OAK

Multistage anomaly detection over intelligence threats for secured cloud computing resources

Metadata Downloads
Abstract
Many research institutions (ENISA, CSA, SUN, etc.) on cloud computing are always referred to a DDoS attacks item warningly. In this paper, we describe the evolution of intelligence threats to APTs from various DDoS attacks, symptoms of DDoS attacks, and multistage anomaly detection scheme of anomaly for secured cloud computing resource. Specially, Lightweight anomaly detection stage could classified volume data into large volume data and small volume data, and applied Bayesian techniques to detect anomaly and symptoms of various attack. And focused anomaly detection stage is performed to detect novel attacks by unsupervised learning algorithm. © 2013 International Information Institute.
Author(s)
Ji, YookangKim, YongilKim, Jong WonCha, Byungrae
Issued Date
2013-12
Type
Article
URI
https://scholar.gist.ac.kr/handle/local/15311
Publisher
International Information Institute
Citation
Information, v.16, no.12A, pp.8469 - 8474
ISSN
1343-4500
Appears in Collections:
Department of AI Convergence > 1. Journal Articles
공개 및 라이선스
  • 공개 구분공개
파일 목록
  • 관련 파일이 존재하지 않습니다.

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.