Abstract
Virtualized infrastructure in cloud computing is becoming popular day-by-day due to its advanced facilities like storing massive data. On the other hand, the attempt to attack these computer networks is growing as it contains qualitative information of several enterprises. To overcome these challenges, a big data-based autonomous anomaly detection using clustering and classification approaches is proposed in this paper. The main aim is to identify the presence of attacks and classify their types in the virtualized cloud infrastructure. The big data are initially stored in a machine called Hadoop Distributed File System. The data are captured and clustered for ease of analysis. The classification task of security analytics is performed with machine learning processes, namely, supervised learning. Moreover, the accuracy of attack classification is verified through Receiver Operator Characteristics Curve. This method is proved to be effective for attack detection in big data storage cloud systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
V. Ratten, Cloud computing technology innovation advances: a set of research propositions, in Disruptive Technology: Concepts, Methodologies, Tools, and Applications (2020), pp. 693–703
H. Shukur, S. Zeebaree, R. Zebari, D. Zeebaree, O. Ahmed, A. Salih, Cloud computing virtualization of resources allocation for distributed systems. J. Applied Sci. Tech. Trends. 1(3), 98–105 (2020)
P.P. Angelov, X. Gu, Applications of autonomous anomaly detection. Stud. Comput. Intell. 249–259 (2018)
X. Gu, P. Angelov, Autonomous anomaly detection, in Evolving and Adaptive Intelligent Systems (EAIS) (2017)
B. Rohit, C. Rituparna, C. Nabendu, S. Sugata, A survey on security issues in cloud computing. Acta Tehnica Corviniensis – Bull. Eng. Tome. 160–177 (2014)
K. Rakesh, Applications of cloud computing in academic libraries. Library Waves 3(1) (2017)
A. Negi, M. Singh, S. Kumar, An efficient security farmework design for cloud computing using artificial neural networks. Int. J. Comput. Appl. 129(4), 17–21. November 2015. Published by Foundation of Computer Science (FCS), NY, USA
S. Liu, T.M. Khoshgoftaar, A.N. Richter, T. Hasanin, A survey of open source tools for machine learning with big data in the Hadoop ecosystem. J. Big Data 2(1) (2015)
A. Gulenko, M. Wallschlager, F. Schmidt, O. Kao, F. Liu, Evaluating machine learning algorithms for anomaly detection in clouds. IEEE Int. Conf. Big Data (Big Data) (2016)
C. Modi, D. Patel, B. Borisaniya, A. Patel, M. Rajarajan, A survey on security issues and solutions at different layers of Cloud computing. J. Supercomput. 63(2), 561–592 (2012)
B. Asvija, R. Eswari, M.B. Bijoy, Security in hardware assisted virtualization for cloud computing—state of the art issues and challenges. Comput. Netw. 151, 68–92 (2019)
M. Jouini, L.B.A. Rabai, A security framework for secure cloud computing environments, in Cloud Security: Concepts, Methodologies, Tools, and Applications (2019), pp. 249–263
H.R.A. Ariyaluran, F. Nasaruddin, A. Gani, H.I.A. Targio, E. Ahmed, M. Imran, Real-time big data processing for anomaly detection: a Survey. Int. J. Inf. Manag. (2018)
L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, A.V. Vasilakos, Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371–386 (2014)
K. Shantanu, J. Hiteshkumar, U. Kaushiki, Providing classification and security of Big Data in Cloud computing. Int. J. Tech. Res. Appl. 4(2), 302–304 (2016)
F. Lombardi, R. Di Pietro, Secure virtualization for cloud computing. J. Netw. Comput. App. 34(4), 1113–1122 (2011)
V.N. Inukollu, S. Arsi, S.R. Ravuri, Security issues associated with big data in cloud computing. Int. J. Netw. Secur. App. 6, 39–45 (2014)
A.S. Ibrahim, J. Hamlyn-Harri, J. Grundy, Emerging security challenges of cloud virtual infrastructure (2016)
H. Zhengbing, G. Sergiy, K. Oksana, G. Viktor, B. Serhii, Anomaly detection system in secure cloud computing environment. Int. J. Comput. Netw. Inf. Secur. 4, 10–21 (2017)
A. Mahendiran, N. Saravanan, S.N. Venkata, N. Sairam, Implementation of K-means clustering in cloud computing environment. Res. J. App. Sci. Eng. Tech. 4(10), 1391–1394 (2012)
S. Ahmad, A. Lavin, S. Purdy, Z. Agha, Unsupervised real-time anomaly detection for streaming data. Neurocomputing 262, 134–147 (2017)
T.Y. Win, H. Tianfield, Q. Mair, Big data based security analytics for protecting virtualized infrastructures in cloud computing. IEEE Trans. Big Data 4(1), 11–25 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Diaz, P.M., Julie Emerald Jiju, M. (2022). Big Data-Based Autonomous Anomaly Detection Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing. In: Agrawal, R., He, J., Shubhakar Pilli, E., Kumar, S. (eds) Cyber Security in Intelligent Computing and Communications. Studies in Computational Intelligence, vol 1007. Springer, Singapore. https://doi.org/10.1007/978-981-16-8012-0_6
Download citation
DOI: https://doi.org/10.1007/978-981-16-8012-0_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-8011-3
Online ISBN: 978-981-16-8012-0
eBook Packages: EngineeringEngineering (R0)