Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Xiong, Wei | en_US |
dc.contributor.author | Hu, Hanping | en_US |
dc.contributor.author | Xiong, Naixue | en_US |
dc.contributor.author | Yang, Laurence T. | en_US |
dc.contributor.author | Peng, Wen-Chih | en_US |
dc.contributor.author | Wang, Xiaofei | en_US |
dc.contributor.author | Qu, Yanzhen | en_US |
dc.date.accessioned | 2014-12-08T15:33:53Z | - |
dc.date.available | 2014-12-08T15:33:53Z | - |
dc.date.issued | 2014-02-10 | en_US |
dc.identifier.issn | 0020-0255 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1016/j.ins.2013.04.009 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/23369 | - |
dc.description.abstract | Cloud computing represents a new paradigm where computing resources are offered as services in the world via communication Internet. As many new types of attacks are arising at a high frequency, the cloud computing services are exposed to an increasing amount of security threats. To reduce security risks, two approaches of the network traffic anomaly detection in cloud communications have been presented, which analyze dynamic characteristics of the network traffic based on the synergetic neural networks and the catastrophe theory. In the former approach, a synergetic dynamic equation with a group of the order parameters is used to describe the complex behaviors of the network traffic system in cloud communications. When this equation is evolved, only the order parameter determined by the primary factors can converge to 1. Then, the anomaly can be detected. In the latter approach; a catastrophe potential function is introduced to describe the catastrophe dynamic process of the network traffic in cloud communications. When anomalies occur, the state of the network traffic will deviate from the normal one. To assess the deviation, an index named as catastrophe distance is defined. The network traffic anomaly can be detected by the value of this index. We evaluate the performance of these two approaches using the standard Defense Advanced Research Projects Agency data sets. Experimental results show that our approaches can effectively detect the network traffic anomaly and achieve the high detection probability and the low false alarms rate. (C) 2013 Published by Elsevier Inc. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Anomaly detection | en_US |
dc.subject | Cloud communication | en_US |
dc.subject | Network traffic | en_US |
dc.subject | Synergetic neural networks | en_US |
dc.subject | Catastrophe theory | en_US |
dc.subject | Chaotic dynamics | en_US |
dc.title | Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communication? | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1016/j.ins.2013.04.009 | en_US |
dc.identifier.journal | INFORMATION SCIENCES | en_US |
dc.citation.volume | 258 | en_US |
dc.citation.issue | en_US | |
dc.citation.spage | 403 | en_US |
dc.citation.epage | 415 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000329262200027 | - |
dc.citation.woscount | 1 | - |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.