Anomaly Detection for Nodes Under the Cloud Computing Environment

Anomaly Detection for Nodes Under the Cloud Computing Environment

Yang Lei, Ying Jiang
Copyright: © 2021 |Volume: 12 |Issue: 1 |Pages: 19
ISSN: 1947-3532|EISSN: 1947-3540|EISBN13: 9781799861720|DOI: 10.4018/IJDST.2021010103
Cite Article Cite Article

MLA

Lei, Yang, and Ying Jiang. "Anomaly Detection for Nodes Under the Cloud Computing Environment." IJDST vol.12, no.1 2021: pp.30-48. http://doi.org/10.4018/IJDST.2021010103

APA

Lei, Y. & Jiang, Y. (2021). Anomaly Detection for Nodes Under the Cloud Computing Environment. International Journal of Distributed Systems and Technologies (IJDST), 12(1), 30-48. http://doi.org/10.4018/IJDST.2021010103

Chicago

Lei, Yang, and Ying Jiang. "Anomaly Detection for Nodes Under the Cloud Computing Environment," International Journal of Distributed Systems and Technologies (IJDST) 12, no.1: 30-48. http://doi.org/10.4018/IJDST.2021010103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Due to the services diversity and dynamic deployment, the anomalies will occur on nodes under cloud computing environment. If a single node generates an anomaly, the associated nodes are affected by the abnormal node, which will result in anomaly propagation and nodes failure. In this paper, a method of anomaly detection for nodes under the cloud computing environment is proposed. Firstly, the node monitoring model is established by the agents deployed on each node. Secondly, the comprehensive score is used to identify abnormal data. The anomaly of the single node is judged by the time window-based method. Then, the status of directly associated nodes is detected through normalized mutual information and the status of indirectly associated nodes is detected through the node attributes in the case of a single node anomaly. Finally, other associated nodes affected by the abnormal node are detected. The experimental results showed that the method in this paper can detect the anomalies of single node and associated node under the cloud computing environment effectively.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.