Improving Network Traffic Anomaly Detection for Cloud Computing Services
暂无分享,去创建一个
[1] Ana Cristina Oliveira,et al. Efficient network service level agreement monitoring for cloud computing systems , 2014, 2014 IEEE Symposium on Computers and Communications (ISCC).
[2] Luigino Benetazzo,et al. On the Analysis of Communication and Computer Networks by Traffic Flow Measurements , 2006, IEEE Transactions on Instrumentation and Measurement.
[3] Christof Fetzer,et al. DoLen: User-Side Multi-cloud Application Monitoring , 2014, 2014 International Conference on Future Internet of Things and Cloud.
[4] Miroslaw Malek,et al. A survey of online failure prediction methods , 2010, CSUR.
[5] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[6] Qian Quan,et al. Entropy Based Method for Network Anomaly Detection , 2009, 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing.
[7] Vanish Talwar,et al. Statistical techniques for online anomaly detection in data centers , 2011, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops.
[8] James Won-Ki Hong,et al. Traffic dispersion graph based anomaly detection , 2011, SoICT.
[9] Vyas Sekar,et al. An empirical evaluation of entropy-based traffic anomaly detection , 2008, IMC '08.
[10] Chengwei Wang,et al. EbAT: online methods for detecting utility cloud anomalies , 2009, MDS '09.
[11] Vanish Talwar,et al. Online detection of utility cloud anomalies using metric distributions , 2010, 2010 IEEE Network Operations and Management Symposium - NOMS 2010.
[12] Sachin Shetty,et al. Auditing and Analysis of Network Traffic in Cloud Environment , 2013, 2013 IEEE Ninth World Congress on Services.
[13] Song Fu,et al. An Anomaly Detection Framework for Autonomic Management of Compute Cloud Systems , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.
[14] S. S. Wang,et al. Achieving high efficient agreement with malicious faulty nodes on a cloud computing environment , 2009, ICIS '09.