ABSTRACT
The detection of anomalies in data is a far-reaching field of research which also applies to the field of cloud computing in several different ways: from the detection of various types of intrusions to the detection of hardware failures, many publications address how far anomaly detection methods are able to meet the specific requirements of a cloud-based network. Since there is still no comprehensive overview of this constantly growing field of research, this literature review provides a systematic evaluation of 215 publications that can be considered as representative for the last ten years of this scientific development. Our analysis identifies three main methodological areas (machine learning, deep learning, statistical approaches) and summarizes how exactly the corresponding models are applied for the detection of anomalies. Furthermore, we clarify which concrete application areas are typically addressed by anomaly detection in the context of cloud computing environments and which related public datasets are often used for evaluations. Finally, we discuss the implications of the literature review and provide directions for future research.
- Mahmoud Abdelsalam, Ram Krishnan, and Ravi Sandhu. 2017. Clustering-based IaaS cloud monitoring. In 2017 IEEE 10th International Conference on Cloud Computing (CLOUD). IEEE, 672–679.Google ScholarCross Ref
- Mahmoud Abdelsalam, Ram Krishnan, and Ravi Sandhu. 2019. Online malware detection in cloud auto-scaling systems using shallow convolutional neural networks. In IFIP Annual Conference on Data and Applications Security and Privacy. Springer, 381–397.Google ScholarDigital Library
- Adel Abusitta, Martine Bellaiche, and Michel Dagenais. 2018. An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment. Journal of Cloud Computing 7, 1 (2018), 9.Google ScholarDigital Library
- Ashkan Aghdai, Kang Xi, and H Jonathan Chao. 2019. Intelligent Anomaly Detection and Mitigation in Data Centers. arXiv preprint arXiv:1906.06388(2019).Google Scholar
- Bikash Agrawal, Tomasz Wiktorski, and Chunming Rong. 2017. Adaptive real-time anomaly detection in cloud infrastructures. Concurrency and Computation: Practice and Experience 29, 24(2017), e4193.Google ScholarCross Ref
- Subutai Ahmad, Alexander Lavin, Scott Purdy, and Zuha Agha. 2017. Unsupervised real-time anomaly detection for streaming data. Neurocomputing 262(2017), 134–147.Google ScholarCross Ref
- Mohiuddin Ahmed, Abdun Naser Mahmood, and Jiankun Hu. 2016. A survey of network anomaly detection techniques. Journal of Network and Computer Applications 60 (2016), 19–31.Google ScholarDigital Library
- Leman Akoglu, Hanghang Tong, and Danai Koutra. 2015. Graph based anomaly detection and description: a survey. Data mining and knowledge discovery 29, 3 (2015), 626–688.Google ScholarDigital Library
- Shadab Alam, Mohammed Shuaib, and Abdus Samad. 2019. A collaborative study of intrusion detection and prevention techniques in cloud computing. In International Conference on Innovative Computing and Communications. Springer, 231–240.Google ScholarCross Ref
- Sultan T Alanazi, Mohammed Anbar, Shankar Karuppayah, Ahmed K Al-Ani, and Yousef K Sanjalawe. 2019. Detection techniques for DDoS attacks in cloud environment. In Intelligent and Interactive Computing. Springer, 337–354.Google Scholar
- Suaad Alarifi and Stephen Wolthusen. 2013. Anomaly detection for ephemeral cloud IaaS virtual machines. In International Conference on Network and System Security. Springer, 321–335.Google ScholarCross Ref
- Mohammad Abdelkareem Alarqan, Zarul Fitri Zaaba, and Ammar Almomani. 2019. Detection Mechanisms of DDoS Attack in Cloud Computing Environment: A Survey. In International Conference on Advances in Cyber Security. Springer, 138–152.Google Scholar
- Osama AlKadi, Nour Moustafa, Benjamin Turnbull, and Kim-Kwang Raymond Choo. 2019. Mixture Localization-Based Outliers Models for securing Data Migration in Cloud Centers. IEEE Access 7(2019), 114607–114618.Google ScholarCross Ref
- Ameen Alkasem, Hongwei Liu, Zuo Decheng, and Yao Zhao. 2015. AFDI: a virtualization-based accelerated fault diagnosis innovation for high availability computing. arXiv preprint arXiv:1507.08036(2015).Google Scholar
- Ahmad Alnafessah and Giuliano Casale. 2018. A neural-network driven methodology for anomaly detection in apache spark. In 2018 11th International Conference on the Quality of Information and Communications Technology (QUATIC). IEEE, 201–209.Google ScholarCross Ref
- Ahmad Alnafessah and Giuliano Casale. 2019. Artificial neural networks based techniques for anomaly detection in Apache Spark. Cluster Computing (2019), 1–16.Google Scholar
- Deepali Arora and Kin Fun Li. 2017. Detecting anomalies in the data residing over the cloud. In 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, 541–546.Google ScholarCross Ref
- Hammi Badis, Guillaume Doyen, and Rida Khatoun. 2014. Toward a source detection of botclouds: a pca-based approach. In IFIP International Conference on Autonomous Infrastructure, Management and Security. Springer, 105–117.Google ScholarCross Ref
- Omkar P Badve and BB Gupta. 2016. Taxonomy of recent DDoS attack prevention, detection, and response schemes in cloud environment. In Proceedings of the international conference on recent cognizance in wireless communication & image processing. Springer, 683–693.Google ScholarCross Ref
- Abhishek Bajpai, Shruti Singh, 2016. A survey on Security Analysis in Cloud computing. In Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, 249–262.Google Scholar
- V Balamurugan and R Saravanan. 2019. Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation. Cluster Computing 22, 6 (2019), 13027–13039.Google ScholarCross Ref
- Sakil Barbhuiya, Zafeirios Papazachos, Peter Kilpatrick, and Dimitrios S Nikolopoulos. 2018. RADS: Real-time Anomaly Detection System for Cloud Data Centres. arXiv preprint arXiv:1811.04481(2018).Google Scholar
- Vic Barnett and Toby Lewis. 1984. Outliers in statistical data. osd (1984).Google Scholar
- Souhila Benmakrelouf, Cédric St-Onge, Nadjia Kara, Hanine Tout, Claes Edstrom, and Yves Lemieux. 2020. Abnormal behavior detection using resource level to service level metrics mapping in virtualized systems. Future Generation Computer Systems 102 (2020), 680–700.Google ScholarDigital Library
- Josep Lluís Berral, Nicolas Poggi, David Carrera, Aaron Call, Rob Reinauer, and Daron Green. 2015. ALOJA: a framework for benchmarking and predictive analytics in Hadoop deployments. IEEE Transactions on Emerging Topics in Computing 5, 4 (2015), 480–493.Google ScholarCross Ref
