Applying Catastrophe Theory for Network Anomaly Detection in Cloud Computing Traffic

被引:7
|
作者
Khatibzadeh, Leila [1 ]
Bornaee, Zarrintaj [1 ]
Bafghi, Abbas Ghaemi [2 ]
机构
[1] IROST, Elect Engn & Informat Technol Dept, Tehran 3353136846, Iran
[2] Ferdowsi Univ Mashhad, Comp Dept, Fac Engn, Mashhad, Razavi Khorasan, Iran
关键词
DETECTION SYSTEM; PREDICTION;
D O I
10.1155/2019/5306395
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In spite of the tangible advantages of cloud computing, it is still vulnerable to potential attacks and threats. In light of this, security has turned into one of the main concerns in the adoption of cloud computing. Therefore, an anomaly detection method plays an important role in providing a high protection level for network security. One of the challenges in anomaly detection, which has not been seriously considered in the literature, is applying the dynamic nature of cloud traffic in its prediction while maintaining an acceptable level of accuracy besides reducing the computational cost. On the other hand, to overcome the issue of additional training time, introducing a high-speed algorithm is essential. In this paper, a network traffic anomaly detection model grounded in Catastrophe Theory is proposed. This theory is effective in depicting sudden change processes of the network due to the dynamic nature of the cloud. Exponential Moving Average (EMA) is applied for the state variable in sliding window to better show the dynamicity of cloud network traffic. Entropy is used as one of the control variables in catastrophe theory to analyze the distribution of traffic features. Our work is compared with Wei Xiong et al.'s Catastrophe Theory and achieved a maximum improvement in the percentage of Detection Rate in week 4 Wednesday (7.83%) and a 0.31% reduction in False Positive Rate in week 5 Monday. Additional accuracy parameters are checked and the impact of sliding window size in sensitivity and specificity is considered.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Advances in applying cloud computing techniques for air traffic systems
    Zhou, Luhua
    Zhang, Hanwen
    Zhang, Kun
    Wang, Beibei
    Shen, Deren
    Wang, Yun
    PROCEEDINGS OF 2020 IEEE 2ND INTERNATIONAL CONFERENCE ON CIVIL AVIATION SAFETY AND INFORMATION TECHNOLOGY (ICCASIT), 2020, : 134 - 139
  • [22] Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communication?
    Xiong, Wei
    Hu, Hanping
    Xiong, Naixue
    Yang, Laurence T.
    Peng, Wen-Chih
    Wang, Xiaofei
    Qu, Yanzhen
    INFORMATION SCIENCES, 2014, 258 : 403 - 415
  • [23] Reliability computing and management considering the network traffic for a cloud computing
    Tamura, Yoshinobu
    Yamada, Shigeru
    ANNALS OF OPERATIONS RESEARCH, 2016, 244 (01) : 163 - 176
  • [24] Reliability computing and management considering the network traffic for a cloud computing
    Yoshinobu Tamura
    Shigeru Yamada
    Annals of Operations Research, 2016, 244 : 163 - 176
  • [25] Network Anomaly Traffic Detection Using WGAN-CNN-BiLSTM in Big Data Cloud-Edge Collaborative Computing Environment
    Wang, Yue
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2024, 20 (03): : 375 - 390
  • [26] Anomaly Detection for Nodes Under the Cloud Computing Environment
    Lei, Yang
    Jiang, Ying
    INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2021, 12 (01) : 30 - 48
  • [27] Toward Anomaly Detection in IaaS Cloud Computing Platforms
    Lin, Mingwei
    Yao, Zhiqiang
    Gao, Fei
    Li, Yang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (12): : 175 - 188
  • [28] An Efficient Anomaly Detection Framework for Cloud Computing Environment
    Lin, Mingwei
    Chen, Shuyu
    JOURNAL OF COMPUTERS, 2015, 10 (03) : 155 - 165
  • [29] Analysis of network traffic features for anomaly detection
    Iglesias, Felix
    Zseby, Tanja
    MACHINE LEARNING, 2015, 101 (1-3) : 59 - 84
  • [30] Network Anomaly Detection based on Traffic Prediction
    Wang, Fengyu
    Gong, Bin
    Hu, Yi
    Zhang, Ningbo
    2009 INTERNATIONAL CONFERENCE ON SCALABLE COMPUTING AND COMMUNICATIONS & EIGHTH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING, 2009, : 449 - 454