Multistage Anomaly Detection over Intelligence Threats Evolution for Secured Cloud Computing Resources
Many research institutions (ENISA, CSA, SUN, etc.) on cloud computing are always referred to a DDoS attacks item wamingly. In this paper, we describe the evolution of intelligence threats to APTs from various DDoS attacks, symptoms of DDoS attacks, and multistage anomaly detection scheme of anomaly...
Saved in:
Published in | International Information Institute (Tokyo). Information Vol. 16; no. 12; p. 8469 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Koganei
International Information Institute
01.12.2013
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Many research institutions (ENISA, CSA, SUN, etc.) on cloud computing are always referred to a DDoS attacks item wamingly. In this paper, we describe the evolution of intelligence threats to APTs from various DDoS attacks, symptoms of DDoS attacks, and multistage anomaly detection scheme of anomaly for secured cloud computing resource. Specially, Lightweight anomaly detection stage could classified volume data into large volume data and small volume data, and applied Bayesian techniques to detect anomaly and symptoms of various attack. And focused anomaly detection stage is performed to detect novel attacks by unsupervised learning algorithm. [PUBLICATION ABSTRACT] |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
ISSN: | 1343-4500 1344-8994 |