2019
DOI: 10.1155/2019/5306395
|View full text |Cite
|
Sign up to set email alerts
|

Applying Catastrophe Theory for Network Anomaly Detection in Cloud Computing Traffic

Abstract: In spite of the tangible advantages of cloud computing, it is still vulnerable to potential attacks and threats. In light of this, security has turned into one of the main concerns in the adoption of cloud computing. Therefore, an anomaly detection method plays an important role in providing a high protection level for network security. One of the challenges in anomaly detection, which has not been seriously considered in the literature, is applying the dynamic nature of cloud traffic in its prediction while m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 29 publications
0
8
0
Order By: Relevance
“…19 A catastrophe algorithm is applied to trace out the network traffic and carry attack detection. 20 Moreover, the massive growth in network traffic loses its capacity in the detection of DDoS attacks. The ancient detection methods such as Reverse hashing Sketch-Based data structure, Bitwise-based sketch, CRT-based Sketch, and so forth are inefficient when there is enormous network traffic.…”
Section: Literature Surveymentioning
confidence: 99%
See 2 more Smart Citations
“…19 A catastrophe algorithm is applied to trace out the network traffic and carry attack detection. 20 Moreover, the massive growth in network traffic loses its capacity in the detection of DDoS attacks. The ancient detection methods such as Reverse hashing Sketch-Based data structure, Bitwise-based sketch, CRT-based Sketch, and so forth are inefficient when there is enormous network traffic.…”
Section: Literature Surveymentioning
confidence: 99%
“…In the proposed work we can analyze the trade-off accuracy and attack detection speed. 20 To make it more efficient, this paper includes the webpage classification algorithms based on the sensitivity of the hash functions. The three new modules are building the feature dictionary, local sensitive hashing, and mapping feature vectors which provided better performance in less time than the naïve Bayes rule.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…In this study, eight main categories [26][27][28][29][30] of natural conditions, the characteristics of agricultural products, financial costs, social culture, population structure, the government environment, and the characteristics of farmers and sales are first determined by axial coding to form and develop the story line of "farmers' willingness to engage in new media marketing." en, the logical relations among the factors of each category are integrated to construct the theoretical model framework of the research problem.…”
Section: Selective Codingmentioning
confidence: 99%
“…W ITH the advancement of the internet and artificial intelligence technology, traditional industrial production and management technologies have fallen behind in meeting the development needs of the time. Driven by new technologies, the traditional industrial manufacturing field is constantly transforming, ushering in new opportunities as well as challenges [1]. With the industrial reforms, diversified information technology and industrial production have become integrated, and new concepts, such as "smart factory" and "intelligent manufacturing," have emerged [2].…”
Section: Introductionmentioning
confidence: 99%