Abstract
Cloud computing is one of the utmost rapidly growing computing domains in today’s information technology ecosphere. Cloud computing links data and applications from various geographical locations over the internet. A large number of transactions and the secreted infrastructure in cloud computing systems have presented the research community with numerous challenges. Among these, maintaining cloud network security has emerged as a major challenge in the modern era. As well, detecting anomalous data has become a significant research area in the cloud computing domain. Anomaly detection (or outlier detection) is the identification of unusual or suspicious data that differs significantly from the majority of the data. Recently, machine learning methods have demonstrated their efficacy in anomaly detection approaches. The goal of this research study is to identify which machine learning algorithm is best suited for analyzing cloud network data on anomaly detection. This research study has led a systematic review by using scholarly articles which are published between 2017 and 2023. This review study has deliberated various techniques for anomaly detection on the cloud and different approaches for that.
Similar content being viewed by others
References
Bo Wang, Q., Hua, H., Zhang, X., Tan: Yahui Nan,Rui Chen, Xinfeng Shu, Research on anomaly detection and real-time reliability evaluation with the log of cloud platform. Alexandria Eng. J. (2022). https://doi.org/10.1016/j.aej.2021.12.061. https://www.sciencedirect.com/science/article/pii/S1110016821008711
Stallings, W., Brown, L.: Computer Security: Principles and Practice. Pearson, Harlow, United Kingdom (2019)
Alouffi, B., Hasnain, M., Alharbi, A., Alosaimi, W., Alyami, H., Ayaz, M.: “A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies,“ in IEEE Access, vol. 9, pp. 57792–57807 (2021). https://doi.org/10.1109/ACCESS.2021.3073203
Check Point Software Technology:. Cyber Security Report. Accessed: 2019. [Online]. Available: (2019). https://pages.checkpoint.com/cybersecurity-report-2019.html
Elsayed, M.A., Zulkernine, M.: “PredictDeep: Security Analytics as a Service for Anomaly Detection and Prediction,“ in IEEE Access, vol. 8, pp. 45184–45197 (2020). https://doi.org/10.1109/ACCESS.2020.2977325
Haji, S.H., Ameen, S.Y.: Attack and anomaly detection in IoT Networks using machine learning techniques: A review. Asian J. Res. Comput. Sci. 9(2), 30–46 (2021). https://doi.org/10.9734/ajrcos/2021/v9i230218
Big Data Security and Privacy Handbook: : 100 Best Practices in Big Data Security and Privacy, Cloud Security Alliance, Seattle, WA, USA, (2016)
Tanja Hagemann and Katerina Katsarou:. A Systematic Review on Anomaly Detection for Cloud Computing Environments (2020). https://doi.org/10.1145/3442536.3442550
Vervaet, A.: “MoniLog: An Automated Log-Based Anomaly Detection System for Cloud Computing Infrastructures,” in 2021 IEEE 37th International Conference on Data Engineering (ICDE), Chania, Greece, 2021 pp. 2739–2743 https://doi.org/10.1109/ICDE51399.2021.00317
Nedelkoski, S., Cardoso, J., Kao, O.: “Anomaly Detection from System Tracing Data Using Multimodal Deep Learning,“ 2019 IEEE 12th International Conference on Cloud Computing (CLOUD), Milan, Italy, 2019, pp. 179–186 https://doi.org/10.1109/CLOUD.2019.00038
Xu, W., Huang, L., Fox, A., Patterson, D., Jordan, M.I.: ‘‘Detecting large-scale system problems by mining console logs,’’ in Proc. ACM Symp. Operating Syst. Princ. (SOSP), pp. 117–132. (2009)
Lou, J., Fu, Q., Yang, S., Xu, Y., Li, J.: ‘‘Mining invariants from console logs for system problem detection,’’ in Proc. USENIX Annu. Tech. Conf. (ATC), pp. 231–244 (2010)
