Design of the Network Traffic Anomaly Detection System in Cloud Computing Environment

被引:3
|
作者
Zhang, Long [1 ]
Wang, Jinsong [1 ]
Lin, Sheng [1 ]
机构
[1] Tianjin Univ Technol Acceptable, Sch Comp & Commun Engn, Tianjin, Peoples R China
关键词
anomaly detection; flow; deep packet inspection; cloud computing;
D O I
10.1109/ISISE.2012.13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network traffic anomaly detection is one of the most important components of IT management. Analyzing the components of the network work traffic, we can judge the operating status of the network and make the right decision to make sure the stable status of the network. The method based on flow data displays the current status of the network and we can found anomalies from change of flow data. Deep packet inspection helps us check anomalies by security rules. The cloud computing technology which is a new super-computing model has a huge superiority in dealing with large-scale data computing.
引用
收藏
页码:16 / 19
页数:4
相关论文
共 50 条
  • [21] Design of Intrusion Detection System using Ensemble Learning Technique in Cloud Computing Environment
    Bingu, Rajesh
    Jothilakshmi, S.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (05) : 751 - 764
  • [22] ANN Mechanism for Network Traffic Anomaly Detection in the Concept Drifting Environment
    Tsaih, Rua-Huan
    Huang, Shin-Ying
    Lian, Mao-Ci
    Huang, Yennun
    2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 282 - 287
  • [23] A Virtual Machine Instance Anomaly Detection System for IaaS Cloud Computing
    Lin, Mingwei
    Yao, Zhiqiang
    Gao, Fei
    Li, Yang
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (03): : 255 - 268
  • [24] Hypervisor Based Anomaly Detection System in Cloud Computing Using ANFIS
    Pandeeswari, N.
    Karuppathal, R.
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (06): : 1335 - 1344
  • [25] Cloud computing for network security intrusion detection system
    Yang, J. (jinnyang@163.com), 1600, Academy Publisher (08):
  • [26] Proxy Network Intrusion Detection System for Cloud Computing
    Oktay, Ueman
    Sahingoz, Ozgur Koray
    2013 INTERNATIONAL CONFERENCE ON TECHNOLOGICAL ADVANCES IN ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING (TAEECE), 2013, : 98 - 104
  • [27] Fast Localization Model of Network Intrusion Detection System for Enterprises Using Cloud Computing Environment
    Wang, Xingzhu
    MOBILE NETWORKS & APPLICATIONS, 2023, 28 (06): : 2191 - 2203
  • [28] Survey of Cloud Traffic Anomaly Detection Algorithms
    Paulikas, Giedrius
    Sandonavicius, Donatas
    Stasiukaitis, Edgaras
    Vilutis, Gytis
    Vaitkunas, Mindaugas
    INFORMATION AND SOFTWARE TECHNOLOGIES, ICIST 2022, 2022, 1665 : 19 - 32
  • [29] Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network
    Govind P. Prabhat Kumar
    Rakesh Gupta
    Automatic Control and Computer Sciences, 2021, 55 : 137 - 147
  • [30] Design of Anomaly-Based Intrusion Detection System Using Fog Computing for IoT Network
    Kumar, Prabhat
    Gupta, Govind P.
    Tripathi, Rakesh
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (02) : 137 - 147