- Elham Besharati, Marjan Naderan, and Ehsan Namjoo. 2019. LR-HIDS: logistic regression host-based intrusion detection system for cloud environments. Journal of Ambient Intelligence and Humanized Computing 10, 9 (2019), 3669–3692.Google ScholarCross Ref
- Nitesh Bharot, Veenadhari Suraparaju, and Sanjeev Gupta. 2019. DDoS Attack Detection and Clustering of Attacked and Non-attacked VMs Using SOM in Cloud Network. In International Conference on Advances in Computing and Data Sciences. Springer, 369–378.Google Scholar
- Dhruba Kumar Bhattacharyya and Jugal Kumar Kalita. 2013. Network anomaly detection: A machine learning perspective. Crc Press.Google Scholar
- Monowar H Bhuyan, Dhruba Kumar Bhattacharyya, and Jugal K Kalita. 2013. Network anomaly detection: methods, systems and tools. Ieee communications surveys & tutorials 16, 1 (2013), 303–336.Google Scholar
- Rodrigo N Calheiros, Kotagiri Ramamohanarao, Rajkumar Buyya, Christopher Leckie, and Steve Versteeg. 2017. On the effectiveness of isolation-based anomaly detection in cloud data centers. Concurrency and Computation: Practice and Experience 29, 18(2017), e4169.Google ScholarCross Ref
- Lelio Campanile, Mauro Iacono, Fabio Martinelli, Fiammetta Marulli, Michele Mastroianni, Francesco Mercaldo, and Antonella Santone. 2020. Towards the Use of Generative Adversarial Neural Networks to Attack Online Resources. In Workshops of the International Conference on Advanced Information Networking and Applications. Springer, 890–901.Google ScholarCross Ref
- Marta Catillo, Massimiliano Rak, and Umberto Villano. 2020. 2L-ZED-IDS: A Two-Level Anomaly Detector for Multiple Attack Classes. In Workshops of the International Conference on Advanced Information Networking and Applications. Springer, 687–696.Google ScholarCross Ref
- Varun Chandola, Arindam Banerjee, and Vipin Kumar. 2009. Anomaly detection: A survey. ACM computing surveys (CSUR) 41, 3 (2009), 1–58.Google ScholarDigital Library
- Hongyang Chen, Pengfei Chen, and Guangba Yu. 2020. A Framework of Virtual War Room and Matrix Sketch-Based Streaming Anomaly Detection for Microservice Systems. IEEE Access 8(2020), 43413–43426.Google ScholarCross Ref
- Qiang Chen. 2016. Research on Distributed Anomaly Traffic Detection Technology Based on Hadoop Platform. In International Conference on Bio-Inspired Computing: Theories and Applications. Springer, 530–535.Google Scholar
- Zouhair Chiba, Noreddine Abghour, Khalid Moussaid, Amina El Omri, and Mohamed Rida. 2018. Novel Network IDS in Cloud Environment Based on Optimized BP Neural Network Using Genetic Algorithm. In Proceedings of the 3rd International Conference on Smart City Applications. 1–9.Google ScholarDigital Library
- Zouhair Chiba, Noreddine Abghour, Khalid Moussaid, Amina El Omri, and Mohamed Rida. 2019. An Efficient Network IDS for Cloud Environments Based on a Combination of Deep Learning and an Optimized Self-adaptive Heuristic Search Algorithm. In International Conference on Networked Systems. Springer, 235–249.Google ScholarDigital Library
- Zouhair Chiba, Noreddine Abghour, Khalid Moussaid, Amina El Omri, and Mohamed Rida. 2019. Smart Approach to Build A Deep Neural Network Based IDS for Cloud Environment Using an Optimized Genetic Algorithm. In Proceedings of the 2nd International Conference on Networking, Information Systems & Security. 1–12.Google ScholarDigital Library
- Chien-Yi Chiu, Chi-Tien Yeh, and Yuh-Jye Lee. 2013. Frequent pattern based user behavior anomaly detection for cloud system. In 2013 Conference on Technologies and Applications of Artificial Intelligence. IEEE, 61–66.Google ScholarDigital Library
- Ashley Chonka, Yang Xiang, Wanlei Zhou, and Alessio Bonti. 2011. Cloud Security Defence to Protect Cloud Computing against HTTP-DoS and XML-DoS Attacks. J. Netw. Comput. Appl. 34, 4 (July 2011), 1097–1107. https://doi.org/10.1016/j.jnca.2010.06.004Google ScholarDigital Library
- Domenico Cotroneo, Luigi De Simone, Pietro Liguori, Roberto Natella, and Nematollah Bidokhti. 2019. Enhancing failure propagation analysis in cloud computing systems. In 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE). IEEE, 139–150.Google ScholarCross Ref
- DARPA. 1998. KDD 98. https://kdd.ics.uci.edu/databases/kddcup98/kddcup98.html. Accessed: 2020-10-26.Google Scholar
- DARPA. 1999. KDD 99. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed: 2020-10-26.Google Scholar
- Joel A Dawson, Jeffrey T McDonald, Lee Hively, Todd R Andel, Mark Yampolskiy, and Charles Hubbard. 2018. Phase space detection of virtual machine cyber events through hypervisor-level system call analysis. In 2018 1st International Conference on Data Intelligence and Security (ICDIS). IEEE, 159–167.Google ScholarCross Ref
- Marcos VO De Assis, Anderson H Hamamoto, Taufik Abrão, and Mario Lemes Proença. 2017. A game theoretical based system using holt-winters and genetic algorithm with fuzzy logic for DoS/DDoS mitigation on SDN networks. IEEE Access 5(2017), 9485–9496.Google ScholarCross Ref
- Marcos VO De Assis, Matheus P Novaes, Cinara B Zerbini, Luiz F Carvalho, Taufik Abrãao, and Mario L Proença. 2018. Fast defense system against attacks in software defined networks. IEEE Access 6(2018), 69620–69639.Google ScholarCross Ref
- Pooja Dehraj and Arun Sharma. 2020. A review on architecture and models for autonomic software systems. JOURNAL OF SUPERCOMPUTING(2020).Google Scholar
- Frank Doelitzscher, Martin Knahl, Christoph Reich, and Nathan Clarke. 2013. Anomaly detection in iaas clouds. In 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, Vol. 1. IEEE, 387–394.Google ScholarDigital Library
- Christos Douligeris and Aikaterini Mitrokotsa. 2004. DDoS attacks and defense mechanisms: classification and state-of-the-art. Computer Networks 44, 5 (2004), 643 – 666. https://doi.org/10.1016/j.comnet.2003.10.003Google ScholarDigital Library
- Qingfeng Du, Tiandi Xie, and Yu He. 2018. Anomaly detection and diagnosis for container-based microservices with performance monitoring. In International Conference on Algorithms and Architectures for Parallel Processing. Springer, 560–572.Google ScholarCross Ref
- Xindong Duan. 2019. Research on abnormal data detection method of web browser in cloud computing environment. Cluster Computing 22, 1 (2019), 1229–1238.Google ScholarDigital Library
- Iman El Mir, Abdelkrim Haqiq, and Dong Seong Kim. 2016. Performance analysis and security based on intrusion detection and prevention systems in cloud data centers. In International Conference on Hybrid Intelligent Systems. Springer, 456–465.Google Scholar
- Marwa A Elsayed and Mohammad Zulkernine. 2020. PredictDeep: Security Analytics as a Service for Anomaly Detection and Prediction. IEEE Access 8(2020), 45184–45197.Google ScholarCross Ref
- Mostafa Farshchi, Jean-Guy Schneider, Ingo Weber, and John Grundy. 2018. Metric selection and anomaly detection for cloud operations using log and metric correlation analysis. Journal of Systems and Software 137 (2018), 531–549.Google ScholarCross Ref
- Diogo AB Fernandes, Mário M Freire, Paulo AP Fazendeiro, and Pedro RM Inácio. 2017. Applications of artificial immune systems to computer security: A survey. Journal of Information Security and Applications 35 (2017), 138–159.Google ScholarDigital Library
- Jaron Fontaine, Chris Kappler, Adnan Shahid, and Eli De Poorter. 2019. Log-Based Intrusion Detection for Cloud Web Applications Using Machine Learning. In International Conference on P2P, Parallel, Grid, Cloud and Internet Computing. Springer, 197–210.Google Scholar
- Canadian Institute for Cybersecurity. 2018. CSE-CIC-IDS2018. https://www.unb.ca/cic/datasets/ids-2018.html. Accessed: 2020-10-26.Google Scholar
- Song Fu, Jianguo Liu, and Husanbir Pannu. 2012. A hybrid anomaly detection framework in cloud computing using one-class and two-class support vector machines. In International Conference on Advanced Data Mining and Applications. Springer, 726–738.Google ScholarCross Ref
- Matthias Gander, Michael Felderer, Basel Katt, Adrian Tolbaru, Ruth Breu, and Alessandro Moschitti. 2012. Anomaly detection in the cloud: Detecting security incidents via machine learning. In International Workshop on Eternal Systems. Springer, 103–116.Google Scholar
- P Ganeshkumar and N Pandeeswari. 2016. Adaptive neuro-fuzzy-based anomaly detection system in cloud. International Journal of Fuzzy Systems 18, 3 (2016), 367–378.Google ScholarCross Ref
- Sahil Garg, Kuljeet Kaur, Shalini Batra, Gagangeet Singh Aujla, Graham Morgan, Neeraj Kumar, Albert Y Zomaya, and Rajiv Ranjan. 2020. En-ABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment. J. Parallel and Distrib. Comput. 135 (2020), 219–233.Google ScholarDigital Library
- Sahil Garg, Kuljeet Kaur, Neeraj Kumar, Georges Kaddoum, Albert Y Zomaya, and Rajiv Ranjan. 2019. A hybrid deep learning-based model for anomaly detection in cloud datacenter networks. IEEE Transactions on Network and Service Management 16, 3(2019), 924–935.Google ScholarCross Ref
- Partha Ghosh, Meghna Bardhan, Nilabhra Roy Chowdhury, Santanu Phadikar, 2017. IDS using reinforcement learning Automata for Preserving security in cloud environment. International Journal of Information System Modeling and Design (IJISMD) 8, 4(2017), 21–37.Google ScholarDigital Library
- Partha Ghosh, Abhay Kumar Mandal, and Rupesh Kumar. 2015. An efficient cloud network intrusion detection system. In Information systems design and intelligent applications. Springer, 91–99.Google Scholar
- Partha Ghosh, Shivam Shakti, and Santanu Phadikar. 2016. A cloud intrusion detection system using novel PRFCM clustering and KNN based dempster-shafer rule. International Journal of Cloud Applications and Computing (IJCAC) 6, 4(2016), 18–35.Google ScholarDigital Library
- Anteneh Girma, Mosses Garuba, and Rajini Goel. 2018. Advanced machine language approach to detect DDoS attack using DBSCAN clustering technology with entropy. In Information Technology-New Generations. Springer, 125–131.Google Scholar
- Ian Goodfellow, Yoshua Bengio, Aaron Courville, and Yoshua Bengio. 2016. Deep learning. Vol. 1. MIT press Cambridge.Google Scholar
- Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in neural information processing systems. 2672–2680.Google Scholar
- Qiang Guan, Song Fu, Nathan DeBardeleben, and Sean Blanchard. 2013. Exploring time and frequency domains for accurate and automated anomaly detection in cloud computing systems. In 2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing. IEEE, 196–205.Google ScholarDigital Library
- Fabio Guigou, Pierre Collet, and Pierre Parrend. 2017. Anomaly detection and motif discovery in symbolic representations of time series. arXiv preprint arXiv:1704.05325(2017).Google Scholar
- Fabio Guigou, Pierre Collet, and Pierre Parrend. 2019. SCHEDA: Lightweight euclidean-like heuristics for anomaly detection in periodic time series. Applied Soft Computing 82 (2019), 105594.Google ScholarDigital Library
- Halim Görkem Gülmez, Emrah Tuncel, and Pelin Angin. 2018. A big data analytical approach to cloud intrusion detection. In International Conference on Cloud Computing. Springer, 377–388.Google ScholarDigital Library
- Hang Guo, Xun Fan, Anh Cao, Geoff Outhred, and John Heidemann. 2019. Peek Inside the Closed World: Evaluating Autoencoder-Based Detection of DDoS to Cloud. arXiv preprint arXiv:1912.05590(2019).Google Scholar
- Waqas Haider, Jiankun Hu, and Nour Moustafa. 2017. Designing anomaly detection system for cloud servers by frequency domain features of system call identifiers and machine learning. In International Conference on Mobile Networks and Management. Springer, 137–149.Google Scholar
- Douglas M Hawkins. 1980. Identification of outliers. Vol. 11. Springer.Google Scholar
- Jordan Hochenbaum, Owen S Vallis, and Arun Kejariwal. 2017. Automatic anomaly detection in the cloud via statistical learning. arXiv preprint arXiv:1704.07706(2017).Google Scholar
- Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735–1780.Google ScholarDigital Library
- Bin Hong, Yazhou Hu, Fuyang Peng, and Bo Deng. 2015. Distributed state monitoring for IaaS Cloud with continuous observation sequence. In 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom). IEEE, 1037–1042.Google Scholar
- Bin Hong, Fuyang Peng, Bo Deng, Yazhou Hu, and Dongxia Wang. 2015. DAC-Hmm: detecting anomaly in cloud systems with hidden Markov models. Concurrency and Computation: Practice and Experience 27, 18(2015), 5749–5764.Google ScholarDigital Library
- Guang-Bin Huang, Qin-Yu Zhu, and Chee-Kheong Siew. 2006. Extreme learning machine: theory and applications. Neurocomputing 70, 1-3 (2006), 489–501.Google ScholarCross Ref
- Tian Huang, Yongxin Zhu, Yafei Wu, Stéphane Bressan, and Gillian Dobbie. 2016. Anomaly detection and identification scheme for VM live migration in cloud infrastructure. Future Generation Computer Systems 56 (2016), 736–745.Google ScholarDigital Library