Lu, S., Wei, X., Li, Y., Wang, L.: ‘‘Detecting anomaly in big data system logs using convolutional neural network,’’ in Proc. IEEE 16th Int. Conf Dependable, Autonomic Secure Comput., 16th Int. Conf. Pervasive Intell. Comput., 4th Int. Conf Big Data Intell. Comput. Cyber Sci. Technol. Congr. (DASC/PiCom/DataCom/CyberSciTech), Aug. pp. 151–158 (2018)
Nassif, A.B., Talib, M.A., Nasir, Q., Dakalbab, F.M.: Machine learning for Anomaly detection: A systematic review. in IEEE Access. 9, 78658–78700 (2021). https://doi.org/10.1109/ACCESS.2021.3083060
Sureda Riera, T., Bermejo Higuera, J.-R., Bermejo Higuera, J., Mart´ınez Herraiz, J.-J., Sicilia Montalvo, J.-A.: Prevention and fighting against web attacks through Anomaly Detection Technology. Syst. Rev. Sustain. 12, 4945 (2020). https://doi.org/10.3390/su12124945
Ozkan-Okay, M., Samet, R., Aslan, O., Gupta, D.: A comprehensive systematic literature review on Intrusion Detection Systems. in IEEE Access. 9, 157727–157760 (2021). https://doi.org/10.1109/ACCESS.2021.3129336
Svacina, J., Raffety, J., Woodahl, C., Stone, B., Cerny, T., Bures, M., Shin, D., Frajtak, K., Pavel Tisnovsky: and. On Vulnerability and Security Log analysis: A Systematic Literature Review on Recent Trends (2020). https://doi.org/10.1145/3400286.3418261
Jiang, D., Han, Y., Wang, X., Xu, Z., Xu, H., Chen, Z.: “A time-frequency detecting method for network traffic anomalies,” International Conference on Computational Problem- Solving, pp. 94–97. (2010)
Kitchenham, B., Pearl Brereton, O., Budgen, D., Turner, M., Bailey, J., Linkman, S.: Systematic literature reviews in software engineering – A systematic literature review. Inf. Softw. Technol. 51(1), 7–15 (2009)
Kitchenham, B., Charters, S.M.: Guidelines for Performing Systematic Literature Reviews in Software Engineering. Keele University and Durham University (2007)
Garg, S., Kaur, K., Kumar, N., Kaddoum, G., Zomaya, A.Y., Ranjan, R.: “A Hybrid Deep Learning-Based Model for Anomaly Detection in Cloud Datacenter Networks,“ in IEEE Transactions on Network and Service Management, vol. 16, no. 3, pp. 924–935, Sept (2019). https://doi.org/10.1109/TNSM.2019.2927886
Alshammari, A., Aldribi, A.: Apply machine learning techniques to detect malicious network traffic in cloud computing. J. Big Data. 8, 90 (2021). https://doi.org/10.1186/s40537-021-00475-1
Nedelkoski, S., Cardoso, J., Kao, O.: “Anomaly Detection from System Tracing Data Using Multimodal Deep Learning,” IEEE 12th International Conference on Cloud Computing (CLOUD), 2019, pp. 179–186 (2019). https://doi.org/10.1109/CLOUD.2019.00038
Islam, M.S., Pourmajidi, W., Zhang, L., Steinbacher, J., Erwin, T., Miranskyy, A.: “Anomaly Detection in a Large-Scale Cloud Platform,” 2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), pp. 150–159 (2021). https://doi.org/10.1109/ICSE-SEIP52600.2021.00024
Schmidt, F., Johannes, Kao, Odej: “Anomaly detection in cloud computing environments”, 2020, Technische Universit¨at Berlin https://doi.org/10.14279/depositonce-10393
Salman, T., Bhamare, D., Erbad, A., Jain, R., Samaka, M.: “Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments,” 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 97–103 (2017). https://doi.org/10.1109/CSCloud.2017.15
Hajjami, S.E., Malki, J., Berrada, M., Fourka, B.: “Machine Learning for anomaly detection. Performance study considering anomaly distribution in an imbalanced dataset,” 2020 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech), pp. 1–8 (2020). https://doi.org/10.1109/CloudTech49835.2020.9365887
Qiu, X., Dai, Y., Sun, P., Jin, X.: “PHM Technology for Memory Anomalies in Cloud Computing for IaaS,” 2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS), pp. 41–51 (2020). https://doi.org/10.1109/QRS51102.2020.00018
