Home > Research > Publications & Outputs > Anomaly detection in cloud environments
View graph of relations

Anomaly detection in cloud environments

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Published

Standard

Anomaly detection in cloud environments. / Marnerides, Angelos.
Resource Management of Mobile Cloud Computing Networks and Environments. IGI Global, 2015. p. 43-67.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Harvard

Marnerides, A 2015, Anomaly detection in cloud environments. in Resource Management of Mobile Cloud Computing Networks and Environments. IGI Global, pp. 43-67. https://doi.org/10.4018/978-1-4666-8225-2.ch003

APA

Marnerides, A. (2015). Anomaly detection in cloud environments. In Resource Management of Mobile Cloud Computing Networks and Environments (pp. 43-67). IGI Global. https://doi.org/10.4018/978-1-4666-8225-2.ch003

Vancouver

Marnerides A. Anomaly detection in cloud environments. In Resource Management of Mobile Cloud Computing Networks and Environments. IGI Global. 2015. p. 43-67 doi: 10.4018/978-1-4666-8225-2.ch003

Author

Marnerides, Angelos. / Anomaly detection in cloud environments. Resource Management of Mobile Cloud Computing Networks and Environments. IGI Global, 2015. pp. 43-67

Bibtex

@inbook{324de14099ca43dca4277b2c721271cb,
title = "Anomaly detection in cloud environments",
abstract = "Cloud environments compose unique operational characteristics and intrinsic capabilities such as service transparency and elasticity. By virtue of their exclusive properties as being outcomes of their virtualized nature, these environments are prone to a number of security threats either from malicious or legitimate intent. By virtue of the minimal proactive properties attained by off-the-shelf signature-based commercial detection solutions employed in various infrastructures, cloud-specific Intrusion Detection System (IDS) Anomaly Detection (AD)-based methodologies have been proposed in order to enable accurate identification, detection, and clustering of anomalous events that could manifest. Therefore, in this chapter the authors firstly aim to provide an overview in the state of the art related with cloud-based AD mechanisms and pinpoint their basic functionalities. They subsequently provide an insight and report some results derived by a particular methodology that jointly considers cloud-specific properties and relies on the Empirical Mode Decomposition (EMD) algorithm.",
author = "Angelos Marnerides",
year = "2015",
doi = "10.4018/978-1-4666-8225-2.ch003",
language = "English",
isbn = "9781466682252",
pages = "43--67",
booktitle = "Resource Management of Mobile Cloud Computing Networks and Environments",
publisher = "IGI Global",

}

RIS

TY - CHAP

T1 - Anomaly detection in cloud environments

AU - Marnerides, Angelos

PY - 2015

Y1 - 2015

N2 - Cloud environments compose unique operational characteristics and intrinsic capabilities such as service transparency and elasticity. By virtue of their exclusive properties as being outcomes of their virtualized nature, these environments are prone to a number of security threats either from malicious or legitimate intent. By virtue of the minimal proactive properties attained by off-the-shelf signature-based commercial detection solutions employed in various infrastructures, cloud-specific Intrusion Detection System (IDS) Anomaly Detection (AD)-based methodologies have been proposed in order to enable accurate identification, detection, and clustering of anomalous events that could manifest. Therefore, in this chapter the authors firstly aim to provide an overview in the state of the art related with cloud-based AD mechanisms and pinpoint their basic functionalities. They subsequently provide an insight and report some results derived by a particular methodology that jointly considers cloud-specific properties and relies on the Empirical Mode Decomposition (EMD) algorithm.

AB - Cloud environments compose unique operational characteristics and intrinsic capabilities such as service transparency and elasticity. By virtue of their exclusive properties as being outcomes of their virtualized nature, these environments are prone to a number of security threats either from malicious or legitimate intent. By virtue of the minimal proactive properties attained by off-the-shelf signature-based commercial detection solutions employed in various infrastructures, cloud-specific Intrusion Detection System (IDS) Anomaly Detection (AD)-based methodologies have been proposed in order to enable accurate identification, detection, and clustering of anomalous events that could manifest. Therefore, in this chapter the authors firstly aim to provide an overview in the state of the art related with cloud-based AD mechanisms and pinpoint their basic functionalities. They subsequently provide an insight and report some results derived by a particular methodology that jointly considers cloud-specific properties and relies on the Empirical Mode Decomposition (EMD) algorithm.

U2 - 10.4018/978-1-4666-8225-2.ch003

DO - 10.4018/978-1-4666-8225-2.ch003

M3 - Chapter

SN - 9781466682252

SP - 43

EP - 67

BT - Resource Management of Mobile Cloud Computing Networks and Environments

PB - IGI Global

ER -