Skip to main content

Big Data-Based Autonomous Anomaly Detection Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing

  • Chapter
  • First Online:
Cyber Security in Intelligent Computing and Communications

Part of the book series: Studies in Computational Intelligence ((SCI,volume 1007))

Abstract

Virtualized infrastructure in cloud computing is becoming popular day-by-day due to its advanced facilities like storing massive data. On the other hand, the attempt to attack these computer networks is growing as it contains qualitative information of several enterprises. To overcome these challenges, a big data-based autonomous anomaly detection using clustering and classification approaches is proposed in this paper. The main aim is to identify the presence of attacks and classify their types in the virtualized cloud infrastructure. The big data are initially stored in a machine called Hadoop Distributed File System. The data are captured and clustered for ease of analysis. The classification task of security analytics is performed with machine learning processes, namely, supervised learning. Moreover, the accuracy of attack classification is verified through Receiver Operator Characteristics Curve. This method is proved to be effective for attack detection in big data storage cloud systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. V. Ratten, Cloud computing technology innovation advances: a set of research propositions, in Disruptive Technology: Concepts, Methodologies, Tools, and Applications (2020), pp. 693–703

    Google Scholar 

  2. H. Shukur, S. Zeebaree, R. Zebari, D. Zeebaree, O. Ahmed, A. Salih, Cloud computing virtualization of resources allocation for distributed systems. J. Applied Sci. Tech. Trends. 1(3), 98–105 (2020)

    Google Scholar 

  3. P.P. Angelov, X. Gu, Applications of autonomous anomaly detection. Stud. Comput. Intell. 249–259 (2018)

    Google Scholar 

  4. X. Gu, P. Angelov, Autonomous anomaly detection, in Evolving and Adaptive Intelligent Systems (EAIS) (2017)

    Google Scholar 

  5. B. Rohit, C. Rituparna, C. Nabendu, S. Sugata, A survey on security issues in cloud computing. Acta Tehnica Corviniensis – Bull. Eng. Tome. 160–177 (2014)

    Google Scholar 

  6. K. Rakesh, Applications of cloud computing in academic libraries. Library Waves 3(1) (2017)

    Google Scholar 

  7. A. Negi, M. Singh, S. Kumar, An efficient security farmework design for cloud computing using artificial neural networks. Int. J. Comput. Appl. 129(4), 17–21. November 2015. Published by Foundation of Computer Science (FCS), NY, USA

    Google Scholar 

  8. S. Liu, T.M. Khoshgoftaar, A.N. Richter, T. Hasanin, A survey of open source tools for machine learning with big data in the Hadoop ecosystem. J. Big Data 2(1) (2015)

    Google Scholar 

  9. A. Gulenko, M. Wallschlager, F. Schmidt, O. Kao, F. Liu, Evaluating machine learning algorithms for anomaly detection in clouds. IEEE Int. Conf. Big Data (Big Data) (2016)

    Google Scholar 

  10. C. Modi, D. Patel, B. Borisaniya, A. Patel, M. Rajarajan, A survey on security issues and solutions at different layers of Cloud computing. J. Supercomput. 63(2), 561–592 (2012)

    Google Scholar 

  11. B. Asvija, R. Eswari, M.B. Bijoy, Security in hardware assisted virtualization for cloud computing—state of the art issues and challenges. Comput. Netw. 151, 68–92 (2019)

    Google Scholar 

  12. M. Jouini, L.B.A. Rabai, A security framework for secure cloud computing environments, in Cloud Security: Concepts, Methodologies, Tools, and Applications (2019), pp. 249–263

    Google Scholar 

  13. H.R.A. Ariyaluran, F. Nasaruddin, A. Gani, H.I.A. Targio, E. Ahmed, M. Imran, Real-time big data processing for anomaly detection: a Survey. Int. J. Inf. Manag. (2018)

    Google Scholar 

  14. L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, A.V. Vasilakos, Security and privacy for storage and computation in cloud computing. Inf. Sci. 258, 371–386 (2014)

    Google Scholar 

  15. K. Shantanu, J. Hiteshkumar, U. Kaushiki, Providing classification and security of Big Data in Cloud computing. Int. J. Tech. Res. Appl. 4(2), 302–304 (2016)

    Google Scholar 

  16. F. Lombardi, R. Di Pietro, Secure virtualization for cloud computing. J. Netw. Comput. App. 34(4), 1113–1122 (2011)

    Google Scholar 

  17. V.N. Inukollu, S. Arsi, S.R. Ravuri, Security issues associated with big data in cloud computing. Int. J. Netw. Secur. App. 6, 39–45 (2014)

    Google Scholar 

  18. A.S. Ibrahim, J. Hamlyn-Harri, J. Grundy, Emerging security challenges of cloud virtual infrastructure (2016)

    Google Scholar 

  19. H. Zhengbing, G. Sergiy, K. Oksana, G. Viktor, B. Serhii, Anomaly detection system in secure cloud computing environment. Int. J. Comput. Netw. Inf. Secur. 4, 10–21 (2017)

    Google Scholar 

  20. A. Mahendiran, N. Saravanan, S.N. Venkata, N. Sairam, Implementation of K-means clustering in cloud computing environment. Res. J. App. Sci. Eng. Tech. 4(10), 1391–1394 (2012)

    Google Scholar 

  21. S. Ahmad, A. Lavin, S. Purdy, Z. Agha, Unsupervised real-time anomaly detection for streaming data. Neurocomputing 262, 134–147 (2017)

    Google Scholar 

  22. T.Y. Win, H. Tianfield, Q. Mair, Big data based security analytics for protecting virtualized infrastructures in cloud computing. IEEE Trans. Big Data 4(1), 11–25 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. M. Diaz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Diaz, P.M., Julie Emerald Jiju, M. (2022). Big Data-Based Autonomous Anomaly Detection Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing. In: Agrawal, R., He, J., Shubhakar Pilli, E., Kumar, S. (eds) Cyber Security in Intelligent Computing and Communications. Studies in Computational Intelligence, vol 1007. Springer, Singapore. https://doi.org/10.1007/978-981-16-8012-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-8012-0_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-8011-3

  • Online ISBN: 978-981-16-8012-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics