Multistage Anomaly Detection over Intelligence Threats Evolution for Secured Cloud Computing Resources

Many research institutions (ENISA, CSA, SUN, etc.) on cloud computing are always referred to a DDoS attacks item wamingly. In this paper, we describe the evolution of intelligence threats to APTs from various DDoS attacks, symptoms of DDoS attacks, and multistage anomaly detection scheme of anomaly...

Full description

Saved in:
Bibliographic Details
Published inInternational Information Institute (Tokyo). Information Vol. 16; no. 12; p. 8469
Main Authors Ji, YooKang, Kim, YongIl, Kim, JongWon, Cha, ByungRae
Format Journal Article
LanguageEnglish
Published Koganei International Information Institute 01.12.2013
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Many research institutions (ENISA, CSA, SUN, etc.) on cloud computing are always referred to a DDoS attacks item wamingly. In this paper, we describe the evolution of intelligence threats to APTs from various DDoS attacks, symptoms of DDoS attacks, and multistage anomaly detection scheme of anomaly for secured cloud computing resource. Specially, Lightweight anomaly detection stage could classified volume data into large volume data and small volume data, and applied Bayesian techniques to detect anomaly and symptoms of various attack. And focused anomaly detection stage is performed to detect novel attacks by unsupervised learning algorithm. [PUBLICATION ABSTRACT]
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ISSN:1343-4500
1344-8994