Skip to main content

Advertisement

Log in

Research on abnormal data detection method of web browser in cloud computing environment

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The traditional abnormal data detection method uses the simplified gradient method to detect the abnormal data of web browser, which can not accurately remove the web abnormal data with the interference frequency components, and has low detection performance. Therefore, this paper proposed a distributed web browser abnormal data detection method based on the improved genetic algorithm and spatio-temporal correlation. Based on analyzing the principle of the abnormal data detection in the web browser, we select the abnormal data points of web browser through the deviation function and centralized algorithm, and determine the anomaly factor of web browser using the spatio-temporal distribution, and introduce the improved genetic algorithm to realize the detection of abnormal data of web browser. Simulation results show that the proposed method can reduce the energy consumption of the web data, and the signal amplitude is larger than the amplitude of the interference noise data, which has good anti-jamming performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Chen, P.S., Lin, S.C., Sun, C.H.: Simple and effective method for detecting abnormal internet behaviors of mobile devices. Inf. Sci. 321, 193–204 (2015)

    Article  Google Scholar 

  2. Chen, J., Peng, J., Zhi, X., et al.: Research on application classification method in cloud computing environment. J. Supercomput. 73(8), 3488–3507 (2017)

  3. Zhu, Q.: Research on data location method under the cloud computing environment. In: International Conference on Electrical, Computer Engineering and Electronics (2015)

  4. Zhang, P., Xu, J., Muazu, H., et al.: Access control research on data security in Cloud computing. In: IEEE International Conference on Communication Technology. IEEE, pp. 873–877 (2015)

  5. Wang, J.Y., Liu, Y.Z., Wang, J.K.: A data-stream-based abnormal data mining in web texts environment. J. Comput. Methods Sci. Eng. 16(2), 361–368 (2016)

    MathSciNet  Google Scholar 

  6. Beltrán, M.: Automatic provisioning of multi-tier applications in cloud computing environments. J. Supercomput. 71(6):2221–2250 (2015)

  7. He, W., Qiao, P., Xing, L.: Research on multidimensional and evolutionary network security model in cloud computing environment. C. E. Ca. 42(6), 2563–2571 (2017)

  8. Hirschprung, R., Toch, E., Maimon, O.: Simplifying data disclosure configurations in a cloud computing environment. ACM Trans. Intell. Syst. Technol. 6(3), 1–26 (2015)

    Article  Google Scholar 

  9. Wang, C.H., Chen, X.L.: Design of hypervisor-based integrated intrusion detection system in cloud computing environment. Front. Artif. Intell. Appl. 274, 972–981 (2015)

    Google Scholar 

  10. Iyengar, N.C.S.N., Ganapathy, G.: Chaotic theory based defensive mechanism against distributed denial of service attack in cloud computing environment. Int. J. Secur. Appl. 9(9), 197–212 (2015)

    Google Scholar 

  11. Zhang, H., Song, Y.: Research on intrusion detection algorithm of user data based on cloud computing. Int. J. Secur. Appl. 9(9), 275–284 (2015)

    Google Scholar 

  12. Jeong, C.W., Kim, W.H., Lypengleang, S., et al.: The development of a medical image information system environment using data synchronization based on cloud computing. Multimed. Tools Appl. 115(5), 1–14 (2015)

    Google Scholar 

  13. Luo, J., Tang, J., Xiao, X.: Abnormal Gait behavior detection for elderly based on enhanced Wigner-Ville analysis and cloud incremental SVM learning. J. Sens. 2016, 1–18 (2016)

    Google Scholar 

  14. Sookhak, M., Gani, A., Talebian, H., et al.: Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues. ACM Comput. Surv. 47(4), 65–67 (2015)

    Article  Google Scholar 

  15. Wang, Z., Su, X.: Dynamically hierarchical resource-allocation algorithm in cloud computing environment. J. Supercomput. 71(7), 2748–2766 (2015)

  16. Zhu, Q., Ye, L., Zhao, Y., et al.: Methods for elimination and reconstruction of abnormal power data in wind farms. Power Syst. Prot. Control 43(3), 38–45 (2015)

    Google Scholar 

  17. Li, C., Li, L. Y.: Cost and energy aware service provisioning for mobile client in cloud computing environment. J. Supercomput. 71(4):1196–1223 (2015)

  18. Kchaou, H., Kechaou, Z., Alimi, A. M.: Towards an offloading framework based on big data analytics in mobile cloud computing environments. Procedia Comput. Sci. 53(1):292–297 (2015)

  19. Ghanem, T.F., Elkilani, W.S., Abdul-Kader, H.M.: A hybrid approach for efficient anomaly detection using metaheuristic methods. J. Adv. Res. 6(4), 609–619 (2015)

    Article  Google Scholar 

  20. Riboni, D., Bettini, C., Civitarese, G., et al.: SmartFABER: recognizing fine-grained abnormal behaviors for early detection of mild cognitive impairment. Artif. Intell. Med. 67, 57–74 (2016)

    Article  Google Scholar 

  21. Yang, J. J., Li, J. Q., Niu, Y.: A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener. Comput. Syst. 43-44(45),74–86 (2015)

  22. Kwon, K., Park, H., Jung, S., et al.: Dynamic scheduling method for cooperative resource sharing in mobile cloud computing environments. Trans. Internet Inf. Syst. 10(2), 484–503 (2016)

    Google Scholar 

  23. Shao, J., Xingshi, H.E., Wang, J., et al.: Identification method for abnormal factors of spinning quality based on massive data. Comput. Integr. Manuf. Syst. 21(10), 2644–2652 (2015)

    Google Scholar 

  24. Melendez, J., Van, G.B., Maduskar, P., et al.: A novel multiple-instance learning-based approach to computer-aided detection of tuberculosis on chest x-rays. IEEE Trans. Med. Imaging 34(1), 179–92 (2015)

    Article  Google Scholar 

  25. Jeong, C.W., Kim, W.H., Lypengleang, S., et al.: The development of a medical image information system environment using data synchronization based on cloud computing. Multimed. Tools Appl. 75(23), 1–14 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xindong Duan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Duan, X. Research on abnormal data detection method of web browser in cloud computing environment. Cluster Comput 22 (Suppl 1), 1229–1238 (2019). https://doi.org/10.1007/s10586-017-1221-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1221-9

Keywords

Navigation