Continuous growth of using the information technologies in the modern world causes gradual accretion amounts of data that are circulating in information and telecommunication system. That creates an urgent need for the establishment of large-scale data storage and accumulation areas and generates many new threats that are not easy to detect. Task of accumulation and storing is solved by datacenters-tools, which are able to provide and automate any business process. For now, almost all service providers use quite promising technology of building datacenters-Cloud Computing, which has some advantages over its traditional opponents. Nevertheless, problem of the provider's data protection is so huge that risk to lose all your data in the-cloud‖ is almost constant. It causes the necessity of processing great amounts of data in real-time and quick notification of possible threats. Therefore, it is reasonable to implement in data centers' network an intellectual system, which will be able to process large datasets and detect possible breaches. Usual threat detection methods are based on signature methods, the main idea of which is comparing the incoming traffic with databases of known threats. However, such methods are becoming ineffective, when the threat is new and it has not been added to database yet. In that case, it is more preferable to use intellectual methods that are capable of tracking any unusual activity in specific system-anomaly detection methods. However, signature module will detect known threats faster, so it is logical to include it in the system too. Big Data methods and tools (e.g. distributed file system, parallel computing on many servers) will provide the speed of such system and allow to process data dynamically. This paper is aimed to demonstrate developed anomaly detection system in secure cloud computing environment, show its theoretical description and conduct appropriate simulation. The result demonstrate that the developed system provides the high percentage (>90%) of anomaly detection in secure cloud computing environment.
CITATION STYLE
Zhengbing, H., Gnatyuk, S., Koval, O., Gnatyuk, V., & Bondarovets, S. (2017). Anomaly Detection System in Secure Cloud Computing Environment. International Journal of Computer Network and Information Security, 9(4), 10–21. https://doi.org/10.5815/ijcnis.2017.04.02
Mendeley helps you to discover research relevant for your work.