A lightweight tool for anomaly detection in cloud data centres
Cloud data centres are critical business infrastructures and the fastest growing service providers. Detecting anomalies in Cloud data centre operation is vital. Given the vast complexity of the data centre system software stack, applications and workloads, anomaly detection is a challenging endeavou...
| Main Authors: | Barbhuiya, Salim, Papazachos, Z., Kilpatrick, P., Nikolopoulos, D. |
|---|---|
| Format: | Conference Paper |
| Published: |
2015
|
| Online Access: | http://hdl.handle.net/20.500.11937/55460 |
Similar Items
LS-ADT: Lightweight and scalable anomaly detection for cloud datacentres
by: Barbhuiya, Salim, et al.
Published: (2016)
by: Barbhuiya, Salim, et al.
Published: (2016)
Challenges and Opportunities in Edge Computing
by: Varghese, B., et al.
Published: (2016)
by: Varghese, B., et al.
Published: (2016)
Anomaly Detection Framework for PingER Data
by: Danny Wilson, Mandai, et al.
Published: (2015)
by: Danny Wilson, Mandai, et al.
Published: (2015)
Supervised anomaly detection in uncertain pseudoperiodic data streams
by: Ma, Jiangang, et al.
Published: (2016)
by: Ma, Jiangang, et al.
Published: (2016)
Anomaly detection in large-scale data stream networks
by: Pham, DucSon, et al.
Published: (2014)
by: Pham, DucSon, et al.
Published: (2014)
Effective Anomaly detection in Sensor Network Data Streams
by: Pham, DucSon, et al.
Published: (2009)
by: Pham, DucSon, et al.
Published: (2009)
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
by: Chimphlee, Witcha, et al.
Published: (2005)
by: Chimphlee, Witcha, et al.
Published: (2005)
Strength Recovery of Lightweight Concrete under Elevated Temperature
by: Barbhuiya, Salim, et al.
Published: (2014)
by: Barbhuiya, Salim, et al.
Published: (2014)
Detection of cross channel anomalies from multiple data channels
by: Pham, DucSon, et al.
Published: (2011)
by: Pham, DucSon, et al.
Published: (2011)
Dempster-Shafer for Anomaly Detection
by: Chen, Qi, et al.
Published: (2006)
by: Chen, Qi, et al.
Published: (2006)
Dendritic Cells for Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Detection of Cross-Channel Anomalies
by: Pham, DucSon, et al.
Published: (2012)
by: Pham, DucSon, et al.
Published: (2012)
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017)
by: Lu, Cai An
Published: (2017)
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
by: Suboh, Syahirah, et al.
Published: (2023)
by: Suboh, Syahirah, et al.
Published: (2023)
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
by: Suboh, Syahirah, et al.
Published: (2023)
by: Suboh, Syahirah, et al.
Published: (2023)
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
by: Suboh, Syahirah, et al.
Published: (2023)
by: Suboh, Syahirah, et al.
Published: (2023)
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
by: Suboh, Syahirah, et al.
Published: (2023)
by: Suboh, Syahirah, et al.
Published: (2023)
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
by: Suboh, Syahirah, et al.
Published: (2023)
by: Suboh, Syahirah, et al.
Published: (2023)
Anomaly Detection in Time Series Data Using Spiking Neural Network
by: Bariah, Yusob, et al.
Published: (2018)
by: Bariah, Yusob, et al.
Published: (2018)
Secure lightweight client for cloud-based E-Health Model
by: Zhang, Xiaowei
Published: (2023)
by: Zhang, Xiaowei
Published: (2023)
Signature-based anomaly intrusion detection using integrated data mining classifiers
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
An Immune Inspired Approach to Anomaly Detection
by: Twycross, Jamie, et al.
Published: (2007)
by: Twycross, Jamie, et al.
Published: (2007)
Anomaly detection for vision-based inspection
by: Chew, Yan Zhe
Published: (2022)
by: Chew, Yan Zhe
Published: (2022)
A systematic review of machine learning and deep learning techniques for anomaly detection in data mining
by: Tahir, Mahjabeen, et al.
Published: (2025)
by: Tahir, Mahjabeen, et al.
Published: (2025)
Fitness function determination of uav anomaly detection in large data set via pso
by: Fatimah, Daing Jamil
Published: (2022)
by: Fatimah, Daing Jamil
Published: (2022)
A refined filter for UHAD to improve anomaly detection
by: Hajamydeen, Asif Iqbal, et al.
Published: (2016)
by: Hajamydeen, Asif Iqbal, et al.
Published: (2016)
Dendritic Cells for Real-Time Anomaly Detection
by: Greensmith, Julie, et al.
Published: (2006)
by: Greensmith, Julie, et al.
Published: (2006)
Generative Models for Anomaly Detection and Its Applications
by: Yu, Jongmin
Published: (2020)
by: Yu, Jongmin
Published: (2020)
Anomaly detection with Attention-based deep autoencoder
by: Yong, Hong Long
Published: (2022)
by: Yong, Hong Long
Published: (2022)
Performance evaluation of load balancing algorithm for virtual machine in data centre in cloud computing
by: Parmesivan, Yuganes, et al.
Published: (2018)
by: Parmesivan, Yuganes, et al.
Published: (2018)
Frequency aware task scheduling using DVFS for energy efficiency in Cloud data centre
by: Samual, Joshua, et al.
Published: (2023)
by: Samual, Joshua, et al.
Published: (2023)
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
A survey of anomaly detection using data mining methods for hypertext transfer protocol web services
by: Kakavand, Mohsen, et al.
Published: (2015)
by: Kakavand, Mohsen, et al.
Published: (2015)
A comparison of different technique in flow based anomaly detection
by: Salah, Mohammad
Published: (2017)
by: Salah, Mohammad
Published: (2017)
A study on advanced statistical analysis for network anomaly detection
by: Ngadi, Md. Asri, et al.
Published: (2005)
by: Ngadi, Md. Asri, et al.
Published: (2005)
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
Using Transformer Models for Stock Market Anomaly Detection
by: Biriukova, Kseniia, et al.
Published: (2023)
by: Biriukova, Kseniia, et al.
Published: (2023)
Packet header anomaly detection using statistical analysis
by: Yassin, Warusia, et al.
Published: (2014)
by: Yassin, Warusia, et al.
Published: (2014)
Video surveillance: Anomaly action detection at front yard
by: Lee, Yong Jin
Published: (2024)
by: Lee, Yong Jin
Published: (2024)
An improved hybrid learning approach for better anomaly detection
by: Mohamed Yassin, Warusia
Published: (2011)
by: Mohamed Yassin, Warusia
Published: (2011)
Similar Items
-
LS-ADT: Lightweight and scalable anomaly detection for cloud datacentres
by: Barbhuiya, Salim, et al.
Published: (2016) -
Challenges and Opportunities in Edge Computing
by: Varghese, B., et al.
Published: (2016) -
Anomaly Detection Framework for PingER Data
by: Danny Wilson, Mandai, et al.
Published: (2015) -
Supervised anomaly detection in uncertain pseudoperiodic data streams
by: Ma, Jiangang, et al.
Published: (2016) -
Anomaly detection in large-scale data stream networks
by: Pham, DucSon, et al.
Published: (2014)