CPU and Network Traffic Anomaly Detection Method for Cloud Data Center

被引:0
|
作者
Zhu, Zheng [1 ]
Gu, Rongbin [2 ]
Pan, ChenLing [2 ]
Li, Youwei [3 ]
Zhu, Bei [3 ]
Li, Jing [3 ]
机构
[1] State Grid Shanghai Elect Power Co, Elect Power Res Inst, Shanghai, Peoples R China
[2] State Grid Shanghai Elect Power Co, Informat & Commun Co, Shanghai, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
关键词
Cloud Data Center; Anomaly Detection; DDoS Attack; Single Class Classification Algorithm; SYSTEM;
D O I
10.1145/3373477.3373501
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of the cloud service market, the number of network security attacks on cloud data centers is gradually increasing. The existing anomaly detection methods are all aimed at the research of known attacks, and there is not much progress on the research of some unknown attacks and workload peaks of cloud platforms. In order to deal with the unknown attack of the cloud platform and distinguish the behavior after the attack from the peak load under normal work, this paper studies a cloud data center anomaly detection method for Distributed Denial of Service(DDoS) attacks. We built a virtual machine cluster on openstack, simulated DDoS attacks on virtual machines, collected CPU utilization and network traffic data before and after the attack, and performed anomaly detection and analysis through a single class classification algorithm and analysis of time window sequences. We evaluated the performance of this method through lab-based experiments and real-world cloud data center experiments.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] LogKT: Hybrid Log Anomaly Detection Method for Cloud Data Center
    Ou, Xuedong
    Liu, Jing
    [J]. 2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 164 - 173
  • [2] An adaptive method for anomaly detection in symmetric network traffic
    Yu, Ming
    Zhou, Xi-Yuan
    [J]. COMPUTERS & SECURITY, 2007, 26 (06) : 427 - 433
  • [3] Applying Catastrophe Theory for Network Anomaly Detection in Cloud Computing Traffic
    Khatibzadeh, Leila
    Bornaee, Zarrintaj
    Bafghi, Abbas Ghaemi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [4] Design of the Network Traffic Anomaly Detection System in Cloud Computing Environment
    Zhang, Long
    Wang, Jinsong
    Lin, Sheng
    [J]. 2012 INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING (ISISE), 2012, : 16 - 19
  • [5] Anomaly detection in network traffic
    Duraj, Agnieszka
    Bucki, Pawel
    Drajling, Aleksander
    Makrocki, Robert
    Sipinski, Mateusz
    [J]. PRZEGLAD ELEKTROTECHNICZNY, 2022, 98 (12): : 205 - 208
  • [6] Visualization of Data Cubes for Anomaly Detection in Network Traffic Data Streams
    Ahlers, Volker
    Laue, Tim
    Wellermann, Nils
    Heine, Felix
    [J]. PROCEEDINGS OF THE THE 11TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS'2021), VOL 1, 2021, : 272 - 277
  • [7] Network traffic anomaly detection method based on chaotic neural network
    Sheng, Shaojun
    Wang, Xin
    [J]. ALEXANDRIA ENGINEERING JOURNAL, 2023, 77 : 567 - 579
  • [8] Automated Feature Selection for Anomaly Detection in Network Traffic Data
    Nakashima, Makiya
    Sim, Alex
    Kim, Youngsoo
    Kim, Jonghyun
    Kim, Jinoh
    [J]. ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2021, 12 (03)
  • [9] Data-Driven Network Analysis for Anomaly Traffic Detection
    Alam, Shumon
    Alam, Yasin
    Cui, Suxia
    Akujuobi, Cajetan
    [J]. SENSORS, 2023, 23 (19)
  • [10] Modeling network traffic for traffic matrix estimation and anomaly detection based on Bayesian network in cloud computing networks
    Laisen Nie
    Dingde Jiang
    Zhihan Lv
    [J]. Annals of Telecommunications, 2017, 72 : 297 - 305