Thermal Management in Large Data Centers: Security Threats and Mitigation
Thermal Management in Large Data Centers: Security Threats and Mitigation
{dsaridou, papadob}@civil.duth.gr
2Cyber Security Research Group, University of Portsmouth, Portsmouth, UK
[email protected], [email protected]
Abstract. Data centres are experiencing significant growth in their scale, especially, with the ever-
increasing demand for cloud and IoT ser- vices. However, this rapid growth has raised numerous
security issues and vulnerabilities; new types of strategic cyber-attacks are aimed at specific physical
components of data centres that keep them operating. Attacks against temperature monitoring and
cooling systems of data centres, also known as thermal attacks, can cause a complete meltdown and are
generally considered difficult to address. In this paper, we focus on this issue by analysing the potential
security threats to these systems and their impact on the overall data center safety and performance. We
also present current thermal anomaly detection methods and their limitations. Finally, we propose a
hybrid method that uses multi-variant anomaly detection to prevent thermal attacks, as well as a fuzzy-
based health factor to enhance data center thermal awareness and security.
Keywords: Anomaly Detection· Security· Data Centre · Thermal Sensors · Cooling System · Thermal attacks
1 Introduction
Data Centres are experiencing unprecedented growth and will continue to scale operations to meet
the ever-increasing service demands. A recent study by Gartner1 estimated that about 425 million new
servers might be needed by 2020 to support 30 billion connected IoT devices around the world, while
the average data centre will support more than 100,000 servers [30]. The average data warehouse
size usually ranges from 100ft2 to 400,000ft2 [35] and operates on a high- power consumption. A
plethora of security issues has arisen due to this rapid growth, causing data centres to become
vulnerable to strategic cyber-attacks on the physical infrastructure vital to maintaining the
uninterrupted operation of data centres [12, 13, 19, 39]. Power supply, cooling, temperature monitoring
and even security systems can serve as entry points for attacks against data centre operators or
companies using data centre services. Security experts warn that ne sophisticated malware such as
Triton and Trisis [28] are very effective against power and HVAC (Heating, Ventilating, and Air
Conditioning) systems, and therefore, put data centres’ safety at risk. Moreover, reported cyber-
incidents showed that cyber-attacks on such connected facilities can destroy thousands of servers
by overheating the environmental atmosphere, or manipulating energy and temperature settings to
cause a fire or an explosion incident [12, 13, 39]. Attacks against temperature monitoring and cooling
systems, also known as thermal attacks, are considered dangerous and difficult to tackle.
In this paper, we aim to address this issue by exploring the most important security threats against
thermal management systems, as well as their overall impact on data centre security and
performance. In this context, we describe a number of vulnerabilities that may be exploited by
attackers who want to affect environmental conditions inside a data centre. Based on a combination
of thermal hardware requirements, thermal anomaly detection is considered a relevant approach for
detecting abnormal behaviour of data centre indoor temperature. In this context, several approaches
1
https://www.gartner.com/en
have been proposed for temperature measurement analysis and abnormal behaviour definition of
various environments such as smart homes, health, and data centres. In this paper, we analyse the
effectiveness and limitations of these approaches with respect to the protection against thermal
attacks in data centres. Additionally, we denote the importance of intelligent solutions and propose
a hybrid framework that uses multi-variant anomaly detection as a preventive measure. Finally, to
further enhance thermal awareness and security of data centres, we introduce a fuzzy-based health
factor.
The remainder of this paper is organised as follows. In section 2, a high-level overview of temperature
monitoring in large data centres is presented, along with their importance and benefits. Section 3
discusses the potential security threats on temperature monitoring systems and their impact on the
overall data centre security and performance. In Section 4, we provide an overview of the existing
solutions and their limitations. Section 5 outlines the effectiveness of combining multi-variate
anomaly detection methods and fuzzy logic in protecting data centres against thermal attacks.
Finally, section 6 concludes this paper and outlines future work.
In general, control and monitoring of heat diffusion inside a data center is a complicated process that
involves rack positioning design, air flow simulations and monitoring devices distribution. The
American Society of Heating, Refrigerating and Air-Conditioning Engineers (ASHRAE) supplies
detailed suggestions for temperature readings and defines three models regarding placing
temperature sensors: a) managing the space, b) setting up the space, and c) troubleshooting the
space. More specifically, it suggests that temperature should be measured at every fourth rack
position in the center of cold aisles. Additionally, temperature measurement should be taken at the
center of the air intakes of the top, middle, and bottom equipment mounted in a particular rack [33].
