2017 Military Communications and Information Systems Conference (MilCIS) 2017
DOI: 10.1109/milcis.2017.8190421
|View full text |Cite
|
Sign up to set email alerts
|

Collaborative anomaly detection framework for handling big data of cloud computing

Abstract: Abstract-With the ubiquitous computing of providing services and applications at anywhere and anytime, cloud computing is the best option as it offers flexible and pay-per-use based services to its customers. Nevertheless, security and privacy are the main challenges to its success due to its dynamic and distributed architecture, resulting in generating big data that should be carefully analysed for detecting network's vulnerabilities. In this paper, we propose a Collaborative Anomaly Detection Framework (CADF… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
6
4

Relationship

2
8

Authors

Journals

citations
Cited by 51 publications
(29 citation statements)
references
References 18 publications
(41 reference statements)
0
29
0
Order By: Relevance
“…While IoT technologies play a vital part in improving real-life smart systems, like smart cities, smart homes, smart healthcare, the large scale and ubiquitous nature of IoT systems has introduced new security challenges [5][6][7]. Furthermore, since IoT devices generally work in an unattended environment, an attacker may physically access these devices with malicious intent [8,9]. Also, because IoT devices are connected usually over wireless networks, eavesdropping can be used to access private information from a communication channel [10,11].…”
Section: Motivationmentioning
confidence: 99%
“…While IoT technologies play a vital part in improving real-life smart systems, like smart cities, smart homes, smart healthcare, the large scale and ubiquitous nature of IoT systems has introduced new security challenges [5][6][7]. Furthermore, since IoT devices generally work in an unattended environment, an attacker may physically access these devices with malicious intent [8,9]. Also, because IoT devices are connected usually over wireless networks, eavesdropping can be used to access private information from a communication channel [10,11].…”
Section: Motivationmentioning
confidence: 99%
“…So, the real attacks can slip through false reports or be ignored. Collaborative anomaly detection framework (CADF) [24] comprises capturing and logging network data, preprocessing it to be handled at the decision engine sensor using the Gaussian Mixture Model (GMM) and interquartile range for identifying abnormal patterns. Moreover, the architecture for deploying this framework as Software as a Service (SaaS) is produced to be easily installed in cloud computing systems.…”
Section: B Network Intrusion Detection Systemsmentioning
confidence: 99%
“…The SVM classifier's accuracy increased to 92.32% The GBT achieved higher classifier's accuracy to 93.13%.There is increase in Precision and Recall of all algorithms with DFEL. Moustafa et al [36] proposed a Collaborative Anomaly Detection Framework (CADF) for detecting cyber-attacks on big data of cloud computing environments. They provided the technical functions and the way of deployment of this proposed framework for these environments.…”
Section: International Journal Of Engineering and Advanced Technologymentioning
confidence: 99%