2011
DOI: 10.1007/978-3-642-20042-7_36
|View full text |Cite
|
Sign up to set email alerts
|

Self-similarity Based Lightweight Intrusion Detection Method for Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
15
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 36 publications
(16 citation statements)
references
References 7 publications
1
15
0
Order By: Relevance
“…Seeking a methodology that determines a value of α that provides good accuracy results without compromising the need for online traffic prediction (i.e., little dependence on historical data), we consider only an initial set of windows to determine an optimal α value. As observed in other works , the resemblance between the first two sliding windows and the entire dataset suggests that the network traffic data exhibits the property of self‐similarity. Taking advantage of this concept, the algorithm will set the best α found in the first two sliding windows to predict the entire dataset.…”
Section: Dynamic Window Size Mechanismsupporting
confidence: 77%
“…Seeking a methodology that determines a value of α that provides good accuracy results without compromising the need for online traffic prediction (i.e., little dependence on historical data), we consider only an initial set of windows to determine an optimal α value. As observed in other works , the resemblance between the first two sliding windows and the entire dataset suggests that the network traffic data exhibits the property of self‐similarity. Taking advantage of this concept, the algorithm will set the best α found in the first two sliding windows to predict the entire dataset.…”
Section: Dynamic Window Size Mechanismsupporting
confidence: 77%
“…In contrast, the TSP of a normal client should be high enough to interact with the Web page. The work of Kwon et al [9] also uses a behavioral approach for detection. They start from a tested assumption saying that the behavioral patterns of normal traffic are similar, while the behavior patterns of malicious traffic are not.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, we shed light on the problem of detecting cloud-based DoS attacks under a changing environment. Although several advanced approaches have been proposed to detect DoS attacks in virtualized cloud (e.g., [6][7][8][9]), these approaches still causes a significant decrease in the detection accuracy when used in a cloud environment. The reason is that the current approaches do not consider the changing environment, that characterises the cloud as a result of its inherent characteristics (resources restriction and scaling).…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we extend their works into a more generalized model; while their approaches [7], [25], [21] simply used the single feature of moving path, we build a generalized framework with various features by designing a self-similarity algorithm to effectively measure bots' repeated activity patterns, which was previously used as a means of analyzing network traffic [10] or developing intrusion detection systems [18]. We note that the proposed method is significantly robust to changes in the configuration settings of bot programs compared with existing approaches (e.g.…”
Section: Related Workmentioning
confidence: 99%