|
|
Anomaly Detection of Cloud Computing Platform Based on Multi-features Fusion |
ZHANG Jing1, REN Yonggong1 |
1.School of Computer and Information Technology, Liaoning Normal University, Dalian 116081 |
|
|
Abstract A multi-feature fusion model based on distance constraint and solution space optimization is proposed to utilize the information of different sub-systems in the cloud computing platform and enhance the performance of anomaly detection. The minimum of the errors-sum from all of the single sub-system is obtained to achieve the optimal solution and the fusion of multi-features by iterating, and the high power coefficient is introduced to avoid the degenerating. Moreover, the proposed method is developed as an incremental learning method to ensure the real-time performance. The proposed method reduces the redundant information between high-dimension features and meanwhile mines the latent knowledge of different sub-systems in cloud platform. Thus, the performance in anomaly detection is improved. The private cloud platform based on OpenStack is constructed, and the real-time collection of data is implemented to verify the effectiveness of the proposed method. Compared with the state-of-the-art methods of anomaly detection in cloud platform, the proposed method achieves better accuracy.
|
Received: 24 May 2018
|
|
Fund:Supported by National Natural Science Foundation of China(No.61772252,61702242), Doctoral Scientific Research Foundation of Liaoning Province(No.20170520207) |
Corresponding Authors:
REN Yonggong, Ph.D., professor. His research interests include data mining.
|
About author:: ZHANG Jing, Ph.D., lecturer. Her research interests include machine learning and pattern classification. |
|
|
|
[1]RITTINGHOUSE J W, RANSOME J F. Cloud Computing: Implementation, Management, and Security. Boca Raton, USA: CRC Press, 2016. [2]周 真.云平台下运行环境感知的虚拟机异常检测策略及算法研究.博士学位论文.重庆:重庆大学, 2015. (ZHOU Z. Research on Anomaly Detection Strategy and Algorithms Aware of Running Environment for Virtual Machines in the Cloud Platform. Ph.D Dissertation. Chongqing, China: Chongqing University, 2015.) [3]SALEEM M, RAJOURI J K. Cloud Computing Virtualization. International Journal of Computer Applications Technology and Research, 2017, 6(7): 290-292. [4]VIDAL R, MA Y, SASTRY S S. Principal Component Analysis. New York, USA: Springer, 2016. [5]WANG R, NIE F P, HONG R C, et al. Fast and Orthogonal Loca-lity Preserving Projections for Dimensionality Reduction. IEEE Transactions on Image Processing, 2017, 26(10): 5019-5030. [6]WU L, SHEN C H, VAN DER HENGEL A. Deep Linear Discriminant Analysis on Fisher Networks: A Hybrid Architecture for Person Re-identification. Pattern Recognition, 2017, 65: 238-250. [7]DU K L, SWAMY M N S. Independent Component Analysis. London, UK: Springer, 2014. [8]WRIGHT J, GANESH A, RAO S, et al. Robust Principal Component Analysis: Exact Recovery of Corrupted Low-Rank Matrices // BENGIO Y, SCHUURMANS O, LAFFERTY J D, et al., eds. Advances in Neural Information Processing Systems 22. Cambridge, USA: The MIT Press, 2009: 20:3-20:56. [9]LIU G C, YAN S C. Latent Low-Rank Representation for Subspace Segmentation and Feature Extraction // Proc of the International Conference on Computer Vision. Washington, USA: IEEE, 2011: 1615-1622. [10]GUAN Q, FU S. Adaptive Anomaly Identification by Exploring Metric Subspace in Cloud Computing Infrastructures // Proc of the 32nd IEEE International Symposium on Reliable Distributed Systems. Washington, USA: IEEE, 2013: 205-214. [11]FU S. Performance Metric Selection for Autonomic Anomaly Detection on Cloud Computing Systems // Proc of the IEEE Global Telecommunications Conference. Washington, USA: IEEE, 2011. DOI: 10.1109/GLOCOM.2011.6134532. [12]LAN Z L, ZHENG Z M, LI Y W. Toward Automated Anomaly Identification in Large-Scale Systems. IEEE Transactions on Para-llel and Distributed Systems, 2010, 21(2): 174-187. [13]WARD J L, LUMSDEN S L. Locally Linear Embedding: Dimension Reduction of Massive Protostellar Spectra. Monthly Notices of the Royal Astronomical Society, 2016, 461(2): 2250-2256. [14]LIU C H, JAJA J, PESSOA L. LEICA: Laplacian Eigenmaps for Group ICA Decomposition of fMRI Data. NeuroImage, 2018, 169: 363-373. [15]FUJIMAKI R, YAIRI T, MACHIDA K. An Approach to Spacecraft Anomaly Detection Problem Using Kernel Feature Space // Proc of the 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining. New York, USA: ACM, 2005: 401-410. [16]FARSHCHI M, SCHNEIDER J G, WEBER I, et al. Metric Selection and Anomaly Detection for Cloud Operations Using Log and Metric Correlation Analysis. Journal of Systems and Software, 2017, 137: 531-549. [17]HUANG G, HUANG G B, SONG S J, et al. Trends in Extreme Learning Machines: A Review. Neural Networks, 2015, 61: 32-48. [18]HUANG G B, LIANG N Y, RONG H J, et al. On-line Sequential Extreme Learning Machine[C/OL]. [2018-04-21].http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.101.5176&rep=rep1&type=pdf. [19]MATIA T, SOUZA F, ARAUJO R, et al.On-line Sequential Extreme Learning Machine Based on Recursive Partial Least Squares. Journal of Process Control, 2015, 27: 15-21. [20]HUANG G B, CHEN L. Enhanced Random Search Based Incremental Extreme Learning Machine. Neurocomputing, 2008, 71(16/17/18): 3460-3468. |
|
|
|