A systematic review on anomaly detection for cloud computing environments

T Hagemann, K Katsarou - Proceedings of the 2020 3rd Artificial …, 2020 - dl.acm.org
The detection of anomalies in data is a far-reaching field of research which also applies to
the field of cloud computing in several different ways: from the detection of various types of …

Performance-aware management of cloud resources: A taxonomy and future directions

SK Moghaddam, R Buyya… - ACM Computing Surveys …, 2019 - dl.acm.org
The dynamic nature of the cloud environment has made the distributed resource
management process a challenge for cloud service providers. The importance of …

Data-driven software defined network attack detection: State-of-the-art and perspectives

P Wang, LT Yang, X Nie, Z Ren, J Li, L Kuang - Information Sciences, 2020 - Elsevier
Abstract SDN (Software Defined Network) has emerged as a revolutionary technology in
network, a substantial amount of researches have been dedicated to security of SDNs to …

Failover strategy for fault tolerance in cloud computing environment

B Mohammed, M Kiran, KM Maiyama… - Software: Practice …, 2017 - Wiley Online Library
Cloud fault tolerance is an important issue in cloud computing platforms and applications. In
the event of an unexpected system failure or malfunction, a robust fault‐tolerant design may …

Anomaly detection of network-initiated LTE signaling traffic in wireless sensor and actuator networks based on a Hidden semi-Markov Model

J Bang, YJ Cho, K Kang - Computers & Security, 2017 - Elsevier
LTE signaling attack is a serious threat to a wireless sensor and actuator network whose
facilities are dispersed and connected with LTE technology on a large scale, in order to …

Big data analytics-enhanced cloud computing: Challenges, architectural elements, and future directions

R Buyya, K Ramamohanarao, C Leckie… - 2015 IEEE 21st …, 2015 - ieeexplore.ieee.org
The emergence of cloud computing has made dynamic provisioning of elastic capacity to
applications on-demand. Cloud data centers contain thousands of physical servers hosting …

ACAS: An anomaly-based cause aware auto-scaling framework for clouds

SK Moghaddam, R Buyya… - Journal of Parallel and …, 2019 - Elsevier
Cloud computing as a model to deliver distributed resource and services on the pay-as-you-
go policy has become increasingly popular for all organizations including industry. However …

A business-mapping approach to multi-criteria group selection of collection centers and recovery facilities

KK Pochampally, SM Gupta - IEEE International Symposium on …, 2004 - ieeexplore.ieee.org
For a prospective reverse supply chain to operate efficiently, the designing of that chain must
involve selection of collection centers and recovery facilities that have sufficient success …

Resource availability prediction in distributed systems: An approach for modeling non-stationary transition probabilities

S Kianpisheh, M Kargahi… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Large scale distributed systems employ thousands of resources which inevitably suffer from
the unavailability issue. Serious side effects like unexpected delay or failure in the …

Performance anomaly detection using isolation‐trees in heterogeneous workloads of web applications in computing clouds

S Kardani‐Moghaddam, R Buyya… - Concurrency and …, 2019 - Wiley Online Library
Cloud computing is a model for on‐demand access to shared resources based on the pay‐
per‐use policy. In order to efficiently manage the resources, a continuous analysis of the …