- Tian Huang, Yan Zhu, Qiannan Zhang, Yongxin Zhu, Dongyang Wang, Meikang Qiu, and Lei Liu. 2013. An lof-based adaptive anomaly detection scheme for cloud computing. In 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops. IEEE, 206–211.Google ScholarDigital Library
- Nurudeen Mahmud Ibrahim and Anazida Zainal. 2019. An Adaptive Intrusion Detection Scheme for Cloud Computing. International Journal of Swarm Intelligence Research (IJSIR) 10, 4(2019), 53–70.Google ScholarCross Ref
- Nurudeen Mahmud Ibrahim and Anazida Zainal. 2020. A Distributed Intrusion Detection Scheme for Cloud Computing. International Journal of Distributed Systems and Technologies (IJDST) 11, 1(2020), 68–82.Google ScholarDigital Library
- Mohamed Idhammad, Karim Afdel, and Mustapha Belouch. 2018. Distributed intrusion detection system for cloud environments based on data mining techniques. Procedia Computer Science 127 (2018), 35–41.Google ScholarDigital Library
- Mohammad Islam and Andriy Miranskyy. 2020. Anomaly Detection in Cloud Components.Google Scholar
- Aws Naser Jaber and Shafiq Ul Rehman. 2020. FCM–SVM based intrusion detection system for cloud computing environment. Cluster Computing (2020), 1–11.Google Scholar
- Aws Naser Jaber, Mohamad Fadli Zolkipli, Hasan Awni Shakir, and Mohammed R Jassim. 2017. Host based intrusion detection and prevention model against DDoS attack in cloud computing. In International Conference on P2P, Parallel, Grid, Cloud and Internet Computing. Springer, 241–252.Google Scholar
- Hiranya Jayathilaka, Chandra Krintz, and Rich Wolski. 2017. Performance monitoring and root cause analysis for cloud-hosted web applications. In Proceedings of the 26th International Conference on World Wide Web. 469–478.Google ScholarDigital Library
- Priyanka Joshi, Ritu Prasad, Pradeep Mewada, and Praneet Saurabh. 2018. A New Neural Network-Based IDS for Cloud Computing. In Progress in Computing, Analytics and Networking. Springer, 161–170.Google Scholar
- El Mehdi Kandoussi, Iman El Mir, Mohamed Hanini, and Abdelkrim Haqiq. 2017. Modeling an anomaly-based intrusion prevention system using game theory. In International conference on innovations in bio-inspired computing and applications. Springer, 266–276.Google Scholar
- Hisham A Kholidy. 2019. Correlation-based sequence alignment models for detecting masquerades in cloud computing. IET Information Security 14, 1 (2019), 39–50.Google ScholarDigital Library
- Hyunjoo Kim, Jonghyun Kim, Youngsoo Kim, Ikkyun Kim, and Kuinam J Kim. 2019. Design of network threat detection and classification based on machine learning on cloud computing. Cluster Computing 22, 1 (2019), 2341–2350.Google ScholarDigital Library
- Teuvo Kohonen. 2012. Self-organizing maps. Vol. 30. Springer Science & Business Media.Google Scholar
- Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, and Benjamin Turnbull. 2019. Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Generation Computer Systems 100 (2019), 779–796.Google ScholarDigital Library
- Rafał Kozik, Michał Choraś, Witold Hołubowicz, and Rafał Renk. 2016. Extreme learning machines for web layer anomaly detection. In International Conference on Image Processing and Communications. Springer, 226–233.Google Scholar
- S Krishnaveni, Palani Vigneshwar, S Kishore, B Jothi, and S Sivamohan. 2020. Anomaly-Based Intrusion Detection System Using Support Vector Machine. In Artificial Intelligence and Evolutionary Computations in Engineering Systems. Springer, 723–731.Google Scholar
- Ram Shankar Siva Kumar, Andrew Wicker, and Matt Swann. 2017. Practical machine learning for cloud intrusion detection: challenges and the way forward. In Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security. 81–90.Google ScholarDigital Library
- Yann LeCun, Bernhard Boser, John S Denker, Donnie Henderson, Richard E Howard, Wayne Hubbard, and Lawrence D Jackel. 1989. Backpropagation applied to handwritten zip code recognition. Neural computation 1, 4 (1989), 541–551.Google ScholarDigital Library
- Alexander Lenk, Markus Klems, Jens Nimis, Stefan Tai, and Thomas Sandholm. 2009. What’s inside the Cloud? An architectural map of the Cloud landscape. In 2009 ICSE workshop on software engineering challenges of cloud computing. IEEE, 23–31.Google ScholarDigital Library
- Dan Li, Dacheng Chen, Jonathan Goh, and See-kiong Ng. 2018. Anomaly detection with generative adversarial networks for multivariate time series. arXiv preprint arXiv:1809.04758(2018).Google Scholar
- Mingwei Lin, Zhiqiang Yao, Fei Gao, and Yang Li. 2015. Toward anomaly detection in iaas cloud computing platforms. International Journal of Security and Its Applications 9, 12(2015), 175–188.Google ScholarCross Ref
- Mingwei Lin, Zhiqiang Yao, Fei Gao, and Yang Li. 2016. A Virtual Machine Instance Anomaly Detection System for IaaS Cloud Computing. International Journal of Future Generation Communication and Networking 9, 3(2016), 255–268.Google ScholarCross Ref
- Jiaxin Liu, Xucheng Song, Yingjie Zhou, Xi Peng, Yanru Zhang, Pei Liu, and Dapeng Wu. 2019. Deep Anomaly Detection in Packet Payload. arXiv preprint arXiv:1912.02549(2019).Google Scholar
- Yuan Liu and Ruhui Ma. 2013. Network anomaly detection based on BQPSO-BN algorithm. IETE Journal of Research 59, 4 (2013), 334–342.Google ScholarCross Ref
- Tania Lorido-Botran, Sergio Huerta, Luis Tomás, Johan Tordsson, and Borja Sanz. 2017. An unsupervised approach to online noisy-neighbor detection in cloud data centers. Expert Systems with Applications 89 (2017), 188–204.Google ScholarDigital Library
- Widad Mirghani Makki, Maheyzah MD Siraj, and Nurudeen Mahmud Ibrahim. 2019. A Harmony Search-Based Feature Selection Technique for Cloud Intrusion Detection. In International Conference of Reliable Information and Communication Technology. Springer, 779–788.Google Scholar
- Haroon Malik, Ian J Davis, Michael W Godfrey, Douglas Neuse, and Serge Manskovskii. 2016. Connecting the dots: anomaly and discontinuity detection in large-scale systems. Journal of Ambient Intelligence and Humanized Computing 7, 4 (2016), 509–522.Google ScholarCross Ref
- M Manickam and SP Rajagopalan. 2019. A hybrid multi-layer intrusion detection system in cloud. Cluster Computing 22, 2 (2019), 3961–3969.Google ScholarDigital Library
- M Mayuranathan, M Murugan, and V Dhanakoti. 2019. Best features based intrusion detection system by RBM model for detecting DDoS in cloud environment. Journal of Ambient Intelligence and Humanized Computing (2019), 1–11.Google Scholar