Gerard, A., Latif, R., Latif, S., Iqbal, W., Saba, T., Gerard, N.: “MAD-Malicious Activity Detection Framework in Federated Cloud Computing,” 2020 13th International Conference on Developments in eSystems Engineering (DeSE), pp. 273–278 (2020). https://doi.org/10.1109/DeSE51703.2020.9450728
Bogatinovski, J., Nedelkoski, S., Cardoso, J., Kao, O.: “Self-Supervised Anomaly Detection from Distributed Traces,” 2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC), pp. 342–347 (2020). https://doi.org/10.1109/UCC48980.2020.00054
Wang, W., Du, X., Shan, D., Qin, R., Wang, N.: “Cloud intrusion detection method based on stacked contractive auto-encoder and support vector machine” in IEEE Trans. Cloud Comput. https://doi.org/10.1109/TCC.2020.3001017
Raj, C., Khular, L., Raj, G.: “Clustering Based Incident Handling For Anomaly Detection in Cloud Infrastructures,” 2020 10th International Conference on Cloud Computing, Data Science Engineering (Confluence), pp. 611–616 (2020). https://doi.org/10.1109/Confluence47617.2020.9058314
Yuan, Y., Anu, H., Shi, W., Liang, B., Qin, B.: “Learning-Based Anomaly Cause Tracing with Synthetic Analysis of Logs from Multiple Cloud Service Components,” IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), 2019, pp. 66–71 (2019). https://doi.org/10.1109/COMPSAC.2019.00019
Eltanbouly, S., Bashendy, M., AlNaimi, N., Chkirbene, Z., Erbad, A.: “Machine Learning Techniques for Network Anomaly Detection: A Survey,“ 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), Doha, Qatar, pp. 156–162 (2020). https://doi.org/10.1109/ICIoT48696.2020.9089465
Sivapalan, G., Nundy, K.K., James, A., Cardiff, B., John, D.: “Interpretable rule mining for real-time ECG anomaly detection in IoT Edge Sensors,“ in IEEE Internet of Things Journal https://doi.org/10.1109/JIOT.2023.3260722
He, Z., et al.: “A Spatiotemporal Deep Learning Approach for Unsupervised Anomaly Detection in Cloud Systems,“ in IEEE Transactions on Neural Networks and Learning Systems, vol. 34, no. 4, pp. 1705–1719 (2023). https://doi.org/10.1109/TNNLS.2020.3027736
Wang, Y., Du, X., Lu, Z., Duan, Q., Wu, J.: “Improved LSTM-Based Time-Series Anomaly Detection in Rail Transit Operation Environments,“ in IEEE Transactions on Industrial Informatics, vol. 18, no. 12, pp. 9027–9036 (2022). https://doi.org/10.1109/TII.2022.3164087
Choi, K., Yi, J., Park, C., Yoon, S.: “Deep Learning for Anomaly Detection in Time-Series Data: Review, Analysis, and Guidelines,“ in IEEE Access, vol. 9, pp. 120043–120065 (2021). https://doi.org/10.1109/ACCESS.2021.3107975
Tang, S., Gu, Z., Yang, Q., Fu, S.: “Smart Home IoT Anomaly Detection based on Ensemble Model Learning From Heterogeneous Data,“ 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, pp. 4185–4190 (2019). https://doi.org/10.1109/BigData47090.2019.9006249
Aljamal, I., Tekeoğlu, A., Bekiroglu, K., Sengupta, S.: “Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments,“ 2019 IEEE 17th International Conference on Software Engineering Research, Management and Applications (SERA), Honolulu, HI, USA, pp. 84–89 (2019). https://doi.org/10.1109/SERA.2019.8886794
Funding
Not applicable.
Author information
Authors and Affiliations
Contributions
The first author wrote the main manuscript text and prepared all figures. All authors reviewed and approved the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare no conflict of interest.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Jayaweera, M.P.G.K., Kithulwatta, W.M.C.J.T. & Rathnayaka, R.M.K.T. Detect anomalies in cloud platforms by using network data: a review. Cluster Comput 26, 3279–3289 (2023). https://doi.org/10.1007/s10586-023-04055-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-023-04055-1