Collaborative anomaly detection framework for handling big data of cloud computing

N Moustafa, G Creech, E Sitnikova… - 2017 military …, 2017 - ieeexplore.ieee.org
With the ubiquitous computing of providing services and applications at anywhere and
anytime, cloud computing is the best option as it offers flexible and pay-per-use based …

Machine learning for anomaly detection and categorization in multi-cloud environments

T Salman, D Bhamare, A Erbad, R Jain… - 2017 IEEE 4th …, 2017 - ieeexplore.ieee.org
Cloud computing has been widely adopted by application service providers (ASPs) and
enterprises to reduce both capital expenditures (CAPEX) and operational expenditures …

Hybrid intrusion detection system using machine learning techniques in cloud computing environments

I Aljamal, A Tekeoğlu, K Bekiroglu… - 2019 IEEE 17th …, 2019 - ieeexplore.ieee.org
Intrusion detection is one essential tool towards building secure and trustworthy Cloud
computing environment, given the ubiquitous presence of cyber attacks that proliferate …

A systematic review on anomaly detection for cloud computing environments

T Hagemann, K Katsarou - Proceedings of the 2020 3rd Artificial …, 2020 - dl.acm.org
The detection of anomalies in data is a far-reaching field of research which also applies to
the field of cloud computing in several different ways: from the detection of various types of …

Unsupervised labeling for supervised anomaly detection in enterprise and cloud networks

S Baek, D Kwon, J Kim, SC Suh… - 2017 IEEE 4th …, 2017 - ieeexplore.ieee.org
Identifying anomalous events in the network is one of the vital functions in enterprises, ISPs,
and datacenters to protect the internal resources. With its importance, there has been a …

Machine learning techniques for network anomaly detection: A survey

S Eltanbouly, M Bashendy, N AlNaimi… - … on Informatics, IoT …, 2020 - ieeexplore.ieee.org
Nowadays, distributed data processing in cloud computing has gained increasing attention
from many researchers. The intense transfer of data has made the network an attractive and …

Adaptive real‐time anomaly detection in cloud infrastructures

B Agrawal, T Wiktorski, C Rong - … and Computation: Practice …, 2017 - Wiley Online Library
Cloud computing has become increasingly popular, which has led many individuals and
organizations towards cloud storage systems. This move is motivated by benefits such as …

Anomaly detection in the cloud: Detecting security incidents via machine learning

M Gander, M Felderer, B Katt, A Tolbaru, R Breu… - … Workshop on Eternal …, 2012 - Springer
Cloud computing is now on the verge of being embraced as a serious usage-model.
However, while outsourcing services and workflows into the cloud provides indisputable …

Big data analytics for network anomaly detection from netflow data

DS Terzi, R Terzi, S Sagiroglu - 2017 International Conference …, 2017 - ieeexplore.ieee.org
Cyber-attacks was organized in a simple and random way in the past. However attacks are
carried out systematically and long term nowadays. In addition, the high calculation volume …

[PDF][PDF] Hybrid Multi-Objective Deep Learning Model for Anomaly Detection in Cloud Computing Environment

RR Palle - International Journal of Scientific Research in Science …, 2015 - academia.edu
Cloud computing environments play a pivotal role in the IT landscape, seamlessly integrated
into the fabric of organizations and individuals' daily activities. Despite the myriad …