- Peter Mell, Tim Grance, 2011. The NIST definition of cloud computing. (2011).Google Scholar
- Fan Jing Meng, Xiao Zhang, Pengfei Chen, and Jing Min Xu. 2017. Driftinsight: detecting anomalous behaviors in large-scale cloud platform. In 2017 IEEE 10th International Conference on Cloud Computing (CLOUD). IEEE, 230–237.Google ScholarCross Ref
- HaiBo Mi, HuaiMin Wang, YangFan Zhou, Michael R Lyu, and Hua Cai. 2012. Localizing root causes of performance anomalies in cloud computing systems by analyzing request trace logs. Science China Information Sciences 55, 12 (2012), 2757–2773.Google ScholarCross Ref
- Haibo Mi, Huaimin Wang, Yangfan Zhou, Michael Rung-Tsong Lyu, Hua Cai, and Gang Yin. 2013. An online service-oriented performance profiling tool for cloud computing systems. Frontiers of Computer Science 7, 3 (2013), 431–445.Google ScholarDigital Library
- Preeti Mishra, Akash Negi, ES Pilli, and RC Joshi. 2019. VMProtector: Malign Process Detection for Protecting Virtual Machines in Cloud Environment. In International Conference on Advances in Computing and Data Sciences. Springer, 360–369.Google Scholar
- Preeti Mishra, Emmanuel S Pilli, Vijay Varadharajan, and Udaya Tupakula. 2016. Securing virtual machines from anomalies using program-behavior analysis in cloud environment. In 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE, 991–998.Google Scholar
- Preeti Mishra, Emmanuel S Pilli, Vijay Varadharajan, and Udaya Tupakula. 2017. Intrusion detection techniques in cloud environment: A survey. Journal of Network and Computer Applications 77 (2017), 18–47.Google ScholarDigital Library
- Chirag Modi and Dhiren Patel. 2018. A feasible approach to intrusion detection in virtual network layer of Cloud computing. Sādhanā 43, 7 (2018), 114.Google ScholarCross Ref
- Chirag N Modi and Kamatchi Acha. 2017. Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review. the Journal of Supercomputing 73, 3 (2017), 1192–1234.Google ScholarCross Ref
- Sara Kardani Moghaddam, Rajkumar Buyya, and Kotagiri Ramamohanarao. 2019. ACAS: An anomaly-based cause aware auto-scaling framework for clouds. J. Parallel and Distrib. Comput. 126 (2019), 107–120.Google ScholarDigital Library
- Nour Moustafa, Gideon Creech, Elena Sitnikova, and Marwa Keshk. 2017. Collaborative anomaly detection framework for handling big data of cloud computing. In 2017 Military Communications and Information Systems Conference (MilCIS). IEEE, 1–6.Google ScholarCross Ref
- Nour Moustafa, Jiankun Hu, and Jill Slay. 2019. A holistic review of network anomaly detection systems: A comprehensive survey. Journal of Network and Computer Applications 128 (2019), 33–55.Google ScholarCross Ref
- Nour Moustafa and Jill Slay. 2015. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In 2015 military communications and information systems conference (MilCIS). IEEE, 1–6.Google Scholar
- Pandeeswari Nagarajan and Ganeshkumar Perumal. 2015. A neuro fuzzy based intrusion detection system for a cloud data center using adaptive learning. Cybernetics and Information Technologies 15, 3 (2015), 88–103.Google ScholarDigital Library
- T Nathiya and G Suseendran. 2019. An Effective Hybrid Intrusion Detection System for Use in Security Monitoring in the Virtual Network Layer of Cloud Computing Technology. In Data Management, Analytics and Innovation. Springer, 483–497.Google Scholar
- Anjum Nazir and Rizwan Ahmed Khan. 2019. Combinatorial Optimization based Feature Selection Method: A study on Network Intrusion Detection. arXiv preprint arXiv:1906.04494(2019).Google Scholar
- Hani Neuvirth, Yehuda Finkelstein, Amit Hilbuch, Shai Nahum, Daniel Alon, and Elad Yom-Tov. 2015. Early detection of fraud storms in the cloud. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 53–67.Google ScholarCross Ref
- Laisen Nie, Dingde Jiang, and Zhihan Lv. 2017. Modeling network traffic for traffic matrix estimation and anomaly detection based on Bayesian network in cloud computing networks. Annals of Telecommunications 72, 5-6 (2017), 297–305.Google ScholarCross Ref
- Roman Nikiforov. 2018. Clustering-based Anomaly Detection for microservices. arXiv preprint arXiv:1810.02762(2018).Google Scholar
- Caleb C Noble and Diane J Cook. 2003. Graph-based anomaly detection. In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining. 631–636.Google ScholarDigital Library
- Onyekachi Nwamuo, Paulo Magella de Faria Quinan, Issa Traore, Isaac Woungang, and Abdulaziz Aldribi. 2019. Arguments Against Using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative. In International Conference on Machine Learning for Networking. Springer, 315–332.Google Scholar
- Emmanuel C. Ogu, Olusegun A. Ojesanmi, Oludele Awodele, and ’Shade Kuyoro. 2019. A Botnets Circumspection: The Current Threat Landscape, and What We Know So Far. Inf. 10, 11 (2019), 337. https://doi.org/10.3390/info10110337Google Scholar
- Opeyemi Osanaiye, Haibin Cai, Kim-Kwang Raymond Choo, Ali Dehghantanha, Zheng Xu, and Mqhele Dlodlo. 2016. Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP Journal on Wireless Communications and Networking 2016, 1(2016), 130.Google ScholarCross Ref
- Opeyemi Osanaiye, Kim-Kwang Raymond Choo, and Mqhele Dlodlo. 2016. Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. Journal of Network and Computer Applications 67 (2016), 147–165.Google ScholarDigital Library
- David O’Shea, Vincent C Emeakaroha, John Pendlebury, Neil Cafferkey, John P Morrison, and Theo Lynn. 2016. A Wavelet-inspired Anomaly Detection Framework for Cloud Platforms. In CLOSER (1). 106–117.Google Scholar
- Cemile Diler Özdemir, Mehmet Tahir Sandıkkaya, and Yusuf Yaslan. 2018. Malicious Behavior Classification in PaaS. In International Conference on Cloud Computing and Services Science. Springer, 215–232.Google Scholar
- David O’Shea, Vincent C Emeakaroha, Neil Cafferkey, John P Morrison, and Theo Lynn. 2016. Detecting Anomaly in Cloud Platforms Using a Wavelet-Based Framework. In International Conference on Cloud Computing and Services Science. Springer, 131–150.Google Scholar
- N Pandeeswari and R Karuppathal. 2017. Hypervisor Based Anomaly Detection System in Cloud Computing Using ANFIS. 網際網路技術學刊 18, 6 (2017), 1335–1344.Google Scholar
- N Pandeeswari and Ganesh Kumar. 2016. Anomaly detection system in cloud environment using fuzzy clustering based ANN. Mobile Networks and Applications 21, 3 (2016), 494–505.Google ScholarDigital Library
- Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari, and Joaquim Celestino Júnior. 2012. Taxonomy and proposed architecture of intrusion detection and prevention systems for cloud computing. In International Symposium on Cyberspace Safety and Security. Springer, 441–458.Google ScholarDigital Library
- Rajendra Patil, Harsha Dudeja, and Chirag Modi. 2020. Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing. International Journal of Information Security 19, 2 (2020), 147–162.Google ScholarCross Ref
- Ady Wahyudi Paundu, Takeshi Okuda, Youki Kadobayashi, and Suguru Yamaguchi. 2015. Leveraging static probe instrumentation for vm-based anomaly detection system. In International Conference on Information and Communications Security. Springer, 320–334.Google Scholar
- Damai Jessica Prathyusha, Shaik Naseera, DJ Anusha, and K Alisha. 2020. A Review of Biologically Inspired Algorithms in a Cloud Environment to Combat DDoS Attacks. In Smart Intelligent Computing and Applications. Springer, 59–68.Google Scholar
- Juan Qiu, Qingfeng Du, Yu He, YiQun Lin, Jiaye Zhu, and Kanglin Yin. 2018. Performance anomaly detection models of virtual machines for network function virtualization infrastructure with machine learning. In International Conference on Artificial Neural Networks. Springer, 479–488.Google ScholarCross Ref
- Mahdi Rabbani, Yong Li Wang, Reza Khoshkangini, Hamed Jelodar, Ruxin Zhao, and Peng Hu. 2020. A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing. Journal of Network and Computer Applications 151 (2020), 102507.Google ScholarDigital Library
- Sivakami Raja and Saravanan Ramaiah. 2017. An efficient fuzzy-based hybrid system to cloud intrusion detection. International Journal of Fuzzy Systems 19, 1 (2017), 62–77.Google ScholarCross Ref
- Sutharshan Rajasegarar, Christopher Leckie, and Marimuthu Palaniswami. 2008. Anomaly detection in wireless sensor networks. IEEE Wireless Communications 15, 4 (2008), 34–40.Google ScholarDigital Library
- Divya Rajput and Ankit Thakkar. 2019. A Survey on Different Network Intrusion Detection Systems and CounterMeasure. In Emerging Research in Computing, Information, Communication and Applications. Springer, 497–506.Google Scholar
- AC Ramachandra, Subhrajit Bhattacharya, 2020. Literature Survey on Log-Based Anomaly Detection Framework in Cloud. In Computational Intelligence in Pattern Recognition. Springer, 143–153.Google Scholar
- Rui Ren, Jinheng Li, Lei Wang, Jianfeng Zhan, and Zheng Cao. 2018. Anomaly Analysis for Co-located Datacenter Workloads in the Alibaba Cluster. arXiv preprint arXiv:1811.06901(2018).Google Scholar
- Markus Ring, Sarah Wunderlich, Dominik Grüdl, Dieter Landes, and Andreas Hotho. 2017. Flow-based benchmark data sets for intrusion detection. In Proceedings of the 16th European conference on cyber warfare and security. 361–369.Google Scholar
- S. Roschke, F. Cheng, and C. Meinel. 2009. Intrusion Detection in the Cloud. In 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing. 729–734. https://doi.org/10.1109/DASC.2009.94Google ScholarDigital Library
- David E Rumelhart, Geoffrey E Hinton, and Ronald J Williams. 1986. Learning representations by back-propagating errors. nature 323, 6088 (1986), 533–536.Google Scholar
- Mikail Mohammed Salim, Shailendra Rathore, and Jong Hyuk Park. 2019. Distributed denial of service attacks and its defenses in IoT: a survey. The Journal of Supercomputing(2019), 1–44.Google Scholar
- Mohd Rafiz Salji, Nur Izura Udzir, Mohd Izuan Hafez Ninggal, Nor Fazlida Mohd Sani, and Hamidah Ibrahim. 2016. An Anomaly Detection Algorithm based on Online Learning Lagrangian SVM for Cloud Computing Environment. International Journal of Security and Its Applications 10, 12(2016), 173–186.Google ScholarCross Ref
- Tara Salman, Deval Bhamare, Aiman Erbad, Raj Jain, and Mohammed Samaka. 2017. Machine learning for anomaly detection and categorization in multi-cloud environments. In 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud). IEEE, 97–103.Google ScholarCross Ref
- Mehmet Tahir Sandıkkaya, Yusuf Yaslan, and Cemile Diler Özdemir. 2019. DeMETER in clouds: detection of malicious external thread execution in runtime with machine learning in PaaS clouds. Cluster Computing (2019), 1–14.Google Scholar
- S Sandosh, V Govindasamy, and G Akila. 2020. Enhanced intrusion detection system via agent clustering and classification based on outlier detection. Peer-to-Peer Networking and Applications(2020), 1–8.Google Scholar
- Carla Sauvanaud, Mohamed Kaâniche, Karama Kanoun, Kahina Lazri, and Guthemberg Da Silva Silvestre. 2018. Anomaly detection and diagnosis for cloud services: Practical experiments and lessons learned. Journal of Systems and Software 139 (2018), 84–106.Google ScholarDigital Library
- Thomas Schlegl, Philipp Seeböck, Sebastian M Waldstein, Georg Langs, and Ursula Schmidt-Erfurth. 2019. f-anogan: Fast unsupervised anomaly detection with generative adversarial networks. Medical image analysis 54 (2019), 30–44.Google Scholar
- Florian Schmidt, Florian Suri-Payer, Anton Gulenko, Marcel Wallschläger, Alexander Acker, and Odej Kao. 2018. Unsupervised anomaly event detection for cloud monitoring using online arima. In 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion). IEEE, 71–76.Google ScholarCross Ref
- Florian Schmidt, Florian Suri-Payer, Anton Gulenko, Marcel Wallschläger, Alexander Acker, and Odej Kao. 2018. Unsupervised Anomaly Event Detection for VNF Service Monitoring Using Multivariate Online Arima. In 2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 278–283.Google Scholar
- Aravinthkumar Selvaraj, Rizwan Patan, Amir H Gandomi, Ganesh Gopal Deverajan, and Manjula Pushparaj. 2019. Optimal virtual machine selection for anomaly detection using a swarm intelligence approach. Applied soft computing 84 (2019), 105686.Google Scholar
- Jitendra Kumar Seth and Satish Chandra. 2018. An Effective DOS Attack Detection Model in Cloud Using Artificial Bee Colony Optimization. 3D Research 9, 3 (2018), 44.Google Scholar
- Jitendra Kumar Seth and Satish Chandra. 2018. MIDS: Metaheuristic Based Intrusion Detection System for Cloud Using k-NN and MGWO. In International Conference on Advances in Computing and Data Sciences. Springer, 411–420.Google ScholarCross Ref
- Burr Settles. 2009. Active learning literature survey. Technical Report. University of Wisconsin-Madison Department of Computer Sciences.Google Scholar
