|
[1] Abdelsalam, M., Krishnan, R., Huang, Y., and Sandhu, R. Malware detection in cloud infrastructures using convolutional neural networks. In 2018 IEEE 11th International Conference on Cloud Computing (CLOUD) (2018), IEEE, pp. 162–169. [2] Abdelsalam, M., Krishnan, R., and Sandhu, R. Clustering-based iaas cloud monitoring. In 2017 IEEE 10th International Conference on Cloud Computing (CLOUD) (2017), IEEE, pp. 672–679. [3] Ahmad,S.,andPurdy,S.Real-timeanomalydetectionforstreaminganalytics. arXiv preprint arXiv:1607.02480 (2016). [4] Aygun, R. C., and Yavuz, A. G. Network anomaly detection with stochas- tically improved autoencoder based models. In 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) (2017), IEEE, pp. 193–198. [5] Baseman, E., Blanchard, S., DeBardeleben, N., Bonnie, A., and Morrow, A. Interpretable anomaly detection for monitoring of high performance comput- ing systems. In Outlier Definition, Detection, and Description on Demand Workshop at ACM SIGKDD. San Francisco (Aug 2016) (2016). [6] Bhaduri, K., Das, K., and Matthews, B. L. Detecting abnormal machine char- acteristics in cloud infrastructures. In 2011 IEEE 11th International Confer- ence on Data Mining Workshops (2011), IEEE, pp. 137–144. [7] Bhatia, S., Kumar, A., Fiuczynski, M. E., and Peterson, L. L. Lightweight, high-resolution monitoring for troubleshooting production systems. In OSDI (2008), pp. 103–116. [8] Chalapathy,R.,andChawla,S.Deeplearningforanomalydetection:Asurvey. CoRR abs/1901.03407 (2019). [9] Chandola, V., Banerjee, A., and Kumar, V. Anomaly detection: A survey. ACM computing surveys (CSUR) 41, 3 (2009), 15. [10] Chung, C.-J., Khatkar, P., Xing, T., Lee, J., and Huang, D. Nice: Network intrusion detection and countermeasure selection in virtual network systems. IEEE transactions on dependable and secure computing 10, 4 (2013), 198– 211. [11] Ciccotelli, C. Practical fault detection and diagnosis in data centers. [12] Dean, D. J., Nguyen, H., and Gu, X. Ubl: Unsupervised behavior learning for predicting performance anomalies in virtualized cloud systems. In Proceedings of the 9th international conference on Autonomic computing (2012), ACM, pp. 191–200. [13] Gabel, M., Schuster, A., Bachrach, R.-G., and Bjørner, N. Latent fault detec- tion in large scale services. In IEEE/IFIP International Conference on De- pendable Systems and Networks (DSN 2012) (2012), IEEE, pp. 1–12. [14] Gaddam, S. R., Phoha, V. V., and Balagani, K. S. K-means+ id3: A novel method for supervised anomaly detection by cascading k-means clustering and id3 decision tree learning methods. IEEE transactions on knowledge and data engineering 19, 3 (2007), 345–354. [15] Ibidunmoye, O., Hernández-Rodriguez, F., and Elmroth, E. Performance anomaly detection and bottleneck identification. ACM Computing Surveys (CSUR) 48, 1 (2015), 4. [16] Leung, K., and Leckie, C. Unsupervised anomaly detection in network intru- sion detection using clusters. In Proceedings of the Twenty-eighth Australasian conference on Computer Science-Volume 38 (2005), Australian Computer So- ciety, Inc., pp. 333–342. [17] Markou, M., and Singh, S. Novelty detection: a review—part 1: statistical approaches. Signal processing 83, 12 (2003), 2481–2497. [18] Nikolai, J., and Wang, Y. Hypervisor-based cloud intrusion detection system. In 2014 International Conference on Computing, Networking and Communi- cations (ICNC) (2014), IEEE, pp. 989–993. [19] Pietri, I., Juve, G., Deelman, E., and Sakellariou, R. A performance model to estimate execution time of scientific workflows on the cloud. In 2014 9th Work- shop on Workflows in Support of Large-Scale Science (2014), IEEE, pp. 11–19. [20] Roy, A., Zeng, H., Bagga, J., and Snoeren, A. C. Passive realtime datacenter fault detection and localization. In 14th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 17) (2017), pp. 595–612. [21] Shen, K., Stewart, C., Li, C., and Li, X. Reference-driven performance anomaly identification. In ACM SIGMETRICS Performance Evaluation Re- view (2009), vol. 37, ACM, pp. 85–96. [22] Shipmon, D. T., Gurevitch, J. M., Piselli, P. M., and Edwards, S. T. Time series anomaly detection; detection of anomalous drops with limited fea- tures and sparse examples in noisy highly periodic data. arXiv preprint arXiv:1708.03665 (2017). [23] Song, G., Meng, Z., Huet, F., Magoules, F., Yu, L., and Lin, X. A hadoop mapreduce performance prediction method. In 2013 IEEE 10th Interna- tional Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Comput- ing (2013), IEEE, pp. 820–825. [24] Tan,J.,Pan,X.,Kavulya,S.,Gandhi,R.,andNarasimhan,P.Salsa:Analyzing logs as state machines. WASL 8 (2008), 6–6. [25] Wang, C., Viswanathan, K., Choudur, L., Talwar, V., Satterfield, W., and Schwan, K. Statistical techniques for online anomaly detection in data centers. In 12th IFIP/IEEE International Symposium on Integrated Network Manage- ment (IM 2011) and Workshops (2011), IEEE, pp. 385–392. [26] Wang, K., and Khan, M. M. H. Performance prediction for apache spark plat- form. In 2015 IEEE 17th International Conference on High Performance Com- puting and Communications, 2015 IEEE 7th International Symposium on Cy- berspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems (2015), IEEE, pp. 166–173. [27] Wang, T., Wei, J., Zhang, W., Zhong, H., and Huang, T. Workload-aware anomaly detection for web applications. Journal of Systems and Software 89 (2014), 19–32. [28] Wang, Y., Miao, Q., Ma, E. W., Tsui, K.-L., and Pecht, M. G. Online anomaly detection for hard disk drives based on mahalanobis distance. IEEE Transac- tions on Reliability 62, 1 (2013), 136–145. [29] Williams, A. W., Pertet, S. M., and Narasimhan, P. Tiresias: Black-box failure prediction in distributed systems. In 2007 IEEE International Parallel and Distributed Processing Symposium (2007), IEEE, pp. 1–8. [30] Yuan, C., Lao, N., Wen, J.-R., Li, J., Zhang, Z., Wang, Y.-M., and Ma, W.- Y. Automated known problem diagnosis with event traces. In ACM SIGOPS Operating Systems Review (2006), vol. 40, ACM, pp. 375–388. |