Signature-based IaaS Performance Change Detection

被引:0
|
作者
Fattah, Sheik mohammad mostakim [1 ]
Bouguettaya, Athman [2 ]
机构
[1] Curtin Univ, Sch Elec Eng Comp & Math Sci, Perth, WA, Australia
[2] Univ Sydney, Sch Comp Sci, Sydney, NSW, Australia
基金
澳大利亚研究理事会;
关键词
Cloud performance; change detection; IaaS cloud; IaaS performance signature; signal-to-noise ratio; sliding-window; time series;
D O I
10.1145/3702228
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a novel change detection framework to identify changes in the long-term performance behavior of an Infrastructure as a Service (IaaS). An IaaS's long-term performance behavior is represented by an IaaS performance signature. The proposed framework leverages time series similarity measures and a sliding window technique to detect changes in IaaS performance signatures. We introduce a new IaaS performance noise model that enables the proposed framework to distinguish between performance noise and actual changes in performance. The proposed framework utilizes a novel Signal-to-Noise Ratio-based approach to detect changes when prior knowledge about performance noise is available. A set of experiments is conducted using real-world datasets to demonstrate the effectiveness of the proposed change detection framework.
引用
收藏
页数:21
相关论文
共 50 条
  • [11] PERFORMANCE COMPARISON OF SIGNATURE-BASED MULTIKEY ACCESS METHODS
    CHANG, JW
    YOO, JS
    LEE, YJ
    MICROPROCESSING AND MICROPROGRAMMING, 1992, 35 (1-5): : 345 - 352
  • [12] CBSigIDS: Towards Collaborative Blockchained Signature-based Intrusion Detection
    Tug, Steven
    Meng, Weizhi
    Wang, Yu
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1228 - 1235
  • [13] Attack Resilient Trust and Signature-based Intrusion Detection Systems
    Kabaso, Boniface
    Aradeh, Saber A.
    Abidoye, Ademola P.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (03) : 701 - 707
  • [14] USAID: Unifying signature-based and anomaly-based intrusion detection
    Li, ZW
    Das, A
    Zhou, JY
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2005, 3518 : 702 - 712
  • [15] A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems
    Masdari, Mohammad
    Khezri, Hemn
    APPLIED SOFT COMPUTING, 2020, 92 (92)
  • [16] SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language
    Fortino, Giancarlo
    Greco, Claudia
    Guzzo, Antonella
    Ianni, Michele
    COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 256 - 266
  • [17] An aggregated signature-based fast RFID batch detection protocol
    Li, Chaoliang
    Wang, Guojun
    Zheng, Jin
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (09) : 1364 - 1371
  • [18] Advanced Intrusion Detection Combining Signature-Based and Behavior-Based Detection Methods
    Kwon, Hee-Yong
    Kim, Taesic
    Lee, Mun-Kyu
    ELECTRONICS, 2022, 11 (06)
  • [19] A Signature-based Assistant Random Oversampling Method for Malware Detection
    Pang, Ying
    Chen, Zhenxiang
    Peng, Lizhi
    Ma, Kun
    Zhao, Chuan
    Ji, Ke
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 256 - 263
  • [20] Using decision trees to improve signature-based intrusion detection
    Kruegel, C
    Toth, T
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2003, 2820 : 173 - 191