ANOMALY DETECTION IN THE SERVICES PROVIDED BY MULTI CLOUD ARCHITECTURES: A SURVEY

An Anomaly is abnormal activity or deviation from the normal behavior. Anomaly detection is the process of removing these abnormal or anomalous behaviors from the data or services. The services delivered to users by cloud service providers must have normal behavior. To provide services to users in the proper and normal form, anomaly detection becomes important and interested area for research work. For anomaly detection so many techniques are developed and these techniques are broadly divided into three categories: - statistical, data mining based and machine learning based anomaly detection technique. Anomaly detection techniques are used to detect and discard anomalies from the data or services. In this survey paper we provide overview of some anomaly detection techniques which are discovered recently for the tracing data. In the anomaly detection models anomalies are detected by comparing the tracing data with the actual data. On the basis of comparison deviations in the traced data or services are identified and they are considered as anomaly.

[1]  Huaimin Wang,et al.  Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems , 2013, IEEE Transactions on Parallel and Distributed Systems.

[2]  Dario Pompili,et al.  Model-Based Thermal Anomaly Detection in Cloud Datacenters , 2013, 2013 IEEE International Conference on Distributed Computing in Sensor Systems.

[3]  Jianguo Liu,et al.  AAD: Adaptive Anomaly Detection System for Cloud Computing Infrastructures , 2012, 2012 IEEE 31st Symposium on Reliable Distributed Systems.

[4]  Vanish Talwar,et al.  Online detection of utility cloud anomalies using metric distributions , 2010, 2010 IEEE Network Operations and Management Symposium - NOMS 2010.

[5]  Jeff G. Schneider,et al.  Detecting anomalous records in categorical datasets , 2007, KDD '07.

[6]  Nils Gruschka,et al.  Security and Privacy-Enhancing Multicloud Architectures , 2013, IEEE Transactions on Dependable and Secure Computing.

[7]  Ruth Breu,et al.  Anomaly Detection in the Cloud: Detecting Security Incidents via Machine Learning , 2012, EternalS@ECAI.

[8]  Zhenbang Chen,et al.  P-Tracer: Path-Based Performance Profiling in Cloud Computing Systems , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.

[9]  Eric A. Brewer,et al.  Pinpoint: problem determination in large, dynamic Internet services , 2002, Proceedings International Conference on Dependable Systems and Networks.

[10]  Lior Rokach,et al.  Ensemble of Feature Chains for Anomaly Detection , 2013, MCS.

[11]  Philip K. Chan,et al.  Learning rules for anomaly detection of hostile network traffic , 2003, Third IEEE International Conference on Data Mining.

[12]  Ahmed E. Hassan,et al.  Automatic detection of performance deviations in the load testing of Large Scale Systems , 2013, 2013 35th International Conference on Software Engineering (ICSE).

[13]  Wilson C. Hsieh,et al.  Bigtable: A Distributed Storage System for Structured Data , 2006, TOCS.

[14]  Amin Vahdat,et al.  Pip: Detecting the Unexpected in Distributed Systems , 2006, NSDI.

[15]  Donald Beaver,et al.  Dapper, a Large-Scale Distributed Systems Tracing Infrastructure , 2010 .