An Anomaly Detection Framework for Detecting Anomalous Virtual Machines under Cloud Computing Environment

نویسندگان

  • GuiPing Wang
  • JiaWei Wang
چکیده

A variety of faults may cause performance degradation or even downtime of virtual machines (VMs) under Cloud environment, thus lowering the dependability of Cloud platform. Detecting anomalous VMs before real failures occur is an important means to improve the dependability of Cloud platform. Since the performance or state of VMs may be affected by the environmental factors, this article proposes an environment-aware anomaly detection framework (termed EaAD) for VMs under Cloud environment. EaAD partitions all the VMs in Cloud platform into several monitoring domains based on similarity in running environment, which makes the VMs in a same monitoring domain have similar running environment. In each domain, the equipped anomaly detection algorithm detects anomalous VMs based on their performance metrics. In addition, anomaly detection in a certain monitoring domain faces such challenges as multiple anomaly categories, imbalanced training sample sets, increasing number of training samples. To cope with these challenges, several support vector machine (SVM) based anomaly detection algorithms are implemented and equipped in EaAD, including C-SVM, OCSVM, multi-class SVM, imbalanced SVM, online learning SVM. This article conducts experiments on EaAD to test the performance of the adopted detection algorithms and looks into future work.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

An Environment-aware Anomaly Detection Framework of Cloud Platform for Improving Its Dependability

Virtualization technology is a core technology in Cloud Platform, which allows the hardware, the operating systems, and the applications running atop to be encapsulated into virtual machines (VMs). Along with the increasing scale and complexity of Cloud Platform, various faults cause the frequent downtime accidents of VMs, which has seriously lowered the dependability of Cloud Platform. Anomaly...

متن کامل

An Efficient Anomaly Detection Framework for Cloud Computing Environment

Infrastructure as a Service (IaaS) is an important service type provided by cloud computing. Infrastructure resources are encapsulated into services and they are provided to users over the Internet in the form of virtual machines. A malicious user can upload malicious software into the virtual machine allocated by a cloud computing service provider and launch the side channel attacks to other v...

متن کامل

Task Scheduling Algorithm Using Covariance Matrix Adaptation Evolution Strategy (CMA-ES) in Cloud Computing

The cloud computing is considered as a computational model which provides the uses requests with resources upon any demand and needs.The need for planning the scheduling of the user's jobs has emerged as an important challenge in the field of cloud computing. It is mainly due to several reasons, including ever-increasing advancements of information technology and an increase of applications and...

متن کامل

GASA: Presentation of an Initiative Method Based on Genetic Algorithm for Task Scheduling in the Cloud Environment

The need for calculating actions has been emerged everywhere and in any time, by advancing of information technology. Cloud computing is the latest response to such needs. Prominent popularity has recently been created for Cloud computing systems. Increasing cloud efficiency is an important subject of consideration. Heterogeneity and diversity among different resources and requests of users in ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016