skip to main content
10.1145/3442536.3442550acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaicccConference Proceedingsconference-collections
research-article
Open Access

A Systematic Review on Anomaly Detection for Cloud Computing Environments

Published:15 March 2021Publication History

ABSTRACT

The detection of anomalies in data is a far-reaching field of research which also applies to the field of cloud computing in several different ways: from the detection of various types of intrusions to the detection of hardware failures, many publications address how far anomaly detection methods are able to meet the specific requirements of a cloud-based network. Since there is still no comprehensive overview of this constantly growing field of research, this literature review provides a systematic evaluation of 215 publications that can be considered as representative for the last ten years of this scientific development. Our analysis identifies three main methodological areas (machine learning, deep learning, statistical approaches) and summarizes how exactly the corresponding models are applied for the detection of anomalies. Furthermore, we clarify which concrete application areas are typically addressed by anomaly detection in the context of cloud computing environments and which related public datasets are often used for evaluations. Finally, we discuss the implications of the literature review and provide directions for future research.

References

  1. Mahmoud Abdelsalam, Ram Krishnan, and Ravi Sandhu. 2017. Clustering-based IaaS cloud monitoring. In 2017 IEEE 10th International Conference on Cloud Computing (CLOUD). IEEE, 672–679.Google ScholarGoogle ScholarCross RefCross Ref
  2. Mahmoud Abdelsalam, Ram Krishnan, and Ravi Sandhu. 2019. Online malware detection in cloud auto-scaling systems using shallow convolutional neural networks. In IFIP Annual Conference on Data and Applications Security and Privacy. Springer, 381–397.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Adel Abusitta, Martine Bellaiche, and Michel Dagenais. 2018. An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment. Journal of Cloud Computing 7, 1 (2018), 9.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Ashkan Aghdai, Kang Xi, and H Jonathan Chao. 2019. Intelligent Anomaly Detection and Mitigation in Data Centers. arXiv preprint arXiv:1906.06388(2019).Google ScholarGoogle Scholar
  5. Bikash Agrawal, Tomasz Wiktorski, and Chunming Rong. 2017. Adaptive real-time anomaly detection in cloud infrastructures. Concurrency and Computation: Practice and Experience 29, 24(2017), e4193.Google ScholarGoogle ScholarCross RefCross Ref
  6. Subutai Ahmad, Alexander Lavin, Scott Purdy, and Zuha Agha. 2017. Unsupervised real-time anomaly detection for streaming data. Neurocomputing 262(2017), 134–147.Google ScholarGoogle ScholarCross RefCross Ref
  7. Mohiuddin Ahmed, Abdun Naser Mahmood, and Jiankun Hu. 2016. A survey of network anomaly detection techniques. Journal of Network and Computer Applications 60 (2016), 19–31.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Leman Akoglu, Hanghang Tong, and Danai Koutra. 2015. Graph based anomaly detection and description: a survey. Data mining and knowledge discovery 29, 3 (2015), 626–688.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Shadab Alam, Mohammed Shuaib, and Abdus Samad. 2019. A collaborative study of intrusion detection and prevention techniques in cloud computing. In International Conference on Innovative Computing and Communications. Springer, 231–240.Google ScholarGoogle ScholarCross RefCross Ref
  10. Sultan T Alanazi, Mohammed Anbar, Shankar Karuppayah, Ahmed K Al-Ani, and Yousef K Sanjalawe. 2019. Detection techniques for DDoS attacks in cloud environment. In Intelligent and Interactive Computing. Springer, 337–354.Google ScholarGoogle Scholar
  11. Suaad Alarifi and Stephen Wolthusen. 2013. Anomaly detection for ephemeral cloud IaaS virtual machines. In International Conference on Network and System Security. Springer, 321–335.Google ScholarGoogle ScholarCross RefCross Ref
  12. Mohammad Abdelkareem Alarqan, Zarul Fitri Zaaba, and Ammar Almomani. 2019. Detection Mechanisms of DDoS Attack in Cloud Computing Environment: A Survey. In International Conference on Advances in Cyber Security. Springer, 138–152.Google ScholarGoogle Scholar
  13. Osama AlKadi, Nour Moustafa, Benjamin Turnbull, and Kim-Kwang Raymond Choo. 2019. Mixture Localization-Based Outliers Models for securing Data Migration in Cloud Centers. IEEE Access 7(2019), 114607–114618.Google ScholarGoogle ScholarCross RefCross Ref
  14. Ameen Alkasem, Hongwei Liu, Zuo Decheng, and Yao Zhao. 2015. AFDI: a virtualization-based accelerated fault diagnosis innovation for high availability computing. arXiv preprint arXiv:1507.08036(2015).Google ScholarGoogle Scholar
  15. Ahmad Alnafessah and Giuliano Casale. 2018. A neural-network driven methodology for anomaly detection in apache spark. In 2018 11th International Conference on the Quality of Information and Communications Technology (QUATIC). IEEE, 201–209.Google ScholarGoogle ScholarCross RefCross Ref
  16. Ahmad Alnafessah and Giuliano Casale. 2019. Artificial neural networks based techniques for anomaly detection in Apache Spark. Cluster Computing (2019), 1–16.Google ScholarGoogle Scholar
  17. Deepali Arora and Kin Fun Li. 2017. Detecting anomalies in the data residing over the cloud. In 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, 541–546.Google ScholarGoogle ScholarCross RefCross Ref
  18. Hammi Badis, Guillaume Doyen, and Rida Khatoun. 2014. Toward a source detection of botclouds: a pca-based approach. In IFIP International Conference on Autonomous Infrastructure, Management and Security. Springer, 105–117.Google ScholarGoogle ScholarCross RefCross Ref
  19. Omkar P Badve and BB Gupta. 2016. Taxonomy of recent DDoS attack prevention, detection, and response schemes in cloud environment. In Proceedings of the international conference on recent cognizance in wireless communication & image processing. Springer, 683–693.Google ScholarGoogle ScholarCross RefCross Ref
  20. Abhishek Bajpai, Shruti Singh, 2016. A survey on Security Analysis in Cloud computing. In Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, 249–262.Google ScholarGoogle Scholar
  21. V Balamurugan and R Saravanan. 2019. Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generation. Cluster Computing 22, 6 (2019), 13027–13039.Google ScholarGoogle ScholarCross RefCross Ref
  22. Sakil Barbhuiya, Zafeirios Papazachos, Peter Kilpatrick, and Dimitrios S Nikolopoulos. 2018. RADS: Real-time Anomaly Detection System for Cloud Data Centres. arXiv preprint arXiv:1811.04481(2018).Google ScholarGoogle Scholar
  23. Vic Barnett and Toby Lewis. 1984. Outliers in statistical data. osd (1984).Google ScholarGoogle Scholar
