171
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Improved t-SNE in Anomaly Detection of Cloud Virtual Machine

, , , , &
Article: 1995784 | Received 01 Feb 2021, Accepted 16 Oct 2021, Published online: 26 Oct 2021

References

  • Bin, H., B. Deng, P. Fuyang, B. Yang, and F. Xuewei. 2016. “Cloud Resource Status Monitoring Data Compression Technology Based on PCA Dimensionality Reduction [J].” Computer Science 43 (8): 19–25.
  • Camacho, J., A. Pérez-Villegas, P. García-Teodoro, and M.-F. Gabriel. 2016. “PCA-based Multivariate Statistical Network Monitoring for Anomaly Detection [J].” Computers &Security 59: 118–213. doi:10.1016/j.cose.2016.02.008.
  • Cup, K. D. D. 1999. Dataset [EB/OL]. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
  • Danwei, C., H. Nan, and S. Guozi. 2010. “A Cloud Computing Intrusion Detection Model Based on Improved Manifold Learning Method [J].” Computer Science 37 (10): 59–62.
  • Donglin, C., Y. Mengdi, and D. Guohua. 2016. “Decision-making Method of Overbooking in Multi-instance Cloud Computing Resource Market [J].” Computer Applications 36 (1): 113–116.
  • Failure Trace Archive (FTA). 2009. [EB/OL]. http://fta.scem.uws.edu.au/
  • Farshchi, M., J.-G. Schneider, I. Weber, and J. Grundy. 2018. “Metric Selection and Anomaly Detection for Cloud Operations Using Log and Metric Correlation Analysis [J].” Journal of Systems and Software 137: 531–549. doi:10.1016/j.jss.2017.03.012.
  • Guoyuan, L., H. Shan, H. Hao, W. Jiyi, and C. Wei. 2012. “Behavior-based Access Control Security Model for Cloud Computing [J].” Journal of Communications 33 (3): 59–66.
  • Guoyuan, L., G. Shanqing, H. Hao, and C. Tianjie. 2006. “Anomaly Detection Model Based on Dynamic Behavior and Feature Pattern [J].” Journal of Computer Science 2006 (9): 1553–1560.
  • Haotian, Z., J. Chuanliang, S. Yanqiu, and L. Yulong. 2013. “Robust Optimization of Aviation Overbooking Problem under Uncertain Demand [J].” China Management Science Regent 21 (S1): 98–102.
  • Householder, R., S. Arnold, and R. Green. 2014. “Simulating the Effects of Cloud-based Oversubscription on Datacenter Revenues and Performance in Single and Multi-class Service Levels [C].” Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing (CLOUD), Piscataway, NJ, IEEE, 562–569.
  • Huang, J.-Y. 2016. “Patent Portfolio Analysis of the Cloud Computing Industry [J].” Journal of Engineering and Technology Management 39: 45–64. doi:10.1016/j.jengtecman.2016.01.002.
  • Huang, T., Y. Zhu, W. Yafei, S. Bressan, and G. Dobbie. 2016. “Anomaly Detection and Identification Scheme for VM Live Migration in Cloud Infrastructure [J].” Future Generation Computer Systems 56: 736–745. doi:10.1016/j.future.2015.06.005.
  • Javadi, B., D. Kondo, A. Iosup, D. Epema. 2013. “The Failure Trace Archive: Enabling the Comparison of Failure Measurements and Models of Distributed Systems.” Journal of Parallel and Distributed Computing 73 (8): 1208–1223. doi:10.1016/j.jpdc.2013.04.002.
  • Javadi, B., D. Kondo, J. M. Vincent, and D. P. Anderson, 2009. “Mining for Statistical Availability Models in Large-Scale Distributed Systems: An Empirical Study of SETI@home [C].” Proceedings of 17th IEEE/ACM International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), London, England.
  • Jiang, Q., and X. Yan. 2018. “Parallel PCA–KPCA for Nonlinear Process Monitoring [J].” Control Engineering Practice 80: 17–25. doi:10.1016/j.conengprac.2018.07.012.
  • Jinfu, Z., L. Wei, and Y. Yun. 2007. “Research on Comprehensive Dynamic Modeling of Air Passenger Space Control and Overbooking [J].” Journal of Systems Engineering 2007 (5): 525–531.
  • Lakhan, A., Q.-U.-A. Mastoi, M. Elhoseny, M. S. Memon, and M. A. Mohammed. 2021. “Deep Neural Network-based Application Partitioning and Scheduling for Hospitals and Medical Enterprises Using IoT Assisted Mobile Fog Cloud.” Enterprise Information Systems 1–23.
