–1236.
  8. Jacob, S., Qiao, Y., Ye, Y., & Lee, B. (2022). Anomalous distributed traffic: Detecting cyber security attacks amongst microservices using graph convolutional networks. Computers & Security, 118, 102728.
  9. Chandramouli, R., & Butcher, Z. (2020). Building secure microservices-based applications using service- mesh architecture. NIST Special Publication, 800, 204A.
  10. Monteiro, D., Yu, Y., Zisman, A., & Nuseibeh, B. (2023). Adaptive observability for forensic-ready microservice systems. IEEE Transactions on Services Computing.
  11. Zhong, Z., Liu, J., Wu, D., Di, P., Sui, Y., Liu, A. X., & Lui, J. C. (2023, May). Scalable compositional static taint analysis for sensitive data tracing on industrial micro-services. In 2023 IEEE/ACM 45th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP) (pp. 110–121). IEEE.
  12. Waseem, M., Liang, P., Shahin, M., Di Salle, A., & Márquez, G. (2021). Design, monitoring, and testing of microservices systems: The practitioners’ perspective. Journal of Systems and Software, 182, 111061.
  13. Perdanaputra, A., & Kistijantoro, A. I. (2020, September). Transparent tracing system on grpc based microservice applications running on kubernetes. In 2020 7th International Conference on Advance Informatics: Concepts, Theory and Applications (ICAICTA) (pp. 1–5). IEEE.
  14. Nazarkevych, M., Dmytruk, S., Hrytsyk, V., Vozna, O., Kuza, A., Shevchuk, O., ... & Sheketa, V. (2021). Evaluation   of   the   effectiveness   of   different   image   skeletonization   methods   in   biometric   security systems. International Journal of Sensors Wireless Communications and Control, 11(5), 542–552.
  15. Medykovskyy, M., Lipinski, P., Troyan, O., & Nazarkevych, M. (2015, September). Methods of protection document formed from latent element located by fractals. In 2015 Xth International Scientific and Technical Conference" Computer Sciences and Information Technologies"(CSIT) (pp. 70–72). IEEE.
  16. Liu, P., Xu, H., Ouyang, Q., Jiao, R., Chen, Z., Zhang, S., ... & Pei, D. (2020, October). Unsupervised detection of microservice trace anomalies through service-level deep bayesian networks. In 2020 IEEE 31st International Symposium on Software Reliability Engineering (ISSRE) (pp. 48–58). IEEE.
  17. Berardi, D., Giallorenzo, S., Mauro, J., Melis, A., Montesi, F., & Prandini, M. (2022). Microservice security: a systematic literature review. PeerJ Computer Science, 8, e779.
  18. Gortney, M. E., Harris, P. E., Cerny, T., Al Maruf, A., Bures, M., Taibi, D., & Tisnovsky, P. (2022). Visualizing microservice architecture in the dynamic perspective: A systematic mapping study. IEEE Access, 10, 119999-120012.
  19. Luo, S., Xu, H., Lu, C., Ye, K., Xu, G., Zhang, L., ... & Xu, C. (2021, November). Characterizing microservice dependency and performance: Alibaba trace analysis. In Proceedings of the ACM Symposium on Cloud Computing (pp. 412–426).
  20. Bai, L., & Zhang, C. (2023, May). Trace-based microservice anomaly detection through deep learning. In Second International Conference on Electronic Information Engineering, Big Data, and Computer Technology (EIBDCT 2023) (Vol. 12642, pp. 697–701). SPIE.