  24. Souhila Benmakrelouf, Cédric St-Onge, Nadjia Kara, Hanine Tout, Claes Edstrom, and Yves Lemieux. 2020. Abnormal behavior detection using resource level to service level metrics mapping in virtualized systems. Future Generation Computer Systems 102 (2020), 680–700.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Josep Lluís Berral, Nicolas Poggi, David Carrera, Aaron Call, Rob Reinauer, and Daron Green. 2015. ALOJA: a framework for benchmarking and predictive analytics in Hadoop deployments. IEEE Transactions on Emerging Topics in Computing 5, 4 (2015), 480–493.Google ScholarGoogle ScholarCross RefCross Ref
  26. Elham Besharati, Marjan Naderan, and Ehsan Namjoo. 2019. LR-HIDS: logistic regression host-based intrusion detection system for cloud environments. Journal of Ambient Intelligence and Humanized Computing 10, 9 (2019), 3669–3692.Google ScholarGoogle ScholarCross RefCross Ref
  27. Nitesh Bharot, Veenadhari Suraparaju, and Sanjeev Gupta. 2019. DDoS Attack Detection and Clustering of Attacked and Non-attacked VMs Using SOM in Cloud Network. In International Conference on Advances in Computing and Data Sciences. Springer, 369–378.Google ScholarGoogle Scholar
  28. Dhruba Kumar Bhattacharyya and Jugal Kumar Kalita. 2013. Network anomaly detection: A machine learning perspective. Crc Press.Google ScholarGoogle Scholar
  29. Monowar H Bhuyan, Dhruba Kumar Bhattacharyya, and Jugal K Kalita. 2013. Network anomaly detection: methods, systems and tools. Ieee communications surveys & tutorials 16, 1 (2013), 303–336.Google ScholarGoogle Scholar
  30. Rodrigo N Calheiros, Kotagiri Ramamohanarao, Rajkumar Buyya, Christopher Leckie, and Steve Versteeg. 2017. On the effectiveness of isolation-based anomaly detection in cloud data centers. Concurrency and Computation: Practice and Experience 29, 18(2017), e4169.Google ScholarGoogle ScholarCross RefCross Ref
  31. Lelio Campanile, Mauro Iacono, Fabio Martinelli, Fiammetta Marulli, Michele Mastroianni, Francesco Mercaldo, and Antonella Santone. 2020. Towards the Use of Generative Adversarial Neural Networks to Attack Online Resources. In Workshops of the International Conference on Advanced Information Networking and Applications. Springer, 890–901.Google ScholarGoogle ScholarCross RefCross Ref
  32. Marta Catillo, Massimiliano Rak, and Umberto Villano. 2020. 2L-ZED-IDS: A Two-Level Anomaly Detector for Multiple Attack Classes. In Workshops of the International Conference on Advanced Information Networking and Applications. Springer, 687–696.Google ScholarGoogle ScholarCross RefCross Ref
  33. Varun Chandola, Arindam Banerjee, and Vipin Kumar. 2009. Anomaly detection: A survey. ACM computing surveys (CSUR) 41, 3 (2009), 1–58.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Hongyang Chen, Pengfei Chen, and Guangba Yu. 2020. A Framework of Virtual War Room and Matrix Sketch-Based Streaming Anomaly Detection for Microservice Systems. IEEE Access 8(2020), 43413–43426.Google ScholarGoogle ScholarCross RefCross Ref
  35. Qiang Chen. 2016. Research on Distributed Anomaly Traffic Detection Technology Based on Hadoop Platform. In International Conference on Bio-Inspired Computing: Theories and Applications. Springer, 530–535.Google ScholarGoogle Scholar
  36. Zouhair Chiba, Noreddine Abghour, Khalid Moussaid, Amina El Omri, and Mohamed Rida. 2018. Novel Network IDS in Cloud Environment Based on Optimized BP Neural Network Using Genetic Algorithm. In Proceedings of the 3rd International Conference on Smart City Applications. 1–9.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Zouhair Chiba, Noreddine Abghour, Khalid Moussaid, Amina El Omri, and Mohamed Rida. 2019. An Efficient Network IDS for Cloud Environments Based on a Combination of Deep Learning and an Optimized Self-adaptive Heuristic Search Algorithm. In International Conference on Networked Systems. Springer, 235–249.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Zouhair Chiba, Noreddine Abghour, Khalid Moussaid, Amina El Omri, and Mohamed Rida. 2019. Smart Approach to Build A Deep Neural Network Based IDS for Cloud Environment Using an Optimized Genetic Algorithm. In Proceedings of the 2nd International Conference on Networking, Information Systems & Security. 1–12.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Chien-Yi Chiu, Chi-Tien Yeh, and Yuh-Jye Lee. 2013. Frequent pattern based user behavior anomaly detection for cloud system. In 2013 Conference on Technologies and Applications of Artificial Intelligence. IEEE, 61–66.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Ashley Chonka, Yang Xiang, Wanlei Zhou, and Alessio Bonti. 2011. Cloud Security Defence to Protect Cloud Computing against HTTP-DoS and XML-DoS Attacks. J. Netw. Comput. Appl. 34, 4 (July 2011), 1097–1107. https://doi.org/10.1016/j.jnca.2010.06.004Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Domenico Cotroneo, Luigi De Simone, Pietro Liguori, Roberto Natella, and Nematollah Bidokhti. 2019. Enhancing failure propagation analysis in cloud computing systems. In 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE). IEEE, 139–150.Google ScholarGoogle ScholarCross RefCross Ref
  42. DARPA. 1998. KDD 98. https://kdd.ics.uci.edu/databases/kddcup98/kddcup98.html. Accessed: 2020-10-26.Google ScholarGoogle Scholar
  43. DARPA. 1999. KDD 99. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. Accessed: 2020-10-26.Google ScholarGoogle Scholar
  44. Joel A Dawson, Jeffrey T McDonald, Lee Hively, Todd R Andel, Mark Yampolskiy, and Charles Hubbard. 2018. Phase space detection of virtual machine cyber events through hypervisor-level system call analysis. In 2018 1st International Conference on Data Intelligence and Security (ICDIS). IEEE, 159–167.Google ScholarGoogle ScholarCross RefCross Ref
  45. Marcos VO De Assis, Anderson H Hamamoto, Taufik Abrão, and Mario Lemes Proença. 2017. A game theoretical based system using holt-winters and genetic algorithm with fuzzy logic for DoS/DDoS mitigation on SDN networks. IEEE Access 5(2017), 9485–9496.Google ScholarGoogle ScholarCross RefCross Ref
  46. Marcos VO De Assis, Matheus P Novaes, Cinara B Zerbini, Luiz F Carvalho, Taufik Abrãao, and Mario L Proença. 2018. Fast defense system against attacks in software defined networks. IEEE Access 6(2018), 69620–69639.Google ScholarGoogle ScholarCross RefCross Ref
  47. Pooja Dehraj and Arun Sharma. 2020. A review on architecture and models for autonomic software systems. JOURNAL OF SUPERCOMPUTING(2020).Google ScholarGoogle Scholar
  48. Frank Doelitzscher, Martin Knahl, Christoph Reich, and Nathan Clarke. 2013. Anomaly detection in iaas clouds. In 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, Vol. 1. IEEE, 387–394.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Christos Douligeris and Aikaterini Mitrokotsa. 2004. DDoS attacks and defense mechanisms: classification and state-of-the-art. Computer Networks 44, 5 (2004), 643 – 666. https://doi.org/10.1016/j.comnet.2003.10.003Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Qingfeng Du, Tiandi Xie, and Yu He. 2018. Anomaly detection and diagnosis for container-based microservices with performance monitoring. In International Conference on Algorithms and Architectures for Parallel Processing. Springer, 560–572.Google ScholarGoogle ScholarCross RefCross Ref
  51. Xindong Duan. 2019. Research on abnormal data detection method of web browser in cloud computing environment. Cluster Computing 22, 1 (2019), 1229–1238.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Iman El Mir, Abdelkrim Haqiq, and Dong Seong Kim. 2016. Performance analysis and security based on intrusion detection and prevention systems in cloud data centers. In International Conference on Hybrid Intelligent Systems. Springer, 456–465.Google ScholarGoogle Scholar
  53. Marwa A Elsayed and Mohammad Zulkernine. 2020. PredictDeep: Security Analytics as a Service for Anomaly Detection and Prediction. IEEE Access 8(2020), 45184–45197.Google ScholarGoogle ScholarCross RefCross Ref
  54. Mostafa Farshchi, Jean-Guy Schneider, Ingo Weber, and John Grundy. 2018. Metric selection and anomaly detection for cloud operations using log and metric correlation analysis. Journal of Systems and Software 137 (2018), 531–549.Google ScholarGoogle ScholarCross RefCross Ref
  55. Diogo AB Fernandes, Mário M Freire, Paulo AP Fazendeiro, and Pedro RM Inácio. 2017. Applications of artificial immune systems to computer security: A survey. Journal of Information Security and Applications 35 (2017), 138–159.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Jaron Fontaine, Chris Kappler, Adnan Shahid, and Eli De Poorter. 2019. Log-Based Intrusion Detection for Cloud Web Applications Using Machine Learning. In International Conference on P2P, Parallel, Grid, Cloud and Internet Computing. Springer, 197–210.Google ScholarGoogle Scholar
  57. Canadian Institute for Cybersecurity. 2018. CSE-CIC-IDS2018. https://www.unb.ca/cic/datasets/ids-2018.html. Accessed: 2020-10-26.Google ScholarGoogle Scholar
  58. Song Fu, Jianguo Liu, and Husanbir Pannu. 2012. A hybrid anomaly detection framework in cloud computing using one-class and two-class support vector machines. In International Conference on Advanced Data Mining and Applications. Springer, 726–738.Google ScholarGoogle ScholarCross RefCross Ref
  59. Matthias Gander, Michael Felderer, Basel Katt, Adrian Tolbaru, Ruth Breu, and Alessandro Moschitti. 2012. Anomaly detection in the cloud: Detecting security incidents via machine learning. In International Workshop on Eternal Systems. Springer, 103–116.Google ScholarGoogle Scholar
  60. P Ganeshkumar and N Pandeeswari. 2016. Adaptive neuro-fuzzy-based anomaly detection system in cloud. International Journal of Fuzzy Systems 18, 3 (2016), 367–378.Google ScholarGoogle ScholarCross RefCross Ref
  61. Sahil Garg, Kuljeet Kaur, Shalini Batra, Gagangeet Singh Aujla, Graham Morgan, Neeraj Kumar, Albert Y Zomaya, and Rajiv Ranjan. 2020. En-ABC: An ensemble artificial bee colony based anomaly detection scheme for cloud environment. J. Parallel and Distrib. Comput. 135 (2020), 219–233.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Sahil Garg, Kuljeet Kaur, Neeraj Kumar, Georges Kaddoum, Albert Y Zomaya, and Rajiv Ranjan. 2019. A hybrid deep learning-based model for anomaly detection in cloud datacenter networks. IEEE Transactions on Network and Service Management 16, 3(2019), 924–935.Google ScholarGoogle ScholarCross RefCross Ref
  63. Partha Ghosh, Meghna Bardhan, Nilabhra Roy Chowdhury, Santanu Phadikar, 2017. IDS using reinforcement learning Automata for Preserving security in cloud environment. International Journal of Information System Modeling and Design (IJISMD) 8, 4(2017), 21–37.Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Partha Ghosh, Abhay Kumar Mandal, and Rupesh Kumar. 2015. An efficient cloud network intrusion detection system. In Information systems design and intelligent applications. Springer, 91–99.Google ScholarGoogle Scholar
  65. Partha Ghosh, Shivam Shakti, and Santanu Phadikar. 2016. A cloud intrusion detection system using novel PRFCM clustering and KNN based dempster-shafer rule. International Journal of Cloud Applications and Computing (IJCAC) 6, 4(2016), 18–35.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Anteneh Girma, Mosses Garuba, and Rajini Goel. 2018. Advanced machine language approach to detect DDoS attack using DBSCAN clustering technology with entropy. In Information Technology-New Generations. Springer, 125–131.Google ScholarGoogle Scholar
  67. Ian Goodfellow, Yoshua Bengio, Aaron Courville, and Yoshua Bengio. 2016. Deep learning. Vol. 1. MIT press Cambridge.Google ScholarGoogle Scholar
  68. Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in neural information processing systems. 2672–2680.Google ScholarGoogle Scholar
  69. Qiang Guan, Song Fu, Nathan DeBardeleben, and Sean Blanchard. 2013. Exploring time and frequency domains for accurate and automated anomaly detection in cloud computing systems. In 2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing. IEEE, 196–205.Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Fabio Guigou, Pierre Collet, and Pierre Parrend. 2017. Anomaly detection and motif discovery in symbolic representations of time series. arXiv preprint arXiv:1704.05325(2017).Google ScholarGoogle Scholar
  71. Fabio Guigou, Pierre Collet, and Pierre Parrend. 2019. SCHEDA: Lightweight euclidean-like heuristics for anomaly detection in periodic time series. Applied Soft Computing 82 (2019), 105594.Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Halim Görkem Gülmez, Emrah Tuncel, and Pelin Angin. 2018. A big data analytical approach to cloud intrusion detection. In International Conference on Cloud Computing. Springer, 377–388.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Hang Guo, Xun Fan, Anh Cao, Geoff Outhred, and John Heidemann. 2019. Peek Inside the Closed World: Evaluating Autoencoder-Based Detection of DDoS to Cloud. arXiv preprint arXiv:1912.05590(2019).Google ScholarGoogle Scholar
  74. Waqas Haider, Jiankun Hu, and Nour Moustafa. 2017. Designing anomaly detection system for cloud servers by frequency domain features of system call identifiers and machine learning. In International Conference on Mobile Networks and Management. Springer, 137–149.Google ScholarGoogle Scholar
  75. Douglas M Hawkins. 1980. Identification of outliers. Vol. 11. Springer.Google ScholarGoogle Scholar
  76. Jordan Hochenbaum, Owen S Vallis, and Arun Kejariwal. 2017. Automatic anomaly detection in the cloud via statistical learning. arXiv preprint arXiv:1704.07706(2017).Google ScholarGoogle Scholar
  77. Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735–1780.Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Bin Hong, Yazhou Hu, Fuyang Peng, and Bo Deng. 2015. Distributed state monitoring for IaaS Cloud with continuous observation sequence. In 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom). IEEE, 1037–1042.Google ScholarGoogle Scholar
  79. Bin Hong, Fuyang Peng, Bo Deng, Yazhou Hu, and Dongxia Wang. 2015. DAC-Hmm: detecting anomaly in cloud systems with hidden Markov models. Concurrency and Computation: Practice and Experience 27, 18(2015), 5749–5764.Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. Guang-Bin Huang, Qin-Yu Zhu, and Chee-Kheong Siew. 2006. Extreme learning machine: theory and applications. Neurocomputing 70, 1-3 (2006), 489–501.Google ScholarGoogle ScholarCross RefCross Ref
  81. Tian Huang, Yongxin Zhu, Yafei Wu, Stéphane Bressan, and Gillian Dobbie. 2016. Anomaly detection and identification scheme for VM live migration in cloud infrastructure. Future Generation Computer Systems 56 (2016), 736–745.Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Tian Huang, Yan Zhu, Qiannan Zhang, Yongxin Zhu, Dongyang Wang, Meikang Qiu, and Lei Liu. 2013. An lof-based adaptive anomaly detection scheme for cloud computing. In 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops. IEEE, 206–211.Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Nurudeen Mahmud Ibrahim and Anazida Zainal. 2019. An Adaptive Intrusion Detection Scheme for Cloud Computing. International Journal of Swarm Intelligence Research (IJSIR) 10, 4(2019), 53–70.Google ScholarGoogle ScholarCross RefCross Ref
  84. Nurudeen Mahmud Ibrahim and Anazida Zainal. 2020. A Distributed Intrusion Detection Scheme for Cloud Computing. International Journal of Distributed Systems and Technologies (IJDST) 11, 1(2020), 68–82.Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. Mohamed Idhammad, Karim Afdel, and Mustapha Belouch. 2018. Distributed intrusion detection system for cloud environments based on data mining techniques. Procedia Computer Science 127 (2018), 35–41.Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. Mohammad Islam and Andriy Miranskyy. 2020. Anomaly Detection in Cloud Components.Google ScholarGoogle Scholar
  87. Aws Naser Jaber and Shafiq Ul Rehman. 2020. FCM–SVM based intrusion detection system for cloud computing environment. Cluster Computing (2020), 1–11.Google ScholarGoogle Scholar
  88. Aws Naser Jaber, Mohamad Fadli Zolkipli, Hasan Awni Shakir, and Mohammed R Jassim. 2017. Host based intrusion detection and prevention model against DDoS attack in cloud computing. In International Conference on P2P, Parallel, Grid, Cloud and Internet Computing. Springer, 241–252.Google ScholarGoogle Scholar
  89. Hiranya Jayathilaka, Chandra Krintz, and Rich Wolski. 2017. Performance monitoring and root cause analysis for cloud-hosted web applications. In Proceedings of the 26th International Conference on World Wide Web. 469–478.Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. Priyanka Joshi, Ritu Prasad, Pradeep Mewada, and Praneet Saurabh. 2018. A New Neural Network-Based IDS for Cloud Computing. In Progress in Computing, Analytics and Networking. Springer, 161–170.Google ScholarGoogle Scholar
  91. El Mehdi Kandoussi, Iman El Mir, Mohamed Hanini, and Abdelkrim Haqiq. 2017. Modeling an anomaly-based intrusion prevention system using game theory. In International conference on innovations in bio-inspired computing and applications. Springer, 266–276.Google ScholarGoogle Scholar
  92. Hisham A Kholidy. 2019. Correlation-based sequence alignment models for detecting masquerades in cloud computing. IET Information Security 14, 1 (2019), 39–50.Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. Hyunjoo Kim, Jonghyun Kim, Youngsoo Kim, Ikkyun Kim, and Kuinam J Kim. 2019. Design of network threat detection and classification based on machine learning on cloud computing. Cluster Computing 22, 1 (2019), 2341–2350.Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. Teuvo Kohonen. 2012. Self-organizing maps. Vol. 30. Springer Science & Business Media.Google ScholarGoogle Scholar
  95. Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, and Benjamin Turnbull. 2019. Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Generation Computer Systems 100 (2019), 779–796.Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. Rafał Kozik, Michał Choraś, Witold Hołubowicz, and Rafał Renk. 2016. Extreme learning machines for web layer anomaly detection. In International Conference on Image Processing and Communications. Springer, 226–233.Google ScholarGoogle Scholar
  97. S Krishnaveni, Palani Vigneshwar, S Kishore, B Jothi, and S Sivamohan. 2020. Anomaly-Based Intrusion Detection System Using Support Vector Machine. In Artificial Intelligence and Evolutionary Computations in Engineering Systems. Springer, 723–731.Google ScholarGoogle Scholar
  98. Ram Shankar Siva Kumar, Andrew Wicker, and Matt Swann. 2017. Practical machine learning for cloud intrusion detection: challenges and the way forward. In Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security. 81–90.Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. Yann LeCun, Bernhard Boser, John S Denker, Donnie Henderson, Richard E Howard, Wayne Hubbard, and Lawrence D Jackel. 1989. Backpropagation applied to handwritten zip code recognition. Neural computation 1, 4 (1989), 541–551.Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. Alexander Lenk, Markus Klems, Jens Nimis, Stefan Tai, and Thomas Sandholm. 2009. What’s inside the Cloud? An architectural map of the Cloud landscape. In 2009 ICSE workshop on software engineering challenges of cloud computing. IEEE, 23–31.Google ScholarGoogle ScholarDigital LibraryDigital Library
  101. Dan Li, Dacheng Chen, Jonathan Goh, and See-kiong Ng. 2018. Anomaly detection with generative adversarial networks for multivariate time series. arXiv preprint arXiv:1809.04758(2018).Google ScholarGoogle Scholar
  102. Mingwei Lin, Zhiqiang Yao, Fei Gao, and Yang Li. 2015. Toward anomaly detection in iaas cloud computing platforms. International Journal of Security and Its Applications 9, 12(2015), 175–188.Google ScholarGoogle ScholarCross RefCross Ref
  103. Mingwei Lin, Zhiqiang Yao, Fei Gao, and Yang Li. 2016. A Virtual Machine Instance Anomaly Detection System for IaaS Cloud Computing. International Journal of Future Generation Communication and Networking 9, 3(2016), 255–268.Google ScholarGoogle ScholarCross RefCross Ref
  104. Jiaxin Liu, Xucheng Song, Yingjie Zhou, Xi Peng, Yanru Zhang, Pei Liu, and Dapeng Wu. 2019. Deep Anomaly Detection in Packet Payload. arXiv preprint arXiv:1912.02549(2019).Google ScholarGoogle Scholar
  105. Yuan Liu and Ruhui Ma. 2013. Network anomaly detection based on BQPSO-BN algorithm. IETE Journal of Research 59, 4 (2013), 334–342.Google ScholarGoogle ScholarCross RefCross Ref
  106. Tania Lorido-Botran, Sergio Huerta, Luis Tomás, Johan Tordsson, and Borja Sanz. 2017. An unsupervised approach to online noisy-neighbor detection in cloud data centers. Expert Systems with Applications 89 (2017), 188–204.Google ScholarGoogle ScholarDigital LibraryDigital Library
  107. Widad Mirghani Makki, Maheyzah MD Siraj, and Nurudeen Mahmud Ibrahim. 2019. A Harmony Search-Based Feature Selection Technique for Cloud Intrusion Detection. In International Conference of Reliable Information and Communication Technology. Springer, 779–788.Google ScholarGoogle Scholar
  108. Haroon Malik, Ian J Davis, Michael W Godfrey, Douglas Neuse, and Serge Manskovskii. 2016. Connecting the dots: anomaly and discontinuity detection in large-scale systems. Journal of Ambient Intelligence and Humanized Computing 7, 4 (2016), 509–522.Google ScholarGoogle ScholarCross RefCross Ref
  109. M Manickam and SP Rajagopalan. 2019. A hybrid multi-layer intrusion detection system in cloud. Cluster Computing 22, 2 (2019), 3961–3969.Google ScholarGoogle ScholarDigital LibraryDigital Library
  110. M Mayuranathan, M Murugan, and V Dhanakoti. 2019. Best features based intrusion detection system by RBM model for detecting DDoS in cloud environment. Journal of Ambient Intelligence and Humanized Computing (2019), 1–11.Google ScholarGoogle Scholar
  111. Peter Mell, Tim Grance, 2011. The NIST definition of cloud computing. (2011).Google ScholarGoogle Scholar
  112. Fan Jing Meng, Xiao Zhang, Pengfei Chen, and Jing Min Xu. 2017. Driftinsight: detecting anomalous behaviors in large-scale cloud platform. In 2017 IEEE 10th International Conference on Cloud Computing (CLOUD). IEEE, 230–237.Google ScholarGoogle ScholarCross RefCross Ref
  113. HaiBo Mi, HuaiMin Wang, YangFan Zhou, Michael R Lyu, and Hua Cai. 2012. Localizing root causes of performance anomalies in cloud computing systems by analyzing request trace logs. Science China Information Sciences 55, 12 (2012), 2757–2773.Google ScholarGoogle ScholarCross RefCross Ref
  114. Haibo Mi, Huaimin Wang, Yangfan Zhou, Michael Rung-Tsong Lyu, Hua Cai, and Gang Yin. 2013. An online service-oriented performance profiling tool for cloud computing systems. Frontiers of Computer Science 7, 3 (2013), 431–445.Google ScholarGoogle ScholarDigital LibraryDigital Library
  115. Preeti Mishra, Akash Negi, ES Pilli, and RC Joshi. 2019. VMProtector: Malign Process Detection for Protecting Virtual Machines in Cloud Environment. In International Conference on Advances in Computing and Data Sciences. Springer, 360–369.Google ScholarGoogle Scholar
  116. Preeti Mishra, Emmanuel S Pilli, Vijay Varadharajan, and Udaya Tupakula. 2016. Securing virtual machines from anomalies using program-behavior analysis in cloud environment. In 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE, 991–998.Google ScholarGoogle Scholar
  117. Preeti Mishra, Emmanuel S Pilli, Vijay Varadharajan, and Udaya Tupakula. 2017. Intrusion detection techniques in cloud environment: A survey. Journal of Network and Computer Applications 77 (2017), 18–47.Google ScholarGoogle ScholarDigital LibraryDigital Library
  118. Chirag Modi and Dhiren Patel. 2018. A feasible approach to intrusion detection in virtual network layer of Cloud computing. Sādhanā 43, 7 (2018), 114.Google ScholarGoogle ScholarCross RefCross Ref
  119. Chirag N Modi and Kamatchi Acha. 2017. Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review. the Journal of Supercomputing 73, 3 (2017), 1192–1234.Google ScholarGoogle ScholarCross RefCross Ref
  120. Sara Kardani Moghaddam, Rajkumar Buyya, and Kotagiri Ramamohanarao. 2019. ACAS: An anomaly-based cause aware auto-scaling framework for clouds. J. Parallel and Distrib. Comput. 126 (2019), 107–120.Google ScholarGoogle ScholarDigital LibraryDigital Library
  121. Nour Moustafa, Gideon Creech, Elena Sitnikova, and Marwa Keshk. 2017. Collaborative anomaly detection framework for handling big data of cloud computing. In 2017 Military Communications and Information Systems Conference (MilCIS). IEEE, 1–6.Google ScholarGoogle ScholarCross RefCross Ref
  122. Nour Moustafa, Jiankun Hu, and Jill Slay. 2019. A holistic review of network anomaly detection systems: A comprehensive survey. Journal of Network and Computer Applications 128 (2019), 33–55.Google ScholarGoogle ScholarCross RefCross Ref
  123. Nour Moustafa and Jill Slay. 2015. UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In 2015 military communications and information systems conference (MilCIS). IEEE, 1–6.Google ScholarGoogle Scholar
  124. Pandeeswari Nagarajan and Ganeshkumar Perumal. 2015. A neuro fuzzy based intrusion detection system for a cloud data center using adaptive learning. Cybernetics and Information Technologies 15, 3 (2015), 88–103.Google ScholarGoogle ScholarDigital LibraryDigital Library
  125. T Nathiya and G Suseendran. 2019. An Effective Hybrid Intrusion Detection System for Use in Security Monitoring in the Virtual Network Layer of Cloud Computing Technology. In Data Management, Analytics and Innovation. Springer, 483–497.Google ScholarGoogle Scholar
  126. Anjum Nazir and Rizwan Ahmed Khan. 2019. Combinatorial Optimization based Feature Selection Method: A study on Network Intrusion Detection. arXiv preprint arXiv:1906.04494(2019).Google ScholarGoogle Scholar
  127. Hani Neuvirth, Yehuda Finkelstein, Amit Hilbuch, Shai Nahum, Daniel Alon, and Elad Yom-Tov. 2015. Early detection of fraud storms in the cloud. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 53–67.Google ScholarGoogle ScholarCross RefCross Ref
  128. Laisen Nie, Dingde Jiang, and Zhihan Lv. 2017. Modeling network traffic for traffic matrix estimation and anomaly detection based on Bayesian network in cloud computing networks. Annals of Telecommunications 72, 5-6 (2017), 297–305.Google ScholarGoogle ScholarCross RefCross Ref
  129. Roman Nikiforov. 2018. Clustering-based Anomaly Detection for microservices. arXiv preprint arXiv:1810.02762(2018).Google ScholarGoogle Scholar
  130. Caleb C Noble and Diane J Cook. 2003. Graph-based anomaly detection. In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining. 631–636.Google ScholarGoogle ScholarDigital LibraryDigital Library
  131. Onyekachi Nwamuo, Paulo Magella de Faria Quinan, Issa Traore, Isaac Woungang, and Abdulaziz Aldribi. 2019. Arguments Against Using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative. In International Conference on Machine Learning for Networking. Springer, 315–332.Google ScholarGoogle Scholar
  132. Emmanuel C. Ogu, Olusegun A. Ojesanmi, Oludele Awodele, and ’Shade Kuyoro. 2019. A Botnets Circumspection: The Current Threat Landscape, and What We Know So Far. Inf. 10, 11 (2019), 337. https://doi.org/10.3390/info10110337Google ScholarGoogle Scholar
  133. Opeyemi Osanaiye, Haibin Cai, Kim-Kwang Raymond Choo, Ali Dehghantanha, Zheng Xu, and Mqhele Dlodlo. 2016. Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP Journal on Wireless Communications and Networking 2016, 1(2016), 130.Google ScholarGoogle ScholarCross RefCross Ref
  134. Opeyemi Osanaiye, Kim-Kwang Raymond Choo, and Mqhele Dlodlo. 2016. Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. Journal of Network and Computer Applications 67 (2016), 147–165.Google ScholarGoogle ScholarDigital LibraryDigital Library
  135. David O’Shea, Vincent C Emeakaroha, John Pendlebury, Neil Cafferkey, John P Morrison, and Theo Lynn. 2016. A Wavelet-inspired Anomaly Detection Framework for Cloud Platforms. In CLOSER (1). 106–117.Google ScholarGoogle Scholar
  136. Cemile Diler Özdemir, Mehmet Tahir Sandıkkaya, and Yusuf Yaslan. 2018. Malicious Behavior Classification in PaaS. In International Conference on Cloud Computing and Services Science. Springer, 215–232.Google ScholarGoogle Scholar
  137. David O’Shea, Vincent C Emeakaroha, Neil Cafferkey, John P Morrison, and Theo Lynn. 2016. Detecting Anomaly in Cloud Platforms Using a Wavelet-Based Framework. In International Conference on Cloud Computing and Services Science. Springer, 131–150.Google ScholarGoogle Scholar
  138. N Pandeeswari and R Karuppathal. 2017. Hypervisor Based Anomaly Detection System in Cloud Computing Using ANFIS. 網際網路技術學刊 18, 6 (2017), 1335–1344.Google ScholarGoogle Scholar
  139. N Pandeeswari and Ganesh Kumar. 2016. Anomaly detection system in cloud environment using fuzzy clustering based ANN. Mobile Networks and Applications 21, 3 (2016), 494–505.Google ScholarGoogle ScholarDigital LibraryDigital Library
  140. Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari, and Joaquim Celestino Júnior. 2012. Taxonomy and proposed architecture of intrusion detection and prevention systems for cloud computing. In International Symposium on Cyberspace Safety and Security. Springer, 441–458.Google ScholarGoogle ScholarDigital LibraryDigital Library
  141. Rajendra Patil, Harsha Dudeja, and Chirag Modi. 2020. Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing. International Journal of Information Security 19, 2 (2020), 147–162.Google ScholarGoogle ScholarCross RefCross Ref
  142. Ady Wahyudi Paundu, Takeshi Okuda, Youki Kadobayashi, and Suguru Yamaguchi. 2015. Leveraging static probe instrumentation for vm-based anomaly detection system. In International Conference on Information and Communications Security. Springer, 320–334.Google ScholarGoogle Scholar
  143. Damai Jessica Prathyusha, Shaik Naseera, DJ Anusha, and K Alisha. 2020. A Review of Biologically Inspired Algorithms in a Cloud Environment to Combat DDoS Attacks. In Smart Intelligent Computing and Applications. Springer, 59–68.Google ScholarGoogle Scholar
  144. Juan Qiu, Qingfeng Du, Yu He, YiQun Lin, Jiaye Zhu, and Kanglin Yin. 2018. Performance anomaly detection models of virtual machines for network function virtualization infrastructure with machine learning. In International Conference on Artificial Neural Networks. Springer, 479–488.Google ScholarGoogle ScholarCross RefCross Ref
  145. Mahdi Rabbani, Yong Li Wang, Reza Khoshkangini, Hamed Jelodar, Ruxin Zhao, and Peng Hu. 2020. A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing. Journal of Network and Computer Applications 151 (2020), 102507.Google ScholarGoogle ScholarDigital LibraryDigital Library
  146. Sivakami Raja and Saravanan Ramaiah. 2017. An efficient fuzzy-based hybrid system to cloud intrusion detection. International Journal of Fuzzy Systems 19, 1 (2017), 62–77.Google ScholarGoogle ScholarCross RefCross Ref
  147. Sutharshan Rajasegarar, Christopher Leckie, and Marimuthu Palaniswami. 2008. Anomaly detection in wireless sensor networks. IEEE Wireless Communications 15, 4 (2008), 34–40.Google ScholarGoogle ScholarDigital LibraryDigital Library
  148. Divya Rajput and Ankit Thakkar. 2019. A Survey on Different Network Intrusion Detection Systems and CounterMeasure. In Emerging Research in Computing, Information, Communication and Applications. Springer, 497–506.Google ScholarGoogle Scholar
  149. AC Ramachandra, Subhrajit Bhattacharya, 2020. Literature Survey on Log-Based Anomaly Detection Framework in Cloud. In Computational Intelligence in Pattern Recognition. Springer, 143–153.Google ScholarGoogle Scholar
  150. Rui Ren, Jinheng Li, Lei Wang, Jianfeng Zhan, and Zheng Cao. 2018. Anomaly Analysis for Co-located Datacenter Workloads in the Alibaba Cluster. arXiv preprint arXiv:1811.06901(2018).Google ScholarGoogle Scholar
  151. Markus Ring, Sarah Wunderlich, Dominik Grüdl, Dieter Landes, and Andreas Hotho. 2017. Flow-based benchmark data sets for intrusion detection. In Proceedings of the 16th European conference on cyber warfare and security. 361–369.Google ScholarGoogle Scholar
  152. S. Roschke, F. Cheng, and C. Meinel. 2009. Intrusion Detection in the Cloud. In 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing. 729–734. https://doi.org/10.1109/DASC.2009.94Google ScholarGoogle ScholarDigital LibraryDigital Library
  153. David E Rumelhart, Geoffrey E Hinton, and Ronald J Williams. 1986. Learning representations by back-propagating errors. nature 323, 6088 (1986), 533–536.Google ScholarGoogle Scholar
  154. Mikail Mohammed Salim, Shailendra Rathore, and Jong Hyuk Park. 2019. Distributed denial of service attacks and its defenses in IoT: a survey. The Journal of Supercomputing(2019), 1–44.Google ScholarGoogle Scholar
  155. Mohd Rafiz Salji, Nur Izura Udzir, Mohd Izuan Hafez Ninggal, Nor Fazlida Mohd Sani, and Hamidah Ibrahim. 2016. An Anomaly Detection Algorithm based on Online Learning Lagrangian SVM for Cloud Computing Environment. International Journal of Security and Its Applications 10, 12(2016), 173–186.Google ScholarGoogle ScholarCross RefCross Ref
  156. Tara Salman, Deval Bhamare, Aiman Erbad, Raj Jain, and Mohammed Samaka. 2017. Machine learning for anomaly detection and categorization in multi-cloud environments. In 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud). IEEE, 97–103.Google ScholarGoogle ScholarCross RefCross Ref
  157. Mehmet Tahir Sandıkkaya, Yusuf Yaslan, and Cemile Diler Özdemir. 2019. DeMETER in clouds: detection of malicious external thread execution in runtime with machine learning in PaaS clouds. Cluster Computing (2019), 1–14.Google ScholarGoogle Scholar
  158. S Sandosh, V Govindasamy, and G Akila. 2020. Enhanced intrusion detection system via agent clustering and classification based on outlier detection. Peer-to-Peer Networking and Applications(2020), 1–8.Google ScholarGoogle Scholar
  159. Carla Sauvanaud, Mohamed Kaâniche, Karama Kanoun, Kahina Lazri, and Guthemberg Da Silva Silvestre. 2018. Anomaly detection and diagnosis for cloud services: Practical experiments and lessons learned. Journal of Systems and Software 139 (2018), 84–106.Google ScholarGoogle ScholarDigital LibraryDigital Library
  160. Thomas Schlegl, Philipp Seeböck, Sebastian M Waldstein, Georg Langs, and Ursula Schmidt-Erfurth. 2019. f-anogan: Fast unsupervised anomaly detection with generative adversarial networks. Medical image analysis 54 (2019), 30–44.Google ScholarGoogle Scholar
  161. Florian Schmidt, Florian Suri-Payer, Anton Gulenko, Marcel Wallschläger, Alexander Acker, and Odej Kao. 2018. Unsupervised anomaly event detection for cloud monitoring using online arima. In 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion). IEEE, 71–76.Google ScholarGoogle ScholarCross RefCross Ref
  162. Florian Schmidt, Florian Suri-Payer, Anton Gulenko, Marcel Wallschläger, Alexander Acker, and Odej Kao. 2018. Unsupervised Anomaly Event Detection for VNF Service Monitoring Using Multivariate Online Arima. In 2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 278–283.Google ScholarGoogle Scholar
  163. Aravinthkumar Selvaraj, Rizwan Patan, Amir H Gandomi, Ganesh Gopal Deverajan, and Manjula Pushparaj. 2019. Optimal virtual machine selection for anomaly detection using a swarm intelligence approach. Applied soft computing 84 (2019), 105686.Google ScholarGoogle Scholar
  164. Jitendra Kumar Seth and Satish Chandra. 2018. An Effective DOS Attack Detection Model in Cloud Using Artificial Bee Colony Optimization. 3D Research 9, 3 (2018), 44.Google ScholarGoogle Scholar
  165. Jitendra Kumar Seth and Satish Chandra. 2018. MIDS: Metaheuristic Based Intrusion Detection System for Cloud Using k-NN and MGWO. In International Conference on Advances in Computing and Data Sciences. Springer, 411–420.Google ScholarGoogle ScholarCross RefCross Ref
  166. Burr Settles. 2009. Active learning literature survey. Technical Report. University of Wisconsin-Madison Department of Computer Sciences.Google ScholarGoogle Scholar
  167. Wenyao Sha, Yongxin Zhu, Min Chen, and Tian Huang. 2015. Statistical learning for anomaly detection in cloud server systems: A multi-order Markov chain framework. IEEE transactions on cloud computing 6, 2 (2015), 401–413.Google ScholarGoogle Scholar
  168. Iman Sharafaldin, Arash Habibi Lashkari, and Ali A Ghorbani. 2018. Toward generating a new intrusion detection dataset and intrusion traffic characterization.. In ICISSP. 108–116.Google ScholarGoogle Scholar
  169. Vishal Sharma, Vinay Verma, and Anand Sharma. 2019. Detection of DDoS Attacks Using Machine Learning in Cloud Computing. In International Conference on Advanced Informatics for Computing Research. Springer, 260–273.Google ScholarGoogle Scholar
  170. Chaochen Shi and Jiangshan Yu. 2019. A Hidden Markov Model-Based Method for Virtual Machine Anomaly Detection. In International Conference on Provable Security. Springer, 372–380.Google ScholarGoogle ScholarDigital LibraryDigital Library
  171. Guthemberg Silvestre, Carla Sauvanaud, Mohamed Kaâniche, and Karama Kanoun. 2015. Tejo: A supervised anomaly detection scheme for newSQL databases. In International Workshop on Software Engineering for Resilient Systems. Springer, 114–127.Google ScholarGoogle ScholarDigital LibraryDigital Library
  172. Steven Simpson, Simon Oechsner, Andreas Mauthe, David Hutchison, 2015. A framework for resilience management in the cloud. e & i Elektrotechnik und Informationstechnik 132, 2(2015), 122–132.Google ScholarGoogle Scholar
  173. GS Smrithy and Ramadoss Balakrishnan. 2016. A statistical technique for online anomaly detection for big data streams in cloud collaborative environment. In 2016 IEEE International Conference on Computer and Information Technology (CIT). IEEE, 108–111.Google ScholarGoogle ScholarCross RefCross Ref
  174. Imen Souiden, Zaki Brahmi, and Lamine Lafi. 2017. Data stream mining based-outlier prediction for cloud computing. In International Conference on Digital Economy. Springer, 131–142.Google ScholarGoogle ScholarCross RefCross Ref
  175. T Raja Sree and S Mary Saira Bhanu. 2019. Detection of HTTP flooding attacks in cloud using fuzzy bat clustering. Neural Computing and Applications(2019), 1–17.Google ScholarGoogle Scholar
  176. Karthik Srinivasan, Azath Mubarakali, Abdulrahman Saad Alqahtani, and A Dinesh Kumar. 2019. A Survey on the Impact of DDoS Attacks in Cloud Computing: Prevention, Detection and Mitigation Techniques. In Intelligent Communication Technologies and Virtual Mobile Networks. Springer, 252–270.Google ScholarGoogle Scholar
  177. Madhan Kumar Srinivasan, K Sarukesi, Ashima Keshava, and P Revathy. 2012. ecloudids tier-1 ux-engine subsystem design and implementation using self-organizing map (som) for secure cloud computing environment. In International Conference on Security in Computer Networks and Distributed Systems. Springer, 432–443.Google ScholarGoogle ScholarCross RefCross Ref
  178. Siddharth Srinivasan, Akshay Kumar, Manik Mahajan, Dinkar Sitaram, and Sanchika Gupta. 2018. Probabilistic real-time intrusion detection system for docker containers. In International Symposium on Security in Computing and Communication. Springer, 336–347.Google ScholarGoogle Scholar
  179. Ioannis M Stephanakis, Ioannis P Chochliouros, Evangelos Sfakianakis, Syed Noorulhassan Shirazi, and David Hutchison. 2019. Hybrid self-organizing feature map (SOM) for anomaly detection in cloud infrastructures using granular clustering based upon value-difference metrics. Information Sciences 494(2019), 247–277.Google ScholarGoogle ScholarDigital LibraryDigital Library
  180. EK Subramanian and Latha Tamilselvan. 2019. A focus on future cloud: machine learning-based cloud security. Service Oriented Computing and Applications 13, 3 (2019), 237–249.Google ScholarGoogle ScholarDigital LibraryDigital Library
  181. Ilya Sutskever, Oriol Vinyals, and Quoc V Le. 2014. Sequence to sequence learning with neural networks. In Advances in neural information processing systems. 3104–3112.Google ScholarGoogle Scholar
  182. Hassan Takabi, James BD Joshi, and Gail-Joon Ahn. 2010. Security and privacy challenges in cloud computing environments. IEEE Security & Privacy 8, 6 (2010), 24–31.Google ScholarGoogle ScholarDigital LibraryDigital Library
  183. Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A Ghorbani. 2009. A detailed analysis of the KDD CUP 99 data set. In 2009 IEEE symposium on computational intelligence for security and defense applications. IEEE, 1–6.Google ScholarGoogle ScholarCross RefCross Ref
  184. Marina Thottan and Chuanyi Ji. 2003. Anomaly detection in IP networks. IEEE Transactions on signal processing 51, 8 (2003), 2191–2204.Google ScholarGoogle ScholarDigital LibraryDigital Library
  185. Siva Rama Krishna Tummalapalli and ASN Chakravarthy. 2020. Intrusion detection system for cloud forensics using bayesian fuzzy clustering and optimization based SVNN. Evolutionary Intelligence(2020), 1–11.Google ScholarGoogle Scholar
  186. Ozan Tuncer, Emre Ates, Yijia Zhang, Ata Turk, Jim Brandt, Vitus J Leung, Manuel Egele, and Ayse K Coskun. 2017. Diagnosing performance variations in HPC applications using machine learning. In International Supercomputing Conference. Springer, 355–373.Google ScholarGoogle ScholarDigital LibraryDigital Library
  187. Olufogorehan Tunde-Onadele, Jingzhu He, Ting Dai, and Xiaohui Gu. 2019. A study on container vulnerability exploit detection. In 2019 IEEE International Conference on Cloud Engineering (IC2E). IEEE, 121–127.Google ScholarGoogle ScholarCross RefCross Ref
  188. UNM. 1998. Sequence-based Intrusion Detection. https://www.cs.unm.edu/~immsec/systemcalls.htm. Accessed: 2020-10-26.Google ScholarGoogle Scholar
  189. Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob Uszkoreit, Llion Jones, Aidan N Gomez, Łukasz Kaiser, and Illia Polosukhin. 2017. Attention is all you need. In Advances in neural information processing systems. 5998–6008.Google ScholarGoogle Scholar
  190. S Velliangiri and J Premalatha. 2019. Intrusion detection of distributed denial of service attack in cloud. Cluster Computing 22, 5 (2019), 10615–10623.Google ScholarGoogle ScholarCross RefCross Ref
  191. Toby Velte, Anthony Velte, and Robert Elsenpeter. 2009. Cloud computing, a practical approach. McGraw-Hill, Inc.Google ScholarGoogle Scholar
  192. Priyanka Verma, Shashikala Tapaswi, and W Wilfred Godfrey. 2020. An Adaptive Threshold-Based Attribute Selection to Classify Requests Under DDoS Attack in Cloud-Based Systems. Arabian Journal for Science and Engineering 45, 4 (2020), 2813–2834.Google ScholarGoogle ScholarCross RefCross Ref
  193. GuiPing Wang and JiaWei Wang. 2016. An anomaly detection framework for detecting anomalous virtual machines under cloud computing environment. International Journal of Security and Its Applications 10, 1(2016), 75–86.Google ScholarGoogle ScholarCross RefCross Ref
  194. GuiPing Wang, JianXi Yang, and Ren Li. 2019. UFKLDA: An unsupervised feature extraction algorithm for anomaly detection under cloud environment. ETRI Journal 41, 5 (2019), 684–695.Google ScholarGoogle ScholarCross RefCross Ref
  195. Tao Wang, Jiwei Xu, Wenbo Zhang, Zeyu Gu, and Hua Zhong. 2018. Self-adaptive cloud monitoring with online anomaly detection. Future Generation Computer Systems 80 (2018), 89–101.Google ScholarGoogle ScholarDigital LibraryDigital Library
  196. Michael R Watson, Angelos K Marnerides, Andreas Mauthe, David Hutchison, 2015. Malware detection in cloud computing infrastructures. IEEE Transactions on Dependable and Secure Computing 13, 2 (2015), 192–205.Google ScholarGoogle ScholarDigital LibraryDigital Library
  197. Wei Xiong, Hanping Hu, Naixue Xiong, Laurence T Yang, Wen-Chih Peng, Xiaofei Wang, and Yanzhen Qu. 2014. Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications. Information Sciences 258(2014), 403–415.Google ScholarGoogle ScholarDigital LibraryDigital Library
  198. Ke Xu, Yun Wang, Leni Yang, Yifang Wang, Bo Qiao, Si Qin, Yong Xu, Haidong Zhang, and Huamin Qu. 2019. CloudDet: Interactive Visual Analysis of Anomalous Performances in Cloud Computing Systems. IEEE transactions on visualization and computer graphics 26, 1(2019), 1107–1117.Google ScholarGoogle Scholar
  199. Wei Xu, Ling Huang, Armando Fox, David Patterson, and Michael I Jordan. 2009. Detecting large-scale system problems by mining console logs. In Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles. 117–132.Google ScholarGoogle ScholarDigital LibraryDigital Library
  200. Youchang Xu, Ningjiang Chen, Ruwei Huang, and Hanlin Zhang. 2018. KPI Data Anomaly Detection Strategy for Intelligent Operation and Maintenance Under Cloud Environment. In International Conference on Intelligent Information Processing. Springer, 311–320.Google ScholarGoogle Scholar
  201. Youchang Xu, Ningjiang Chen, Hanlin Zhang, and Birui Liang. 2018. Adaptive Anomaly Detection Strategy Based on Reinforcement Learning. In International Conference of Pioneering Computer Scientists, Engineers and Educators. Springer, 493–504.Google ScholarGoogle Scholar
  202. Xiaoben Yan, Wei Zhou, Yun Gao, Zhang Zhang, Jizhong Han, and Ge Fu. 2014. Padm: Page rank-based anomaly detection method of log sequences by graph computing. In 2014 IEEE 6th International Conference on Cloud Computing Technology and Science. IEEE, 700–703.Google ScholarGoogle ScholarDigital LibraryDigital Library
  203. Chen Yang. 2019. Anomaly network traffic detection algorithm based on information entropy measurement under the cloud computing environment. Cluster Computing 22, 4 (2019), 8309–8317.Google ScholarGoogle ScholarCross RefCross Ref
  204. Kejiang Ye. 2017. Anomaly Detection in Clouds: Challenges and Practice. In Proceedings of the First Workshop on Emerging Technologies for Software-Defined and Reconfigurable Hardware-Accelerated Cloud Datacenters (Xi’an, China) (ETCD’17). Association for Computing Machinery, New York, NY, USA, Article 6, 2 pages. https://doi.org/10.1145/3129457.3129497Google ScholarGoogle ScholarDigital LibraryDigital Library
  205. Kejiang Ye, Yangyang Liu, Guoyao Xu, and Cheng-Zhong Xu. 2018. Fault injection and detection for artificial intelligence applications in container-based clouds. In International Conference on Cloud Computing. Springer, 112–127.Google ScholarGoogle ScholarDigital LibraryDigital Library
  206. Chuan Yin, Canlin Pan, and Pengquan Zhang. 2020. Deep neural network combined with MapReduce for abnormal data mining and detection in cloud storage. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2020).Google ScholarGoogle Scholar
  207. Yue Yuan, Anuhan Torgonshar, Wenchang Shi, Bin Liang, and Bo Qin. 2018. Digging Evidence for Violation of Cloud Security Compliance with Knowledge Learned from Logs. In Chinese Conference on Trusted Computing and Information Security. Springer, 318–337.Google ScholarGoogle Scholar
  208. Mattia Zago, Manuel Gil Pérez, and Gregorio Martínez Pérez. 2019. Scalable detection of botnets based on DGA. Soft Computing (2019), 1–21.Google ScholarGoogle Scholar
  209. Jing Zhang. 2019. Anomaly detecting and ranking of the cloud computing platform by multi-view learning. Multimedia Tools and Applications 78, 21 (2019), 30923–30942.Google ScholarGoogle ScholarCross RefCross Ref
  210. Jian Zhang, Yawei Zhang, Pin Liu, and Jianbiao He. 2016. A spark-based DDoS attack detection model in cloud services. In International Conference on Information Security Practice and Experience. Springer, 48–64.Google ScholarGoogle ScholarCross RefCross Ref
  211. Qiannan Zhang, Yafei Wu, Tian Huang, and Yongxin Zhu. 2013. An intelligent anomaly detection and reasoning scheme for VM live migration via cloud data mining. In 2013 IEEE 25th International Conference on Tools with Artificial Intelligence. IEEE, 412–419.Google ScholarGoogle ScholarDigital LibraryDigital Library
  212. Xiao Zhang, Fanjing Meng, and Jingmin Xu. 2018. Perfinsight: A robust clustering-based abnormal behavior detection system for large-scale cloud. In 2018 IEEE 11th International Conference on Cloud Computing (CLOUD). IEEE, 896–899.Google ScholarGoogle ScholarCross RefCross Ref
  213. Ziwei Zhang, Peng Cui, and Wenwu Zhu. 2020. Deep learning on graphs: A survey. IEEE Transactions on Knowledge and Data Engineering (2020).Google ScholarGoogle ScholarDigital LibraryDigital Library
  214. Beilei Zheng, Jianan Gu, and Chuliang Weng. 2019. CBA-Detector: An Accurate Detector Against Cache-Based Attacks Using HPCs and Pintools. In International Symposium on Advanced Parallel Processing Technologies. Springer, 109–122.Google ScholarGoogle Scholar
  215. Jingwen Zhou, Zhenbang Chen, Ji Wang, Zibin Zheng, and Michael R Lyu. 2015. A Data Set for User Request Trace-Oriented Monitoring and its Applications. IEEE Transactions on Services Computing 11, 4 (2015), 699–712.Google ScholarGoogle ScholarCross RefCross Ref
  216. Mikhail Zolotukhin, Elena Ivannikova, and Timo Hämäläinen. 2017. On detection of network-based co-residence verification attacks in sdn-driven clouds. In Internet of Things, Smart Spaces, and Next Generation Networks and Systems. Springer, 235–246.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    AICCC '20: Proceedings of the 2020 3rd Artificial Intelligence and Cloud Computing Conference
    December 2020
    114 pages
    ISBN:9781450388832
    DOI:10.1145/3442536

    Copyright © 2020 Owner/Author

    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 15 March 2021

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format