Temperature monitoring is not only effective against equipment protection, but it is also an efficient
measure to cut costs. In 2013, a study by the U.S. General Services Administration proposed a
temperature of 22°C – 26°C as the ideal temperature range for data centres. The same study claimed
savings of about 4-5% in energy costs from every 1°C of temperature increase [36]. Overall,
temperature monitoring provides numerous advantages to data centre managers, offering energy
use optimisation, optimal heat distribution, and thermal overload avoidance among others.
2
https://cyrusone.com/
The temperature monitoring system, which is one of the most critical components of a data centre,
is vulnerable to cyber-attacks too [12, 19]. Temperature monitoring is usually guaranteed through
hundreds or even thousands of temperature sensors (i.e., Thermal sensors) that form a WSN, which
can then be remotely controlled and configured. Thus, malicious cyber actors can easily take control
of the network and manipulate the thermal conditions of a specific server or rack; for example,
maintaining servers in a relatively hot environment [12, 13]. To achieve their goals, attackers will run
thermal-intensive workloads into victim servers or VMs (Virtual Machines) to rapidly generate large
amounts of heat. This heat will consequently worsen the thermal condition of the peripheral
environment, and therefore raise the inlet temperature of other servers [12, 14]. What’s more, such
networks are vulnerable to a wide variety of attacks due to several restrictions, such as low capability
of computation, small memory size, limited resources of energy and unreliable communication
channels [31]. Overall, these insecure devices can be easily compromised in order to remotely launch
attacks against the temperature monitoring system.
The adversary who launches a thermal attack can be an individual hacker, a competing provider, or
a specialised organisation for committing cyber-crime. A study by [34] showed that thermal attacks
can also come from insider malicious tenants, especially in the case of multi-tenant data centres. In
this case, malicious tenants can inject additional thermal loads, exceeding the shared cooling system
capacity, which can lead to overheating and possible system downtime. It is clear that the impact of
thermal attacks is not limited to victim servers, but it can also affect surrounding environmental
temperature, which, in turn, can impact thermal conditions of other servers and the entire data centre
[14]. In the same context, a study by [12] found that a successful thermal attack targeting 2% of
servers in a data centre can dramatically affect the thermal conditions of the whole data centre.
Similarly, affecting thermal conditions of adjacent servers and causing local hotspots would
significantly raise cooling costs, or lead to a cooling breakdown. Taking these studies into
consideration, it has been well-proved that thermal attacks can highly decrease performance and
reliability of victim servers by largely increasing their temperature.
One of the main reasons that renders data centres vulnerable to thermal attacks is the extensive use
of aggressive cooling and power management policies such as power oversubscription [12, 39].
Power oversubscription allows more servers to be hosted on a single data centre’s power
infrastructure than it can actually support [12]. Implementations of power oversubscription can lead
to severe security gaps, e.g, malicious attackers can manipulate many servers to create a local
hotspot or generate simultaneous power peaks to violate the power capacity in the data centre [39].
Another reason is that thermal attacks try to intentionally keep the outlet temperature of victim servers
at a high level, which makes chip-level temperature sensors, used in more modern servers, incapable
of monitoring the temperature at the server- and data centre-level. These sensors can only provide
information about the server’s core temperature which is not equal to the inlet and outlet
temperatures, and therefore, cannot prevent the occurrence of local hotspots [12].
Current anomaly detection approaches in data centre temperature monitoring have many
weaknesses and are not effective in preventing thermal attacks [12, 25]. For instance, most of these
approaches are not capable of distinguishing between benign thermal-intensive workloads and the
malicious ones, as several thermal-intensive incidents are benign and do not exploit security
vulnerabilities [12]. Furthermore, a study by [13] demonstrated that existing anomaly detection
approaches cannot defend against data centre-level thermal attacks, where a large number of
accounts run different workloads simultaneously.
4 Thermal anomaly detection in data centres
Anomaly detection is a relevant approach in the problem of temperature monitoring inside data
centres because it allows data centre managers to identify behaviour that deviates from “normal”
system behaviour in a proactive manner. In general, thermal anomaly detection is based on a
combination of thermal hardware requirements, that have been applied to cooling systems, and
historical observations, that are recorded and/or streamed by environmental sensors inside the
critical infrastructure. Several researchers have suggested anomaly detection methods for
temperature data in a variety of environments. Initially, and in an attempt to detect possible risk
events inside a household, an anomaly detection method was applied to smart home data by [18]
through temporal data mining. For their investigation, researchers used sensors to measure
temperature, humidity, light, etc. The model looked for temporal interactions among frequent
activities to learn “resident” behaviour and reported as “unusual” events with low probability. Despite
using a combination of real and synthetic data, the method proved effective, but was not used to
perform predictions [18].
