iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/s11227-018-2518-z
A virtual machine anomaly detection system for cloud computing infrastructure | The Journal of Supercomputing Skip to main content
Log in

A virtual machine anomaly detection system for cloud computing infrastructure

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

In recent years, cloud computing is used widely due to the vital growth of cloud resources along with its great performance, effective use, and on-demand resources availability. On the other hand, the cloud is uncertain due to various intrusion attacks such as malicious software and backdoors creation. The virtualization concept is popular in the cloud due to its virtual concept for hardware and software. In the cloud, the employment of an intrusion detection system (IDS) needs a scalable and virtualized infrastructure for reducing the traffic that is often carried by the virtualized server. In this work, the cloud platform-based virtual machine anomaly detection system is designed. The Globality-aware Locality Preserving Projection and Incremental Virtual Machine Workload Clustering Algorithm are designed for important modules including data dimension reduction and anomaly detection in the system. From the experimental analysis, it is inferred that the design not only improves accurateness of the online anomaly detecting mechanism, but also the average operation time is less than 0.25 s consistent with the timeliness requirements, shortens the average calculating time to a greater extent, improves the timeliness, and achieves the objective of anomaly detection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Ming Yu, Zhang Yu, Chang L, Dandan Z (2015) Virtual machine anomaly detection based on multiple attribute information entropy in cloud environment. J Huazhong University Sci Technol (Nat Sci) 05:63–67

    Google Scholar 

  2. Min W, Shengdong D (2012) Virtual machine anomaly monitoring based on Principal Component Analysis. Chongqing Univ Posts Telecommun (Nat Sci) 06:728–734

    Google Scholar 

  3. Tianshu W, Shuyu C, Hancui Z, Zhen Z (2016) Virtual machine anomaly detection algorithm based on detection domain division. Comput Appl 04:1066–1069

    Google Scholar 

  4. Guiping W (2005) Study on critical technologies regarding credible virtual machine anomaly detection in cloud environment. Chongqing University, Chongqing

    Google Scholar 

  5. Hui X (2014) Study on self-adaptive anomaly detection model and deployment strategy in cloud environment. Fudan University, Shanghai

    Google Scholar 

  6. Dandan Z (2015) Design and realization of cloud platform anomaly detection system based on multi-attribute information. Dalian University of Technology, Dalian

    Google Scholar 

  7. Chunhong P (2015) Design and realization of malicious act detecting system based on KVM virtual machine. University of Electronic Science and Technology of China, Chengdu

    Google Scholar 

  8. Hongyan Yu, Kailun C, Tengxiao Y (2015) Design and realization of cloud platform anomaly detection system. Computer application 05:1284–1289

    Google Scholar 

  9. Wang D (2013) Study and realization of anomaly detection technology oriented to cloud computation. Shanghai Jiaotong University, Shanghai

    Google Scholar 

  10. Hongyan Yu, Kailun C, Tengxiao Y (2015) Design and realization of cloud platform anomaly detection system. Computer application 05:1284–1289

    Google Scholar 

  11. Zhen Z (2015) Study on virtual machine anomaly detection strategy and algorithm of runtime environment perception on cloud platform. Chongqing University, Chongqing

    Google Scholar 

  12. Tao R (2014) Study on IaaS-oriented virtual machine anomaly detection system. Chongqing University, Chongqing

    Google Scholar 

  13. Chang L (2014) Multi-attributive analysis for virtual machine anomaly in the cloud environment. Dalian University of Technology, Dalian

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Hui.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hui, Y. A virtual machine anomaly detection system for cloud computing infrastructure. J Supercomput 74, 6126–6134 (2018). https://doi.org/10.1007/s11227-018-2518-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-018-2518-z

Keywords

Navigation