Loading…
Study of Multistage Anomaly Detection for Secured Cloud Computing Resources in Future Internet
Future Internet Groups have been studying networking virtualization and computing virtualization for Test bed. Specially, GENI have adopted cloud computing as computing virtualization technique. In this paper, we describe the multistage anomaly detection scheme of anomaly and symptoms of DDoS attack...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Future Internet Groups have been studying networking virtualization and computing virtualization for Test bed. Specially, GENI have adopted cloud computing as computing virtualization technique. In this paper, we describe the multistage anomaly detection scheme of anomaly and symptoms of DDoS attacks for secured cloud computing resource. This scheme is composed by 3 stages. Monitoring stage performs misuse detection by rules of attack patterns to well known DDoS attacks. Lightweight anomaly detection stage could classified volume data into large volume data and small volume data, and applied Bayesian methods to detect anomaly and symptoms of DDoS attack. And focused anomaly detection stage is performed to detect novel DDoS attacks by unsupervised learning algorithm. |
---|---|
DOI: | 10.1109/DASC.2011.171 |