2020 3rd Artificial Intelligence and Cloud Computing Conference 2020
DOI: 10.1145/3442536.3442550
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Review on Anomaly Detection for Cloud Computing Environments

Abstract: The detection of anomalies in data is a far-reaching field of research which also applies to the field of cloud computing in several different ways: from the detection of various types of intrusions to the detection of hardware failures, many publications address how far anomaly detection methods are able to meet the specific requirements of a cloud-based network. Since there is still no comprehensive overview of this constantly growing field of research, this literature review provides a systematic evaluation… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 163 publications
0
7
0
Order By: Relevance
“…Application Focus [6] cloud computing IDS [5] computer networks IDS [24] malicious actor space and information networks [2] IIoT GNNs [23] attention-based AD - [4] attention-based AD - [1] non-IoT graph-based AD deep learning [3] general AD -…”
Section: Referencementioning
confidence: 99%
See 2 more Smart Citations
“…Application Focus [6] cloud computing IDS [5] computer networks IDS [24] malicious actor space and information networks [2] IIoT GNNs [23] attention-based AD - [4] attention-based AD - [1] non-IoT graph-based AD deep learning [3] general AD -…”
Section: Referencementioning
confidence: 99%
“…The work in [ 6 ] focuses on cloud computing in cloud computing environments. The paper highlights the length of time anomaly detection has been performed, with the earliest reference of anomaly detection (on facial recognition) being performed in 1990 [ 16 , 17 ].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Anomalies are unexpected events that deviate from the typical pattern of data in cloud computing. Three types of anomalies in the cloud environment have been classified into point anomalies, collective anomalies, and contextual anomalies [72]. Distributed denial of service (DDoS) attacks can cause anomalies in the cloud environment by flooding the system with traffic and preventing legitimate users from accessing shared resources [73].…”
Section: Anomalies-aware Autoscalingmentioning
confidence: 99%
“…The Reinforcement Learning (RL) method was taught using an Arti cial Neural Network (ANN) to optimize the e ciency and pro tability of private cloud storage services over time. This learned method incorporates a novel approach to converting the merit of each condition into a particular effect [11].…”
Section: Reinforcement Learning (Rl)mentioning
confidence: 99%