Performance anomaly detection and bottleneck identification

O Ibidunmoye, F Hernández-Rodriguez… - ACM Computing Surveys …, 2015 - dl.acm.org
In order to meet stringent performance requirements, system administrators must effectively
detect undesirable performance behaviours, identify potential root causes, and take …

Intrusion detection systems in the cloud computing: A comprehensive and deep literature review

Z Liu, B Xu, B Cheng, X Hu… - … : Practice and Experience, 2022 - Wiley Online Library
Abrupt development of resources and rising expenses of infrastructure are leading
institutions to take on cloud computing. Albeit, the cloud environment is vulnerable to various …

A spatiotemporal deep learning approach for unsupervised anomaly detection in cloud systems

Z He, P Chen, X Li, Y Wang, G Yu… - … on Neural Networks …, 2020 - ieeexplore.ieee.org
Anomaly detection is a critical task for maintaining the performance of a cloud system. Using
data-driven methods to address this issue is the mainstream in recent years. However, due …

Anomaly detection based on a granular Markov model

Y Zhou, H Ren, Z Li, W Pedrycz - Expert Systems with Applications, 2022 - Elsevier
Since time series are characterized by a substantial volume of data, high levels of noise and
the correlation between data in the time series attributes, it becomes challenging to mine …

A systematic review on anomaly detection for cloud computing environments

T Hagemann, K Katsarou - Proceedings of the 2020 3rd Artificial …, 2020 - dl.acm.org
The detection of anomalies in data is a far-reaching field of research which also applies to
the field of cloud computing in several different ways: from the detection of various types of …

Artificial neural networks based techniques for anomaly detection in Apache Spark

A Alnafessah, G Casale - Cluster Computing, 2020 - Springer
Late detection and manual resolutions of performance anomalies in Cloud Computing and
Big Data systems may lead to performance violations and financial penalties. Motivated by …

Application of local outlier factor algorithm to detect anomalies in computer network

J Auskalnis, N Paulauskas, A Baskys - Elektronika ir Elektrotechnika, 2018 - eejournal.ktu.lt
Gap between the new attack appearance and signature creation for this attack may be
critical. During this time, many computer systems may be affected and valuable resources …

Anomaly detection and identification scheme for VM live migration in cloud infrastructure

T Huang, Y Zhu, Y Wu, S Bressan, G Dobbie - Future Generation Computer …, 2016 - Elsevier
Virtual machines (VM) offer simple and practical mechanisms to address many of the
manageability problems of leveraging heterogeneous computing resources. VM live …

Ddmt: Denoising diffusion mask transformer models for multivariate time series anomaly detection

C Yang, T Wang, X Yan - arXiv preprint arXiv:2310.08800, 2023 - arxiv.org
Anomaly detection in multivariate time series has emerged as a crucial challenge in time
series research, with significant research implications in various fields such as fraud …

Correlation‐Based Anomaly Detection Method for Multi‐sensor System

H Li, X Wang, Z Yang, S Ali, N Tong… - Computational …, 2022 - Wiley Online Library
In industry, sensor‐based monitoring of equipment or environment has become a necessity.
Instead of using a single sensor, multi‐sensor system is used to fully detect abnormalities in …