Deviations from historical patterns were also examined in environmental data in [15]. The study
presented an anomaly detection method, using a data-driven univariate auto-regressive model and
a moving window to predict the next measurement based on historical data. The method, which
employed sensors reporting through telemetry, performed well without requiring previous
classification of data, and proved applicable to larger data sets as well [15]. In their extensive study,
[6] proposed a spatiotemporal correlation to detect anomalies from sensor nodes, such as
temperature, humidity and light, in wireless sensor networks. Even though this method aimed to
reduce energy and spectrum consumption, the information-gain from aggregate neighbourhood
sensor data can prove critical in high-risk cases where temperature variations need to be addressed
immediately. In an attempt to ensure healthy operating conditions and ensure reliability for High-
Performance Computing systems (HPC) and data centres, [5] used autoencoders to train data
collected from monitoring devices mounted on computing nodes. Their method used metrics such as
core load, power consumption, room temperature, GPU usage, cooling fans speed, etc., and was
able to catch anomalies when tested on real tier-1 HPC systems.
Despite the fact that temperature was not one of the monitoring values, re- search conducted by [1,
16] demonstrated the use of anomaly detection in critical infrastructure. On one hand, [16] presented
an analysis of multi-variate anomaly detection methods to assist in condition-based maintenance.
Their approach included an application on real aircraft turbofan engine data, where their model was
able to successfully detect anomalies and recognise failing factors. On the other hand, [1] proposed
a multi-agent swarm system to detect abnormal be- haviour in cloud data centres. Nevertheless, both
frameworks did not consider data collection from the surrounding environment for their evaluation,
but rather focused on the system’s parameters instead.
The study of thermal anomaly detection specifically designed for a data centre environment has only
started to gain attention during the last decade, where there has been a significant development of
data warehouses around the globe. Studies published by Marwah et al. [25, 26, 27] in 2009-10 were
the first to ad- dress the issue of autonomous anomaly detection of temperature values in data
centres and apply machine learning on sensor data sets. In their first paper on the topic, [27]
underlined the importance for an autonomous system that is able to catch temperature values beyond
a certain threshold. They also listed common technical reasons, as well as their symptoms, that lead
to anomalies. As they state, most of these anomalies can go undetected by traditional systems, while
they demonstrate how Principal Component Analysis (PCA) can assist as the primary detection
mechanism.
In [25], they extended their initial hypothesis by introducing four detection mechanisms. More
specifically, they compared a simple threshold method, a moving average method, an Exponentially
Weighed Moving Average (EWMA) method and naive Bayes to predict thermal outliers on a three-
month data set. Naive Bayes outperformed the other models and was able to predict 18% of the
anomalies at an average of 12 minutes before occurrence. Next, in [26], they used hierarchical PCA
for real-time detection, which resulted in a 98% accuracy of predicting anomalous cases. What is
more, the method was applied to data coming from a part of the data centre where traditional
methods would not be able to raise an alarm.
In [40], researchers introduced a sophisticated two-tier hierarchical neural network framework that
detected server-level as well as data centre-level thermal anomalies. The method was able to
achieve this by studying the relationships of heterogeneous sensors and consequently outperform
other machine learning models. After extensive research on thermal maps for data centres, [22, 23]
pro- posed a novel anomaly detection method that compares and maximizes the accuracy of
constructed and observed maps to detect Regions of Interest (RoIs). The method, which was notably
based on thermal cameras and traditional temperature monitoring devices, demonstrated sufficient
accuracy in anomalous cases. Later, and responding to the growing need for fast online detection of
fault cases, [3, 41] introduced the use of Self-Organizing Maps and reputation systems.
