Anomaly detection in cloud environments

Marnerides, A. K. (2015) Anomaly detection in cloud environments. In: Mastorakis, G., Mavromoustakis, C. X. and Pallis, E. (eds.) Resource Management of Mobile Cloud Computing Networks and Environments. Series: Advances in systems analysis, software engineering, and high performance computing (ASASEHPC). Information Science Reference: Hershey, PA, pp. 43-67. ISBN 9781466682252 (doi: 10.4018/978-1-4666-8225-2.ch003)

Full text not currently available from Enlighten.


Cloud environments compose unique operational characteristics and intrinsic capabilities such as service transparency and elasticity. By virtue of their exclusive properties as being outcomes of their virtualized nature, these environments are prone to a number of security threats either from malicious or legitimate intent. By virtue of the minimal proactive properties attained by off-the-shelf signature-based commercial detection solutions employed in various infrastructures, cloud-specific Intrusion Detection System (IDS) Anomaly Detection (AD)-based methodologies have been proposed in order to enable accurate identification, detection, and clustering of anomalous events that could manifest. Therefore, in this chapter the authors firstly aim to provide an overview in the state of the art related with cloud-based AD mechanisms and pinpoint their basic functionalities. They subsequently provide an insight and report some results derived by a particular methodology that jointly considers cloud-specific properties and relies on the Empirical Mode Decomposition (EMD) algorithm.

Item Type:Book Sections
Glasgow Author(s) Enlighten ID:Marnerides, Dr Angelos
Authors: Marnerides, A. K.
College/School:College of Science and Engineering > School of Computing Science
Publisher:Information Science Reference

University Staff: Request a correction | Enlighten Editors: Update this record