  • Le, A. V., H. A. L. Thi, M. C. Nguyen, A. Zidna. 2012. “Network Intrusion Detection Based on Multi-Class Support Vector Machine [C].” Proceedings of 4th International Conference on Computational Collective Intelligence, Technologies and Applications (ICCCI), Ho Chi Minh, Vietnam, 536–543.
  • Lei, C., H. Dai, Y. Zhilou, and L. Rui. 2020. “A Service Recommendation Algorithm with the Transfer Learning Based Matrix Factorization to Improve Cloud Security [J].” Information Sciences 513: 98–111. doi:10.1016/j.ins.2019.10.004.
  • Li, S., and W. Sun. 2021. “Utility Maximisation for Resource Allocation of Migrating Enterprise Applications into the Cloud.” Enterprise Information Systems 15 (2): 197–229. doi:10.1080/17517575.2020.1730445.
  • Lippmann, R. P., D. J. Fried, I. Graf, Haines JW, Zissman MA. 2000. “Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation [C].” Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX), South Carolina USA, vol. 2, pp. 12–26.
  • Liu, J. C., C. H. Lin, J. L. Yu, W. S. Lai, C. H. Ho. 2008. “Anomaly Detection Using Lib SVM Training Tools [J].” International Journal of Security and Its Applications 2 (4): 89–98.
  • Nabli, H., R. B. Djemaa, and I. A. B. Amor. 2018. “Efficient Cloud Service Discovery Approach Based on LDA Topic Modeling [J].” Journal of Systems and Software 146: 233–248. doi:10.1016/j.jss.2018.09.069.
  • Paul, R., and S. K. Chalup. 2017. “A Study on Validating Non-linear Dimensionality Reduction Using Persistent Homology [J].” Pattern Recognition Letters 100: 160–166. doi:10.1016/j.patrec.2017.09.032.
  • Roman-Rangel, E., and S. Marchand-Maillet. 2019. “Inductive t-SNE via Deep Learning to Visualize Multi-label Images [J].” Engineering Applications of Artificial Intelligence 81: 336–345. doi:10.1016/j.engappai.2019.01.015.
  • Sauvanaud, C., M. Kaâniche, K. Kanoun, K. Lazri, and G. Da Silva Silvestre. 2018. “Guthemberg Da Silva Silvestre. Anomaly Detection and Diagnosis for Cloud Services: Practical Experiments and Lessons Learned [J].” Journal of Systems and Software 139: 84–106. doi:10.1016/j.jss.2018.01.039.
  • Shiping, Z. 2015. Research on Overbooking and Coordination of Tourism Service Supply Chain [D]. Guangzhou: South China University of Technology.
  • Shiping, Z. 2017. “Study on the Overbooking Strategy of Hotel Rooms under the Condition of Known Check-in Probability Distribution [J].” Industrial Engineering 20 (2): 14–18.
  • Siqi, T., and P. Zhisong. 2017. “Anomaly Detection of Network Data Flow Based on Manifold Learning [J].” Journal of Jinan University (Natural Science Edition) 31 (2): 118–128.
  • Suchintan, M., N. S. Manmath, K. S. Arun, and B. Sambit. 2021. “Nature-inspired Cost Optimisation for Enterprise Cloud Systems Using Joint Allocation of Resources.” Enterprise Information Systems 15 (2): 174–196. doi:10.1080/17517575.2019.1605001.
  • Wang, T., X. Jiwei, W. Zhang, G. Zeyu, and H. Zhong. 2018. “Self-adaptive Cloud Monitoring with Online Anomaly Detection [J].” Future Generation Computer Systems 80: 89–101. doi:10.1016/j.future.2017.09.067.
  • Xinyou, Z., Z. Huashen, and J. Lei. 2010. “Research of Intrusion Detection System dataset-KDD CUP99 [J].” Computer Engineering and Design 31 (22): 4809–4812 + 4816.
  • Yazti, D. Z., K. Nucleolus, C. Georgiou, and M. D. Dikaiakos. 2008. “Identifying Failures in Grids through Monitoring and Ranking [C].” Proceedings of 7th IEEE International Symposium on Network Computing and Applications (NCA), Massachusetts, USA, 291–298.
  • Yigitbasi, N., M. Gallet, D. Kondo, A. Iosup, D. H. J. Epema. 2010. “Analysis and Modeling of Time-Correlated Failures in Large-Scale Distributed Systems [C].” Proceedings of 8th IEEE/ACM International Conference on Grid Computing, Texas, USA, 65–72.
  • Zhou, N., L. Guoyuan, and L. Zhengkui. 2015. “Multi-level Security Model Based on Non-interference Theory in Cloud Computing [J].” Information Network Security 2015 (12): 21–27.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.