Skip to main content

Detecting Anomalies in the Virtual Machine Using Machine Learning Techniques

  • Conference paper
  • First Online:
Proceedings of the 2nd International Conference on Cognitive and Intelligent Computing (ICCIC 2022)

Part of the book series: Cognitive Science and Technology ((CSAT))

Included in the following conference series:

  • 198 Accesses

Abstract

There is an increase in demand for cloud computing services, and optimizing the resources is crucial. Conventional algorithms are not adequate to address issues with the cloud, including uneven task distribution in virtual machines or inefficient resource delivery to cloud customers. To significantly enhance the outcome of cloud apps and address the aforementioned difficulties, it is necessary to investigate further sophisticated ways. This study looks into the most recent machine learning techniques that can handle the difficulties in a cloud context. A paradigm monitoring and identification of errors in Virtual Machine (VM) resource utilization is put forth in this study. The suggested methodology called IF-SVM (Isolation Forest-Support Vector Machine) is able to identify the errors. The VM workload trace from PlanetLab is used to test and train the samples. During this process, the concepts of ML techniques such as SVM and IF and the VM resource matrix is used. F1-score of 0.87 is able to achieve by using the SVM for the time series of 1 h and 0.91 F1-score for Isolation Forest for the 50 VMs. This result demonstrates the effectiveness of both methods for the model, but SVM outperforms well in terms of classification in comparison with Isolation Forest.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Boutaba R, Zhang Q, Zhani MF (2014) Virtual machine migration in cloud computing environments: benefits, challenges, and approaches. In: Communication infrastructures for cloud computing: IGI global, pp 383–408

    Google Scholar 

  2. Priyanka H, Cherian M (2020) Efficient utilization of resources of virtual machines through monitoring the cloud data center. In: Bindhu V, Chen J, Tavares J (eds) International conference on communication, computing and electronics systems. Lecture notes in electrical engineering, vol 637. Springer, Singapore

    Google Scholar 

  3. Priyanka H, Cherian M (2022) Energy-efficient resource management of virtual machine in cloud infrastructure. In: Buyya R, Garg L, Fortino G, Misra S (eds) New frontiers in IoT and cloud computing for post-COVID-19 era. Springer Nature, Switzerland. ISBN: 978-3-031-05527-0. https://doi.org/10.1007/978-3-031-05528-7_4

  4. Prashanthi M (2016) Analysis of security issues in virtualization cloud computing. Int J Comput Sci Mob Comput IJCSMC 5(8):274–281

    Google Scholar 

  5. Nguyen H, Tan Y, Gu X (2011) Pal: Propagationaware anomaly localization for cloud hosted distributed applications. In: Managing large-scale systems via the analysis of system logs and the application of machine learning techniques, pp 1–8

    Google Scholar 

  6. Modi CN, Patel DR, Patel A, Muttukrishnan R (2012) Bayesian classifier and snort based network intrusion detection system in cloud computing. In: 2012 third international conference on computing, communication and networking technologies (ICCCNT’12). IEEE, pp 1–7

    Google Scholar 

  7. Junaid M, Sohail A, Rais RNB, Ahmed A, Khalid O, Khan IA, Hussain SS, Ejaz N (2020) Modeling an Optimized Approach for Load Balancing in Cloud. IEEE Access 8:173208–173226

    Article  Google Scholar 

  8. Tiwari T, Turk A, Oprea A, Olcoz K, Coskun AK (2017) User-profile-based analytics for detecting cloud security breaches. In: 2017 IEEE international conference on big data (big data). IEEE, pp 4529–4535

    Google Scholar 

  9. Mehmood Y, Shibli MA, Habiba U, Masood R (2013) Intrusion detection system in cloud computing: Challenges and opportunities. In: 2013 2nd national conference on information assurance (NCIA). IEEE, pp 59–66

    Google Scholar 

  10. Priyanka H, Cherian M (2021) Effective utilization of resources through optimal allocation and opportunistic migration of virtual machines in cloud environment. Int J Cloud Appl Comput (IJCAC) 11(3):72–91. https://doi.org/10.4018/IJCAC.2021070105. (Web of Science, SCI indexed)

  11. Priyanka H, Cherian M (2022) Metaheuristic based resource management approach towards minimization of energy consumption in cloud data centres. J Optoelectron Laser 41.7:676–687

    Google Scholar 

  12. ScikitLearn (23-03-2021) Novelty and outlier detection. Available: https://scikitlearn.org/stable/modules/outlier_detection.html

  13. ScikitLearn. One class SVM. Available: https://scikitlearn.org/stable/modules/generated/sklearn.svm.OneClassSVM.html

  14. Liu FT, Ting KM, Zhou Z-H (2012) Isolation based anomaly detection. ACM Trans Knowl Discov Data 6(1):1–39

    Article  Google Scholar 

  15. Chang C-C, Lin C-J (2001) LIBSVM: a library for support vector machines. ACM Trans Intell Syst 2(3):1–27; Schölkopf B, Platt JC, Shawe-Taylor J, Smola AJ, Williamson RCJNc (2001) Estimating the support of a high-dimensional distribution 13(7):1443–1471

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to H. Priyanka .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Priyanka, H., Rao, M.G., Apoorva, M.S. (2023). Detecting Anomalies in the Virtual Machine Using Machine Learning Techniques. In: Kumar, A., Ghinea, G., Merugu, S. (eds) Proceedings of the 2nd International Conference on Cognitive and Intelligent Computing. ICCIC 2022. Cognitive Science and Technology. Springer, Singapore. https://doi.org/10.1007/978-981-99-2742-5_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-2742-5_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-2741-8

  • Online ISBN: 978-981-99-2742-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics