Toward Anomaly Detection in IaaS Cloud Computing Platforms

被引:3
|
作者
Lin, Mingwei [1 ]
Yao, Zhiqiang [1 ]
Gao, Fei [1 ]
Li, Yang [1 ]
机构
[1] Fujian Normal Univ, Fac Software, Fuzhou 350108, Peoples R China
基金
中国国家自然科学基金;
关键词
Anomaly detection; IaaS cloud computing platform; Principal components analysis; Locality preserving projection; Local outlier factor;
D O I
10.14257/ijsia.2015.9.12.17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to monitor the running status of IaaS cloud computing platforms, performance metric data are collected to perform anomaly detection for IaaS cloud computing platforms and determine whether the IaaS cloud computing platforms fail to run normally. However, it is challenging to effectively detect performance anomalies from a large amount of noisy and high dimensional performance metric data. In this paper, an efficient anomaly detection scheme is proposed for IaaS cloud computing platforms. The proposed scheme first designs a global locality preserving projection algorithm to perform feature extraction on performance metric data, and then introduces a local outlier factor algorithm to detect anomalies. A series of experiments are conducted on a private cloud computing platform. Experimental results show that our proposed global locality preserving projection algorithm outperforms the principal components analysis algorithm and the locality preserving projection algorithm and our proposed anomaly detection scheme is better than the state-of-the-art schemes for IaaS cloud computing platforms.
引用
收藏
页码:175 / 188
页数:14
相关论文
共 50 条
  • [11] A Data Transmission Model based on Adaptive Periodic Push Strategy for IaaS Cloud Computing Platforms
    Lin, Mingwei
    Yao, Zhiqiang
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2015, 8 (06): : 281 - 288
  • [12] Cloud Program with a Pricing Strategy for Iaas in Cloud Computing
    Wu, Xing
    Wang, MingChao
    Zhang, Wu
    Guo, Yike
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 2316 - 2319
  • [13] Intrusion Detection in Cloud Computing Implementation of (SAAS & IAAS) Using Grid Environment
    Moorthy, S. Manthira
    Masillamani, M. Roberts
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON INTERNET COMPUTING AND INFORMATION COMMUNICATIONS (ICICIC GLOBAL 2012), 2014, 216 : 53 - 64
  • [14] A Wavelet-inspired Anomaly Detection Framework for Cloud Platforms
    O'Shea, David
    Emeakaroha, Vincent C.
    Pendlebury, John
    Cafferkey, Neil
    Morrison, John P.
    Lynn, Theo
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, VOL 1 (CLOSER), 2016, : 106 - 117
  • [15] Anomaly Detection for Nodes Under the Cloud Computing Environment
    Lei, Yang
    Jiang, Ying
    INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2021, 12 (01) : 30 - 48
  • [16] CSS: Facilitate the Cloud Service Selection in IaaS Platforms
    Qian, Hangwei
    Zu, Hualong
    Cao, Chenghua
    Wang, Qixin
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS (CTS), 2013, : 347 - 354
  • [17] An Efficient Anomaly Detection Framework for Cloud Computing Environment
    Lin, Mingwei
    Chen, Shuyu
    JOURNAL OF COMPUTERS, 2015, 10 (03) : 155 - 165
  • [18] Performance Evaluation of an IaaS Opportunistic Cloud Computing
    Diaz, Cesar O.
    Pecero, Johnatan E.
    Bouvry, Pascal
    Sotelo, German
    Villamizar, Mario
    Castro, Harold
    2014 14TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), 2014, : 546 - 547
  • [19] The Role and Security of Firewalls in IaaS Cloud Computing
    Cropper, Jordan
    Ullrich, Johanna
    Fruehwirt, Peter
    Weippl, Edgar
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 70 - 79
  • [20] Distributed Trust Protocol for IaaS Cloud Computing
    Kashif, Ubaidullah Alias
    Memon, Zulfiqar Ali
    Balouch, Abdul Rasheed
    Chandio, Jamil Ahmed
    2015 12TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2015, : 275 - 279