2013
DOI: 10.1007/978-3-642-45260-4_8
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
12
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(12 citation statements)
references
References 13 publications
0
12
0
Order By: Relevance
“…In a nutshell, DICE Monitoring (DMon) platform 19 is designed as a Web service, enabling the deployment and management of several sub-components. Each of the sub-components is responsible for enabling monitoring of Data Intensive (Big Data) applications and frameworks.…”
Section: Platform Architecturementioning
confidence: 99%
“…In a nutshell, DICE Monitoring (DMon) platform 19 is designed as a Web service, enabling the deployment and management of several sub-components. Each of the sub-components is responsible for enabling monitoring of Data Intensive (Big Data) applications and frameworks.…”
Section: Platform Architecturementioning
confidence: 99%
“…The wide adoption of virtualization in several application domains gave rise to a large body of research work covering a variety of topics, dealing for instance with elastic resource contention issues of VMs or services Kundu et al (2012); Matsunaga and Fortes (2010); Bodík et al (2009); Silvestre et al (2015a), server reconfiguration Cerf et al (2016), resources and energy management Chase et al (2001); Berral et al (2010), and security Bhat et al (2013); Gander et al (2013). Other works also propose frameworks dedicated to the processing of large datasets (or big data) sourced from cloud infrastructures such as Pop (2016).…”
Section: Related Workmentioning
confidence: 99%
“…() Relational where an anomaly is described by an irregular relationship among data elements (objects). There has been a wealth of research in developing and exploiting new techniques for detecting security configuration anomalies, which adopt an object‐centric modelling technique()…”
Section: Related Workmentioning
confidence: 99%