- Wenyao Sha, Yongxin Zhu, Min Chen, and Tian Huang. 2015. Statistical learning for anomaly detection in cloud server systems: A multi-order Markov chain framework. IEEE transactions on cloud computing 6, 2 (2015), 401–413.Google Scholar
- Iman Sharafaldin, Arash Habibi Lashkari, and Ali A Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization.. In ICISSP. 108–116.Google Scholar
- Vishal Sharma, Vinay Verma, and Anand Sharma. 2019. Detection of DDoS Attacks Using Machine Learning in Cloud Computing. In International Conference on Advanced Informatics for Computing Research. Springer, 260–273.Google Scholar
- Chaochen Shi and Jiangshan Yu. 2019. A Hidden Markov Model-Based Method for Virtual Machine Anomaly Detection. In International Conference on Provable Security. Springer, 372–380.Google ScholarDigital Library
- Guthemberg Silvestre, Carla Sauvanaud, Mohamed Kaâniche, and Karama Kanoun. 2015. Tejo: A supervised anomaly detection scheme for newSQL databases. In International Workshop on Software Engineering for Resilient Systems. Springer, 114–127.Google ScholarDigital Library
- Steven Simpson, Simon Oechsner, Andreas Mauthe, David Hutchison, 2015. A framework for resilience management in the cloud. e & i Elektrotechnik und Informationstechnik 132, 2(2015), 122–132.Google Scholar
- GS Smrithy and Ramadoss Balakrishnan. 2016. A statistical technique for online anomaly detection for big data streams in cloud collaborative environment. In 2016 IEEE International Conference on Computer and Information Technology (CIT). IEEE, 108–111.Google ScholarCross Ref
- Imen Souiden, Zaki Brahmi, and Lamine Lafi. 2017. Data stream mining based-outlier prediction for cloud computing. In International Conference on Digital Economy. Springer, 131–142.Google ScholarCross Ref
- T Raja Sree and S Mary Saira Bhanu. 2019. Detection of HTTP flooding attacks in cloud using fuzzy bat clustering. Neural Computing and Applications(2019), 1–17.Google Scholar
- Karthik Srinivasan, Azath Mubarakali, Abdulrahman Saad Alqahtani, and A Dinesh Kumar. 2019. A Survey on the Impact of DDoS Attacks in Cloud Computing: Prevention, Detection and Mitigation Techniques. In Intelligent Communication Technologies and Virtual Mobile Networks. Springer, 252–270.Google Scholar
- Madhan Kumar Srinivasan, K Sarukesi, Ashima Keshava, and P Revathy. 2012. ecloudids tier-1 ux-engine subsystem design and implementation using self-organizing map (som) for secure cloud computing environment. In International Conference on Security in Computer Networks and Distributed Systems. Springer, 432–443.Google ScholarCross Ref
- Siddharth Srinivasan, Akshay Kumar, Manik Mahajan, Dinkar Sitaram, and Sanchika Gupta. 2018. Probabilistic real-time intrusion detection system for docker containers. In International Symposium on Security in Computing and Communication. Springer, 336–347.Google Scholar
- Ioannis M Stephanakis, Ioannis P Chochliouros, Evangelos Sfakianakis, Syed Noorulhassan Shirazi, and David Hutchison. 2019. Hybrid self-organizing feature map (SOM) for anomaly detection in cloud infrastructures using granular clustering based upon value-difference metrics. Information Sciences 494(2019), 247–277.Google ScholarDigital Library
- EK Subramanian and Latha Tamilselvan. 2019. A focus on future cloud: machine learning-based cloud security. Service Oriented Computing and Applications 13, 3 (2019), 237–249.Google ScholarDigital Library
- Ilya Sutskever, Oriol Vinyals, and Quoc V Le. 2014. Sequence to sequence learning with neural networks. In Advances in neural information processing systems. 3104–3112.Google Scholar
- Hassan Takabi, James BD Joshi, and Gail-Joon Ahn. 2010. Security and privacy challenges in cloud computing environments. IEEE Security & Privacy 8, 6 (2010), 24–31.Google ScholarDigital Library
- Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A Ghorbani. 2009. A detailed analysis of the KDD CUP 99 data set. In 2009 IEEE symposium on computational intelligence for security and defense applications. IEEE, 1–6.Google ScholarCross Ref
- Marina Thottan and Chuanyi Ji. 2003. Anomaly detection in IP networks. IEEE Transactions on signal processing 51, 8 (2003), 2191–2204.Google ScholarDigital Library
- Siva Rama Krishna Tummalapalli and ASN Chakravarthy. 2020. Intrusion detection system for cloud forensics using bayesian fuzzy clustering and optimization based SVNN. Evolutionary Intelligence(2020), 1–11.Google Scholar
- Ozan Tuncer, Emre Ates, Yijia Zhang, Ata Turk, Jim Brandt, Vitus J Leung, Manuel Egele, and Ayse K Coskun. 2017. Diagnosing performance variations in HPC applications using machine learning. In International Supercomputing Conference. Springer, 355–373.Google ScholarDigital Library
- Olufogorehan Tunde-Onadele, Jingzhu He, Ting Dai, and Xiaohui Gu. 2019. A study on container vulnerability exploit detection. In 2019 IEEE International Conference on Cloud Engineering (IC2E). IEEE, 121–127.Google ScholarCross Ref
- UNM. 1998. Sequence-based Intrusion Detection. https://www.cs.unm.edu/~immsec/systemcalls.htm. Accessed: 2020-10-26.Google Scholar
- Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Łukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. In Advances in neural information processing systems. 5998–6008.Google Scholar
- S Velliangiri and J Premalatha. 2019. Intrusion detection of distributed denial of service attack in cloud. Cluster Computing 22, 5 (2019), 10615–10623.Google ScholarCross Ref
- Toby Velte, Anthony Velte, and Robert Elsenpeter. 2009. Cloud computing, a practical approach. McGraw-Hill, Inc.Google Scholar
- Priyanka Verma, Shashikala Tapaswi, and W Wilfred Godfrey. 2020. An Adaptive Threshold-Based Attribute Selection to Classify Requests Under DDoS Attack in Cloud-Based Systems. Arabian Journal for Science and Engineering 45, 4 (2020), 2813–2834.Google ScholarCross Ref
- GuiPing Wang and JiaWei Wang. 2016. An anomaly detection framework for detecting anomalous virtual machines under cloud computing environment. International Journal of Security and Its Applications 10, 1(2016), 75–86.Google ScholarCross Ref
- GuiPing Wang, JianXi Yang, and Ren Li. 2019. UFKLDA: An unsupervised feature extraction algorithm for anomaly detection under cloud environment. ETRI Journal 41, 5 (2019), 684–695.Google ScholarCross Ref
- Tao Wang, Jiwei Xu, Wenbo Zhang, Zeyu Gu, and Hua Zhong. 2018. Self-adaptive cloud monitoring with online anomaly detection. Future Generation Computer Systems 80 (2018), 89–101.Google ScholarDigital Library
