2019
DOI: 10.1007/s11042-019-7579-3
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly detecting and ranking of the cloud computing platform by multi-view learning

Abstract: Anomaly detecting as an important technical in cloud computing is applied to support smooth running of the cloud platform. Traditional detecting methods based on statistic, analysis, etc. lead to the high false-alarm rate due to non-adaptive and sensitive parameters setting. We presented an online model for anomaly detecting using machine learning theory. However, most existing methods based on machine learning linked all features from difference sub-systems into a long feature vector directly, which is diffic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…References Multi-layer perceptron [16], [26], [56], [64], [139], [185], [48], [46], [15], [92], [38], [36], [88], [37], [109], [90], [104], [208], [25], [159], [25], [214], [144] Autoencoder [206], [32], [86], [73] Recurrent neural network [21], [72], [104], [86] Convolutional neural network [180], [62], [2], [104] Self-organizing map [179], [27], [177], [187] Adaptive neuro-fuzzy inference system [60], [124], [138] Extreme learning machine [209], [96], [ [197] for. Similar to the LSTM-based approaches, the values that actually occur are then compared to the prediction which allows to decide how rare they are.…”
Section: Methodsmentioning
confidence: 99%
“…References Multi-layer perceptron [16], [26], [56], [64], [139], [185], [48], [46], [15], [92], [38], [36], [88], [37], [109], [90], [104], [208], [25], [159], [25], [214], [144] Autoencoder [206], [32], [86], [73] Recurrent neural network [21], [72], [104], [86] Convolutional neural network [180], [62], [2], [104] Self-organizing map [179], [27], [177], [187] Adaptive neuro-fuzzy inference system [60], [124], [138] Extreme learning machine [209], [96], [ [197] for. Similar to the LSTM-based approaches, the values that actually occur are then compared to the prediction which allows to decide how rare they are.…”
Section: Methodsmentioning
confidence: 99%
“…In Ref. [37], Zhang proposed an automatic technique that develops the discriminative model and fuses multiview information to improve accuracy (ACC). Six basic features are used by Tang et al [30] to build an IDS based on DL.…”
Section: State-of-the-art Workmentioning
confidence: 99%
“…Zhang [28] presented Multi-view learning techniques for detecting the cloud computing platform's anomaly by implementing the extensible ML model. They worked on a gap formulated as the pair classification in real-time, which is trained by improving the ELM model's multiple features.…”
Section: Cloud-based Techniquesmentioning
confidence: 99%