In another study published in 2016, [4] presented a sophisticated four-step tool based on density
estimation for anomaly detection and data exploration, which was specifically designed for HPC
sensors. Even though this method was tested and performed well on a real HPC environment, it was
not designed for real-time detection, an approach that recent studies tend to follow. [24] focused
exclusively on temperature data when they used naive ensembles to detect anomalies in the cooling
system of data centres. Nevertheless, because of its theoretical approach, their method needs to be
extended to demonstrate sufficient performance on non-simulated scenarios. During the same year,
another study published by [9] proposed an architecture sensing scheme. According to it, heat
sensors collect server temperature data and transmit them to the cloud for further analysis. Later in
2018, [7] tested several machine learning models on server temperature data to examine cooling
reliability of data centres. By constructing workload-independent cooling profiles servers, they were
also able to detect both transient and lasting cooling failures of servers. Two extensive studies
published by [17, 42] in 2019, deployed machine learning to detect fault operations of HVAC systems
in data centres. In [42], researchers recognising the importance of air-cooling systems in data centres
introduced a hybrid approach for four- fault decoupling features, including compressor valve leakage,
condenser fouling, evaporator airflow reduction, and liquid line restriction. Data were manipulated
using the random forest algorithm, which proved rather effective in fault events diagnosis. Lastly and
for the same reason, in [17], researchers considered three different types of anomaly detection
methodologies, namely naive point anomalies, contextual point anomalies, and level shifts. Machine
learning methods were then employed on a real data set showing good precision rates.
Taking everything into consideration, there have been several approaches to analyse temperature
measurements and define abnormal behaviour of the respective environments. Recent studies have
started to include critical infrastructure in their analyses as well, but their approaches are rather
focused on optimal system management, energy efficiency, and reliability of services. Given the
recent increase of cyber-attacks in industrial systems, we believe that real-time temperature
monitoring in data centres should start to be examined by the security community as an attack
mitigation measure. Moreover, temperature monitoring should not be analysed separately, but rather
in conjunction with network and security monitoring measures.
Additionally, there is a need for efficient time response of anomaly detection methods in operational
processes applied to data centres; this type of approach can be observed in the field of financial
streaming analytics, such as in the study of [2], where having the lead in financial transactions
provides an advantage. Finally, we should note that the type and quality of data used in model testing
is of paramount importance. In the next section, we address these issues by proposing a framework
based on a combination of recent methods and tools published by [10, 29, 37, 38].
where Yi is a node measuring a specific phenomenon, 𝑟𝑖 is its reading. The set of its neighbours is
denoted by 𝑁𝑒𝑖𝑔ℎ𝑏𝑜𝑢𝑟 (𝑌𝑖 ) and the number of neighbours by |𝑁𝑒𝑖𝑔ℎ𝑏𝑜𝑢𝑟 (𝑌𝑖 )|.
Fig. 3. Linguistic descriptors for (α) individual Anomaly Scores and (β) overall Health.
6 Conclusions and Future Work
Thermal attacks present a serious vulnerability in data centres today. By launch- ing a thermal attack,
an adversary can cause a complete meltdown to the equipment stored inside a data centre. In this
paper, we examined how easily temperature monitoring systems can be used by attackers to
manipulate heat distribution in such environments. We also presented and reviewed existing model-
based anomaly detection methods that have been focused on measuring temperature deviations in
critical infrastructures. According to our findings, thermal attacks are fundamentally not addressed
as potential cybersecurity attacks for data centres, and consequently, there is a serious lack of
frameworks proposed to eliminate this threat. We believe that future studies on the current topic
should be focused on constructing intelligent solutions. In our research, we found several approaches
to tackle this issue and addressed the most important aspects for a thermal attack mitigation
methodology. According to this, we suggested the use of a multi-variate anomaly detection method
that could perform fault classification, and a fuzzy-based health factor to assess of the overall state
of the system. Finally, we propose a curated data set that could assist in the exploration of the
aforementioned models.
Acknowledgement
This project has received funding from the European Union’s Horizon 2020 research and
innovation programme under grant agreement no. 786698. This work reflects authors’
view and Agency is not responsible for any use that may be made of the information it contains.
Bibliography
[1] Adhikari, A.T.B., Karunananda, A.S.: Real time anomaly detection of cloud data centers with
multiagents swarm. SRI LANKA ASSOCIATION FOR ARTIFICIAL INTELLIGENCE p. 5 (2015)
[2] Ahmad, S., Purdy, S.: Real-time anomaly detection for streaming analytics. arXiv preprint
arXiv:1607.02480 (2016)
[3] Aransay, I., Sancho, M., Garcıa, P., Fernández, J.: Self-organizing maps for detecting abnormal
thermal behavior in data centers. In: Processdings of the 8th IEEE International Conference on
Cloud Computing (CLOUD). pp. 138–145 (2015)
[4] Baseman, E., Blanchard, S., DeBardeleben, N., Bonnie, A., Morrow, A.: In- terpretable anomaly
detection for monitoring of high performance comput- ing systems. In: Outlier Definition,
Detection, and Description on Demand Workshop at ACM SIGKDD. San Francisco (Aug 2016)
(2016)
[5] Borghesi, A., Libri, A., Benini, L., Bartolini, A.: Online anomaly detec- tion in hpc systems. In:
2019 IEEE International Conference on Artificial Intelligence Circuits and Systems (AICAS).
pp. 229–233. IEEE (2019)
[6] Bosman, H.H., Iacca, G., Tejada, A., Wörtche, H.J., Liotta, A.: Spatial anomaly detection in
sensor networks using neighborhood information. Information Fusion 33, 41–56 (2017)
[7] Chen, C., Wang, G., Sun, J., Xu, W.: Detecting data center cooling prob- lems using a data-
driven approach. In: Proceedings of the 9th Asia-Pacific Workshop on Systems. pp. 1–8 (2018)
[8] Chou, J.S., Telaga, A.S.: Real-time detection of anomalous power consump- tion. Renewable
and Sustainable Energy Reviews 33, 400–411 (2014)
[9] Das, N., Kundu, A.: Cloud based thermal management system design and its analysis. In:
Information Systems Design and Intelligent Applications, pp. 519–528. Springer (2016)
[10] Ding, N., Gao, H., Bu, H., Ma, H., Si, H.: Multivariate-time-series-driven real-time anomaly
detection based on bayesian network. Sensors 18(10), 3367 (2018)
[11] ENERGY.GOV: “Management technology for energy efficiency in data
centres and telecommunications facilities.
https://www.energy.gov/eere/amo/management-technology-energy- efficiency-data-centres-
and-telecommunications-facilities, accessed: 05-08-2020.
[12] Gao, X., Liu, G., Xu, Z., Wang, H., Li, L., Wang, X.: Investigating security vulnerabilities in a hot
data center with reduced cooling redundancy. IEEE Transactions on Dependable and Secure
Computing (2020)
[13] Gao, X., Xu, Z., Wang, H., Li, L., Wang, X.: Why” some” like it hot too: Thermal attack on data
centers. In: Proceedings of the 2017 ACM SIGMETRICS/International Conference on
Measurement and Modeling of Computer Systems. pp. 23–24 (2017)
[14] Gao, X., Xu, Z., Wang, H., Li, L., Wang, X.: Reduced cooling redundancy: A new security
vulnerability in a hot data center. In: NDSS (2018)
[15] Hill, D.J., Minsker, B.S.: Anomaly detection in streaming environmental sensor data: A data-
driven modeling approach. Environmental Modelling & Software 25(9), 1014–1022 (2010)
[16] Hu, X., Subbu, R., Bonissone, P., Qiu, H., Iyer, N.: Multivariate anomaly detection in real-world
industrial systems. In: 2008 IEEE International Joint Conference on Neural Networks (IEEE
World Congress on Computational Intelligence). pp. 2766–2771. IEEE (2008)
[17] Huang, J., Chai, Z., Zhu, H.: Detecting anomalies in data center physical infrastructures using
statistical approaches. In: Journal of Physics: Confer- ence Series. vol. 1176, p. 022056. IOP
Publishing (2019)
[18] Jakkula, V., Cook, D.J., et al.: Anomaly detection using temporal data mining in a smart home
environment. Methods of information in medicine 47(1), 70–75 (2008)
[19] Knapp, K.J., Denney, G.D., Barner, M.E.: Key issues in data center secu- rity: An investigation
of government audit reports. Government Information Quarterly 28(4), 533–541 (2011)
[20] Korolov, M.: Cyrusone confirms ransomware attack, says six customers affected.
https://www.datacenterknowledge.com/cyrusone/cyrusone- confirms-ransomware-attack-
says-six-customers-affected, accessed: 04-08-2020
[21] Korolov, M.: The four main types of cyberattack that affect data center uptime.