- Michael R Watson, Angelos K Marnerides, Andreas Mauthe, David Hutchison, 2015. Malware detection in cloud computing infrastructures. IEEE Transactions on Dependable and Secure Computing 13, 2 (2015), 192–205.Google ScholarDigital Library
- Wei Xiong, Hanping Hu, Naixue Xiong, Laurence T Yang, Wen-Chih Peng, Xiaofei Wang, and Yanzhen Qu. 2014. Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications. Information Sciences 258(2014), 403–415.Google ScholarDigital Library
- Ke Xu, Yun Wang, Leni Yang, Yifang Wang, Bo Qiao, Si Qin, Yong Xu, Haidong Zhang, and Huamin Qu. 2019. CloudDet: Interactive Visual Analysis of Anomalous Performances in Cloud Computing Systems. IEEE transactions on visualization and computer graphics 26, 1(2019), 1107–1117.Google Scholar
- Wei Xu, Ling Huang, Armando Fox, David Patterson, and Michael I Jordan. 2009. Detecting large-scale system problems by mining console logs. In Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles. 117–132.Google ScholarDigital Library
- Youchang Xu, Ningjiang Chen, Ruwei Huang, and Hanlin Zhang. 2018. KPI Data Anomaly Detection Strategy for Intelligent Operation and Maintenance Under Cloud Environment. In International Conference on Intelligent Information Processing. Springer, 311–320.Google Scholar
- Youchang Xu, Ningjiang Chen, Hanlin Zhang, and Birui Liang. 2018. Adaptive Anomaly Detection Strategy Based on Reinforcement Learning. In International Conference of Pioneering Computer Scientists, Engineers and Educators. Springer, 493–504.Google Scholar
- Xiaoben Yan, Wei Zhou, Yun Gao, Zhang Zhang, Jizhong Han, and Ge Fu. 2014. Padm: Page rank-based anomaly detection method of log sequences by graph computing. In 2014 IEEE 6th International Conference on Cloud Computing Technology and Science. IEEE, 700–703.Google ScholarDigital Library
- Chen Yang. 2019. Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment. Cluster Computing 22, 4 (2019), 8309–8317.Google ScholarCross Ref
- Kejiang Ye. 2017. Anomaly Detection in Clouds: Challenges and Practice. In Proceedings of the First Workshop on Emerging Technologies for Software-Defined and Reconfigurable Hardware-Accelerated Cloud Datacenters (Xi’an, China) (ETCD’17). Association for Computing Machinery, New York, NY, USA, Article 6, 2 pages. https://doi.org/10.1145/3129457.3129497Google ScholarDigital Library
- Kejiang Ye, Yangyang Liu, Guoyao Xu, and Cheng-Zhong Xu. 2018. Fault injection and detection for artificial intelligence applications in container-based clouds. In International Conference on Cloud Computing. Springer, 112–127.Google ScholarDigital Library
- Chuan Yin, Canlin Pan, and Pengquan Zhang. 2020. Deep neural network combined with MapReduce for abnormal data mining and detection in cloud storage. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2020).Google Scholar
- Yue Yuan, Anuhan Torgonshar, Wenchang Shi, Bin Liang, and Bo Qin. 2018. Digging Evidence for Violation of Cloud Security Compliance with Knowledge Learned from Logs. In Chinese Conference on Trusted Computing and Information Security. Springer, 318–337.Google Scholar
- Mattia Zago, Manuel Gil Pérez, and Gregorio Martínez Pérez. 2019. Scalable detection of botnets based on DGA. Soft Computing (2019), 1–21.Google Scholar
- Jing Zhang. 2019. Anomaly detecting and ranking of the cloud computing platform by multi-view learning. Multimedia Tools and Applications 78, 21 (2019), 30923–30942.Google ScholarCross Ref
- Jian Zhang, Yawei Zhang, Pin Liu, and Jianbiao He. 2016. A spark-based DDoS attack detection model in cloud services. In International Conference on Information Security Practice and Experience. Springer, 48–64.Google ScholarCross Ref
- Qiannan Zhang, Yafei Wu, Tian Huang, and Yongxin Zhu. 2013. An intelligent anomaly detection and reasoning scheme for VM live migration via cloud data mining. In 2013 IEEE 25th International Conference on Tools with Artificial Intelligence. IEEE, 412–419.Google ScholarDigital Library
- Xiao Zhang, Fanjing Meng, and Jingmin Xu. 2018. Perfinsight: A robust clustering-based abnormal behavior detection system for large-scale cloud. In 2018 IEEE 11th International Conference on Cloud Computing (CLOUD). IEEE, 896–899.Google ScholarCross Ref
- Ziwei Zhang, Peng Cui, and Wenwu Zhu. 2020. Deep learning on graphs: A survey. IEEE Transactions on Knowledge and Data Engineering (2020).Google ScholarDigital Library
- Beilei Zheng, Jianan Gu, and Chuliang Weng. 2019. CBA-Detector: An Accurate Detector Against Cache-Based Attacks Using HPCs and Pintools. In International Symposium on Advanced Parallel Processing Technologies. Springer, 109–122.Google Scholar
- Jingwen Zhou, Zhenbang Chen, Ji Wang, Zibin Zheng, and Michael R Lyu. 2015. A Data Set for User Request Trace-Oriented Monitoring and its Applications. IEEE Transactions on Services Computing 11, 4 (2015), 699–712.Google ScholarCross Ref
- Mikhail Zolotukhin, Elena Ivannikova, and Timo Hämäläinen. 2017. On detection of network-based co-residence verification attacks in sdn-driven clouds. In Internet of Things, Smart Spaces, and Next Generation Networks and Systems. Springer, 235–246.Google Scholar
Recommendations
CloudShield: Real-time Anomaly Detection in the Cloud
CODASPY '23: Proceedings of the Thirteenth ACM Conference on Data and Application Security and PrivacyIn cloud computing, it is desirable if suspicious activities can be detected by automatic anomaly detection systems. Although anomaly detection has been investigated in the past, it remains unsolved in cloud computing. Challenges are: characterizing the ...
An LOF-Based Adaptive Anomaly Detection Scheme for Cloud Computing
COMPSACW '13: Proceedings of the 2013 IEEE 37th Annual Computer Software and Applications Conference WorkshopsOne of the most attractive things about cloud computing from the perspective of business people is that it provides an effective means to outsource IT. The behaviors of business applications on cloud are constantly evolving due to technical upgrading, ...
Self-similarity based lightweight intrusion detection method for cloud computing
ACIIDS'11: Proceedings of the Third international conference on Intelligent information and database systems - Volume Part IIInformation security is the key success factor to provide safe cloud computing services. Despite its usefulness and cost-effectiveness, public cloud computing service is hard to accept because there are many security concerns such as data leakage, ...
Comments