A Hidden Markov Model-Based Method for Virtual Machine Anomaly Detection

被引:0
作者
Shi, Chaochen [1 ]
Yu, Jiangshan [2 ]
机构
[1] China Mobile IoT Ltd, Chongqing, Peoples R China
[2] Monash Univ, Melbourne, Vic, Australia
来源
PROVABLE SECURITY, PROVSEC 2019 | 2019年 / 11821卷
关键词
Hidden Markov Model; Virtual machine; Anomaly detection; Cloud computing;
D O I
10.1007/978-3-030-31919-9_24
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The normal operation of virtual machine is a necessity for supporting cloud service. Motivated by the great desire of automated abmornal operation detection, this paper proposes a Hidden Markov Model-based method to conduct anomaly detection of virtual machine. This model can depict normal outline base of virtual machine operation and detect system outliers through calculating non-match rate. Through verifying the method in a real distributed environment, experiment results indicate that this method has 1.1%-4.9% better detection accuracy compared with two leading benchmarks with a much better efficiency.
引用
收藏
页码:372 / 380
页数:9
相关论文
共 50 条
[21]   Adaptive Hidden Markov Model With Anomaly States for Price Manipulation Detection [J].
Cao, Yi ;
Li, Yuhua ;
Coleman, Sonya ;
Belatreche, Ammar ;
McGinnity, Thomas Martin .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2015, 26 (02) :318-330
[22]   Unknown Anomaly Detection Using Hidden Markov Model and AreaSensing Techniques [J].
Kurahashi, Setsuya ;
Ono, Isao .
TETSU TO HAGANE-JOURNAL OF THE IRON AND STEEL INSTITUTE OF JAPAN, 2020, 106 (02) :91-99
[23]   An Efficient Hidden Markov Model For Anomaly Detection In CAN Bus Networks [J].
Boumiza, Safa ;
Braham, Rafik .
2019 27TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2019, :482-487
[24]   Anomaly detection based on a dynamic Markov model [J].
Ren, Huorong ;
Ye, Zhixing ;
Li, Zhiwu .
INFORMATION SCIENCES, 2017, 411 :52-65
[25]   Anomaly detection based on a granular Markov model [J].
Zhou, Yanjun ;
Ren, Huorong ;
Li, Zhiwu ;
Pedrycz, Witold .
EXPERT SYSTEMS WITH APPLICATIONS, 2022, 187
[26]   Intrusion detection based on Hidden Markov Model [J].
Yin, QB ;
Shen, LR ;
Zhang, RB ;
Li, XY ;
Wang, HQ .
2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, :3115-3118
[27]   A systematic review on intrusion detection based on the Hidden Markov Model [J].
Ramaki, Ali Ahmadian ;
Rasoolzadegan, Abbas ;
Jafari, Abbas Javan .
STATISTICAL ANALYSIS AND DATA MINING, 2018, 11 (03) :111-134
[28]   Virtual Machine Anomaly Detection Based on Partitioning Detection Domain [J].
Qin, Deyuan ;
Chen, Shuyu ;
Zhang, Hancui ;
Wu, Tianshu .
PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, :434-437
[29]   A Hidden Markov Model-Based Approach to Removing EEG Artifact [J].
Mohammadpour, Mostafa ;
Rahmani, Vahid .
2017 5TH IRANIAN JOINT CONGRESS ON FUZZY AND INTELLIGENT SYSTEMS (CFIS), 2017, :46-49
[30]   A hidden Markov model-based text classification of medical documents [J].
Yi, Kwan ;
Beheshti, Jamshid .
JOURNAL OF INFORMATION SCIENCE, 2009, 35 (01) :67-81