https://www.datacenterknowledge.com/security/four-main-types- cyberattack-affect-data-
center-uptime, accessed: 04-08-2020
[22] Lee, E.K., Viswanathan, H., Pompili, D.: Model-based thermal anomaly detection in cloud
datacenters. In: 2013 IEEE International Conference on Distributed Computing in Sensor
Systems. pp. 191–198. IEEE (2013)
[23] Lee, E.K., Viswanathan, H., Pompili, D.: Model-based thermal anomaly detection in cloud
datacenters using thermal imaging. IEEE Transactions on Cloud Computing 6(2), 330–343
(2015)
[24] Li, C.: Cooling anomaly detection for servers and datacenters with naive ensemble. In: 2016
32nd Thermal Measurement, Modeling & Management Symposium (SEMI-THERM). pp. 157–
162. IEEE (2016)
[25] Marwah, M., Sharma, R., Bash, C.: Thermal anomaly prediction in data centers. In: 2010 12th
IEEE Intersociety Conference on Thermal and Ther- momechanical Phenomena in Electronic
Systems. pp. 1–7. IEEE (2010)
[26] Marwah, M., Sharma, R., Lugo, W., Bautista, L.: Anomalous thermal be- havior detection in
data centers using hierarchical pca. Knowledge Discovery from Sensor Data (SensorKDD’10)
p. 78 (2010)
[27] Marwah, M., Sharma, R.K., Lugo, W.: Autonomous detection of thermal anomalies in data
centers. In: International Electronic Packaging Technical Conference and Exhibition. vol.
43604, pp. 777–783 (2009)
[28] Mehrfeld, J.: Cyber security threats and incidents in industrial control sys- tems. In: International
Conference on Human-Computer Interaction. pp. 599–608. Springer (2020)
[29] Nguyen, T.A., Bucur, D., Aiello, M., Tei, K.: Applying time series analysis and neighbourhood
voting in a decentralised approach for fault detection and classification in wsns. In: Proceedings
of the Fourth Symposium on Information and Communication Technology. pp. 234–241 (2013)
[30] RACK-SOLUTION: 400 million new servers might be needed by 2020. shorturl.at/cqzCY,
accessed: 04-08-2020
[31] Salehi, S.A., Razzaque, M.A., Naraei, P., Farrokhtala, A.: Security in wire- less sensor
networks: Issues and challanges. In: 2013 IEEE International Conference on Space Science
and Communication (IconSpace). pp. 356–360. IEEE (2013)
[32] Schmidt, R.R., Cruz, E.E., Iyengar, M.: Challenges of data center thermal management. IBM
Journal of Research and Development 49(4.5), 709–723 (2005)
[33] Seaton, I.: Temperature Sensor Location - Data Center Efficiency Upsite (Oct 2018),
|
https://www.upsite.com/blog/data-center-temperature-sensor- location/, library Catalog:
www.upsite.com Section: Blog
[34] Shao, Z., Islam, M.A., Ren, S.: A first look at thermal attacks in multi- tenant data centers. ACM
SIGMETRICS Performance Evaluation Review 46(2), 93–94 (2019)
[35] Shehabi, A., Smith, S., Sartor, D., Brown, R., Herrlin, M., Koomey, J., Masanet, E., Horner, N.,
Azevedo, I., Lintner, W.: United states data center energy usage report. Tech. rep., Lawrence
Berkeley National Lab.(LBNL), Berkeley, CA (United States) (2016)
[36] Thibodeau, P.: It’s getting warmer in some data centers (Jul 2013),
https://www.computerworld.com/article/2483971/it-s-getting-warmer-in- some-data-
centers.html, library Catalog: www.computerworld.com
[37] Vigoya, L., Fernandez, D., Carneiro, V., Cacheda, F.: Annotated dataset for anomaly detection
in a data center with iot sensors. Sensors 20(13), 3745 (2020)
[38] Wijayasekara, D., Linda, O., Manic, M., Rieger, C.: Mining building energy management system
data using fuzzy anomaly detection and linguistic de- scriptions. IEEE Transactions on
Industrial Informatics 10(3), 1829–1840 (2014)
[39] Xu, Z., Wang, H., Xu, Z., Wang, X.: Power attack: An increasing threat to data centers. In:
NDSS (2014)
[40] Yuan, Y., Lee, E.K., Pompili, D., Liao, J.: Thermal anomaly detection in datacenters.
Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical
Engineering Science 226(8), 2104–2117 (2012)
[41] Zapater, M., Fraga, D., Malag´on, P., Bankovi´c, Z., Moya, J.M.: Self- organizing maps
versus growing neural gas in detecting anomalies in data centres. Logic Journal of the IGPL
23(3), 495–505 (2015)
[42] Zhu, X., Du, Z., Jin, X., Chen, Z.: Fault diagnosis-based operation risk evaluation for air
conditioning systems in data centers. Building and Envi- ronment 163, 106319
This paper is a preprint; it has been accepted for publication in:
International Symposium on Security in Computing and
Communication SSCC 2020: Security in Computing and
Communications pp 165-179
DOI: https://doi.org/10.1007/978-981-16-0422-5_12