期刊文献+

基于最近邻算法的虚拟机异常发现

原文传递
导出
摘要 本文在比较现有异常检测技术的基础上,提出了一种虚拟机异常检测框架,并对框架内关键模块的技术实现进行了研究,包括虚拟机的性能指标收集方法和传输方式、基于K-means聚类算法对虚拟机划分检测域模块、基于PCA算法实现对虚拟机性能指标数据的降维的数据处理模块、基于LOF的异常检测机制实现虚拟机的异常检测发现模块。最后,在上述算法研究的基础上进行了有针对性的实验和分析。
出处 《网络安全技术与应用》 2016年第6期55-56,58,共3页 Network Security Technology & Application
基金 中国人民公安大学基本科研业务费项目(2015JKF01210)
  • 相关文献

参考文献4

  • 1张雨.云环境下基于多属性信息熵的虚拟机异常检测[D].大连理工大学,20l5.
  • 2Smith D, Guan Q,Song F.An anorrydetectiOnframewo for automatic management of compute cloud IEEE International Computer SOftware and plitiomConfenceWorkshop,2010.
  • 3WANG C W,TALWA R. V,SCHWAN K,etal.Onlinedetection ofutility cloud anomalies using metric distribut-ions[C]//Proceed'ings of the 2010 IEEE/IFIP Network operation-s and ManagementSymposium,Piscataway, NJ: IEEE,2010.
  • 4王敏,邓胜东.基于主元分析法的虚拟机异常监控研究[J].重庆邮电大学学报(自然科学版),2012,24(6):728-734. 被引量:3

二级参考文献9

  • 1DAWES Les, GOONETILLEKE Ashantha. Using multi- variate analysis to predict the behaviour of soils under ef- fluent irrigation [ J ]. Water Air and Soil Pollution-WA- TER AIR SOIL POLLUT, 2006, 172(1-4) : 109-127.
  • 2KRZYSZTOF Patan, THOMAS Parisini. Identification of neural dynamic models for fault detection and isolation: the case of a real Sugar evaporation process [ J ]. Journal of Process Control, 2005, 15( 1 ) :67-79.
  • 3CHENG Sujun, CHENG Zhendong, LUAN Zhongzhi, et al. NEPnet: A sealable monitoring system for anomaly detection of network service [ C ]//Cheng, S. 2011 7th International Conference on Network and Service Manage- ment, CNSM 2011. Piscataway, NJ 08855-1331, United States: IEEE Computer Society, 445 Hoes Lane-P. O. Box 1331. 2011:338-342.
  • 4AHSAN Arefin, KLARA Nahrstedt, RAOUL Rivas, et al. DIAMOND: Correlation-Based Anomaly Monitoring Daemon for DIME[ C]//2010 IEEE International Sympo- sium on Multimedia, United Stat: IEEE Computer Socie- ty, 2010 : 137-144.
  • 5FENG H H, KOLESNIKOV O M, FOGLA P, et al. A- nomaly detection using call stack information [ C ]//Pro- ceeding SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy, DC, USA :IEEE Computer Soci- ety Washington, 2003:62-75.
  • 6MA Qu-li, LI Hai-lin, ZHAN Hao-ke. The cascaded time- space reverberation suppressin method based on primary component analysis [ C]//2010 IEEE 10th International Conference on Signal Processing Proceedings-ICSP. United States : Conference Publications, 2010:2403-2406.
  • 7GUO Yanhua, JIANG Fuxing. Application of Primary Components Analysis in Studying Burst-Prone Indexes of Coal Seam [ C ]//2009 2nd International Conference on Future Information Technology and Management Engi- neering, FITME 2009. Sanya, China: Conference Publi- cations ,2009:408-411.
  • 8杜海,陈榕.基于完全虚拟化的进程监控方法[J].计算机工程,2009,35(8):88-90. 被引量:8
  • 9谢红,刘人杰,陈纯锴.基于误用检测与异常行为检测的整合模型[J].重庆邮电大学学报(自然科学版),2012,24(1):73-77. 被引量:13

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部