Collaborative anomaly detection framework for handling big data of cloud computing
N Moustafa, G Creech, E Sitnikova… - 2017 military …, 2017 - ieeexplore.ieee.org
With the ubiquitous computing of providing services and applications at anywhere and
anytime, cloud computing is the best option as it offers flexible and pay-per-use based …
anytime, cloud computing is the best option as it offers flexible and pay-per-use based …
Machine learning for anomaly detection and categorization in multi-cloud environments
Cloud computing has been widely adopted by application service providers (ASPs) and
enterprises to reduce both capital expenditures (CAPEX) and operational expenditures …
enterprises to reduce both capital expenditures (CAPEX) and operational expenditures …
Hybrid intrusion detection system using machine learning techniques in cloud computing environments
I Aljamal, A Tekeoğlu, K Bekiroglu… - 2019 IEEE 17th …, 2019 - ieeexplore.ieee.org
Intrusion detection is one essential tool towards building secure and trustworthy Cloud
computing environment, given the ubiquitous presence of cyber attacks that proliferate …
computing environment, given the ubiquitous presence of cyber attacks that proliferate …
A systematic review on anomaly detection for cloud computing environments
T Hagemann, K Katsarou - Proceedings of the 2020 3rd Artificial …, 2020 - dl.acm.org
The detection of anomalies in data is a far-reaching field of research which also applies to
the field of cloud computing in several different ways: from the detection of various types of …
the field of cloud computing in several different ways: from the detection of various types of …
Unsupervised labeling for supervised anomaly detection in enterprise and cloud networks
S Baek, D Kwon, J Kim, SC Suh… - 2017 IEEE 4th …, 2017 - ieeexplore.ieee.org
Identifying anomalous events in the network is one of the vital functions in enterprises, ISPs,
and datacenters to protect the internal resources. With its importance, there has been a …
and datacenters to protect the internal resources. With its importance, there has been a …
Machine learning techniques for network anomaly detection: A survey
S Eltanbouly, M Bashendy, N AlNaimi… - … on Informatics, IoT …, 2020 - ieeexplore.ieee.org
Nowadays, distributed data processing in cloud computing has gained increasing attention
from many researchers. The intense transfer of data has made the network an attractive and …
from many researchers. The intense transfer of data has made the network an attractive and …
Adaptive real‐time anomaly detection in cloud infrastructures
Cloud computing has become increasingly popular, which has led many individuals and
organizations towards cloud storage systems. This move is motivated by benefits such as …
organizations towards cloud storage systems. This move is motivated by benefits such as …
Anomaly detection in the cloud: Detecting security incidents via machine learning
M Gander, M Felderer, B Katt, A Tolbaru, R Breu… - … Workshop on Eternal …, 2012 - Springer
Cloud computing is now on the verge of being embraced as a serious usage-model.
However, while outsourcing services and workflows into the cloud provides indisputable …
However, while outsourcing services and workflows into the cloud provides indisputable …
Big data analytics for network anomaly detection from netflow data
Cyber-attacks was organized in a simple and random way in the past. However attacks are
carried out systematically and long term nowadays. In addition, the high calculation volume …
carried out systematically and long term nowadays. In addition, the high calculation volume …
[PDF][PDF] Hybrid Multi-Objective Deep Learning Model for Anomaly Detection in Cloud Computing Environment
RR Palle - International Journal of Scientific Research in Science …, 2015 - academia.edu
Cloud computing environments play a pivotal role in the IT landscape, seamlessly integrated
into the fabric of organizations and individuals' daily activities. Despite the myriad …
into the fabric of organizations and individuals' daily activities. Despite the myriad …