2010 IEEE Global Telecommunications Conference GLOBECOM 2010 2010
DOI: 10.1109/glocom.2010.5683551
|View full text |Cite
|
Sign up to set email alerts
|

Fast Anomaly Detection for Large Data Centers

Abstract: Abstract-Recent spates of cyber attacks towards cloud computing services running in large data centers have made it imperative to develop effective techniques to detect anomalous behaviors in the "clouds". In this paper, we propose to use the distributions of IP address octets and centroid based measures to characterize the inherent IP structure in high-volume data center traffic, and subsequently design a simple yet effective algorithm to detect abnormal traffic patterns caused by network attacks such as worm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…Various other research efforts [1], [23] proposed an outlier-based model that enhanced the prediction performance. In an effort to understand the C-EVM improvement in prediction performance, an alternative hypothesis is that using the default DBSCAN will allow the system to ignore outliers that could impact PSI model fitting and overall performance.…”
Section: ) Ablation Study: C-evm and Outliersmentioning
confidence: 99%
“…Various other research efforts [1], [23] proposed an outlier-based model that enhanced the prediction performance. In an effort to understand the C-EVM improvement in prediction performance, an alternative hypothesis is that using the default DBSCAN will allow the system to ignore outliers that could impact PSI model fitting and overall performance.…”
Section: ) Ablation Study: C-evm and Outliersmentioning
confidence: 99%
“…Anomalies are behavior patterns that do not fit well-defined normal patterns, or are extraordinary data [15]. Anomalies in a simple two-dimensional dataset are shown in Figure 1.…”
Section: Anomaly Detection Techniquementioning
confidence: 99%
“…Anomalies can consist of data that can cause harmful activities such as cyber attacks, frauds in banking and financial systems, terrorist activities, or malfunctioning of a system, or that contain various warnings [15][19] [20]. When analyzed, it is easy to see that all of them have common features that are out of order.…”
Section: Anomaly Detection Techniquementioning
confidence: 99%
“…The EbAT introduces entropy to measure the performance metric distributions. Li et al proposed a fast anomaly detection scheme for large scale data center [13]. The proposed scheme exploits the distributions of IP addresses and finds out the abnormal data that are caused by the network attacks.…”
Section: Related Workmentioning
confidence: 99%