Design of the Network Traffic Anomaly Detection System in Cloud Computing Environment

被引:3
|
作者
Zhang, Long [1 ]
Wang, Jinsong [1 ]
Lin, Sheng [1 ]
机构
[1] Tianjin Univ Technol Acceptable, Sch Comp & Commun Engn, Tianjin, Peoples R China
关键词
anomaly detection; flow; deep packet inspection; cloud computing;
D O I
10.1109/ISISE.2012.13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network traffic anomaly detection is one of the most important components of IT management. Analyzing the components of the network work traffic, we can judge the operating status of the network and make the right decision to make sure the stable status of the network. The method based on flow data displays the current status of the network and we can found anomalies from change of flow data. Deep packet inspection helps us check anomalies by security rules. The cloud computing technology which is a new super-computing model has a huge superiority in dealing with large-scale data computing.
引用
收藏
页码:16 / 19
页数:4
相关论文
共 50 条
  • [41] Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communication?
    Xiong, Wei
    Hu, Hanping
    Xiong, Naixue
    Yang, Laurence T.
    Peng, Wen-Chih
    Wang, Xiaofei
    Qu, Yanzhen
    INFORMATION SCIENCES, 2014, 258 : 403 - 415
  • [42] Reliability computing and management considering the network traffic for a cloud computing
    Tamura, Yoshinobu
    Yamada, Shigeru
    ANNALS OF OPERATIONS RESEARCH, 2016, 244 (01) : 163 - 176
  • [43] Reliability computing and management considering the network traffic for a cloud computing
    Yoshinobu Tamura
    Shigeru Yamada
    Annals of Operations Research, 2016, 244 : 163 - 176
  • [44] Towards an immunity-based anomaly detection system for network traffic
    Okamoto, Takeshi
    Ishida, Yoshiteru
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2011, 15 (04) : 215 - 225
  • [45] Industrial Control System Anomaly Detection and Classification Based on Network Traffic
    Jiang, Jehn-Ruey
    Chen, Yan-Ting
    IEEE ACCESS, 2022, 10 : 41874 - 41888
  • [46] Towards an immunity-based anomaly detection system for network traffic
    Okamoto, Takeshi
    Ishida, Yoshiteru
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 2006, 4252 : 123 - 130
  • [47] Design of Network Traffic Anomaly Monitoring System Based on Data Mining
    Huang, Yanling
    Huang, Liusong
    ADVANCED HYBRID INFORMATION PROCESSING, ADHIP 2022, PT I, 2023, 468 : 549 - 563
  • [48] Toward Anomaly Detection in IaaS Cloud Computing Platforms
    Lin, Mingwei
    Yao, Zhiqiang
    Gao, Fei
    Li, Yang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (12): : 175 - 188
  • [49] HIDS: A host based intrusion detection system for cloud computing environment
    Deshpande P.
    Sharma S.C.
    Peddoju S.K.
    Junaid S.
    Deshpande, Prachi (deprachi3@gmail.com), 2018, Springer (09) : 567 - 576
  • [50] FCM–SVM based intrusion detection system for cloud computing environment
    Aws Naser Jaber
    Shafiq Ul Rehman
    Cluster Computing, 2020, 23 : 3221 - 3231