Advertisement

Cluster Computing

, Volume 22, Supplement 1, pp 1229–1238 | Cite as

Research on abnormal data detection method of web browser in cloud computing environment

  • Xindong DuanEmail author
Article
  • 78 Downloads

Abstract

The traditional abnormal data detection method uses the simplified gradient method to detect the abnormal data of web browser, which can not accurately remove the web abnormal data with the interference frequency components, and has low detection performance. Therefore, this paper proposed a distributed web browser abnormal data detection method based on the improved genetic algorithm and spatio-temporal correlation. Based on analyzing the principle of the abnormal data detection in the web browser, we select the abnormal data points of web browser through the deviation function and centralized algorithm, and determine the anomaly factor of web browser using the spatio-temporal distribution, and introduce the improved genetic algorithm to realize the detection of abnormal data of web browser. Simulation results show that the proposed method can reduce the energy consumption of the web data, and the signal amplitude is larger than the amplitude of the interference noise data, which has good anti-jamming performance.

Keywords

Network channel Interference frequency Spatio-temporal correlation Cloud computing environment 

References

  1. 1.
    Chen, P.S., Lin, S.C., Sun, C.H.: Simple and effective method for detecting abnormal internet behaviors of mobile devices. Inf. Sci. 321, 193–204 (2015)CrossRefGoogle Scholar
  2. 2.
    Chen, J., Peng, J., Zhi, X., et al.: Research on application classification method in cloud computing environment. J. Supercomput. 73(8), 3488–3507 (2017)Google Scholar
  3. 3.
    Zhu, Q.: Research on data location method under the cloud computing environment. In: International Conference on Electrical, Computer Engineering and Electronics (2015)Google Scholar
  4. 4.
    Zhang, P., Xu, J., Muazu, H., et al.: Access control research on data security in Cloud computing. In: IEEE International Conference on Communication Technology. IEEE, pp. 873–877 (2015)Google Scholar
  5. 5.
    Wang, J.Y., Liu, Y.Z., Wang, J.K.: A data-stream-based abnormal data mining in web texts environment. J. Comput. Methods Sci. Eng. 16(2), 361–368 (2016)MathSciNetGoogle Scholar
  6. 6.
    Beltrán, M.: Automatic provisioning of multi-tier applications in cloud computing environments. J. Supercomput. 71(6):2221–2250 (2015)Google Scholar
  7. 7.
    He, W., Qiao, P., Xing, L.: Research on multidimensional and evolutionary network security model in cloud computing environment. C. E. Ca. 42(6), 2563–2571 (2017)Google Scholar
  8. 8.
    Hirschprung, R., Toch, E., Maimon, O.: Simplifying data disclosure configurations in a cloud computing environment. ACM Trans. Intell. Syst. Technol. 6(3), 1–26 (2015)CrossRefGoogle Scholar
  9. 9.
    Wang, C.H., Chen, X.L.: Design of hypervisor-based integrated intrusion detection system in cloud computing environment. Front. Artif. Intell. Appl. 274, 972–981 (2015)Google Scholar
  10. 10.
    Iyengar, N.C.S.N., Ganapathy, G.: Chaotic theory based defensive mechanism against distributed denial of service attack in cloud computing environment. Int. J. Secur. Appl. 9(9), 197–212 (2015)Google Scholar
  11. 11.
    Zhang, H., Song, Y.: Research on intrusion detection algorithm of user data based on cloud computing. Int. J. Secur. Appl. 9(9), 275–284 (2015)Google Scholar
  12. 12.
    Jeong, C.W., Kim, W.H., Lypengleang, S., et al.: The development of a medical image information system environment using data synchronization based on cloud computing. Multimed. Tools Appl. 115(5), 1–14 (2015)Google Scholar
  13. 13.
    Luo, J., Tang, J., Xiao, X.: Abnormal Gait behavior detection for elderly based on enhanced Wigner-Ville analysis and cloud incremental SVM learning. J. Sens. 2016, 1–18 (2016)Google Scholar
  14. 14.
    Sookhak, M., Gani, A., Talebian, H., et al.: Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues. ACM Comput. Surv. 47(4), 65–67 (2015)CrossRefGoogle Scholar
  15. 15.
    Wang, Z., Su, X.: Dynamically hierarchical resource-allocation algorithm in cloud computing environment. J. Supercomput. 71(7), 2748–2766 (2015)Google Scholar
  16. 16.
    Zhu, Q., Ye, L., Zhao, Y., et al.: Methods for elimination and reconstruction of abnormal power data in wind farms. Power Syst. Prot. Control 43(3), 38–45 (2015)Google Scholar
  17. 17.
    Li, C., Li, L. Y.: Cost and energy aware service provisioning for mobile client in cloud computing environment. J. Supercomput. 71(4):1196–1223 (2015)Google Scholar
  18. 18.
    Kchaou, H., Kechaou, Z., Alimi, A. M.: Towards an offloading framework based on big data analytics in mobile cloud computing environments. Procedia Comput. Sci. 53(1):292–297 (2015)Google Scholar
  19. 19.
    Ghanem, T.F., Elkilani, W.S., Abdul-Kader, H.M.: A hybrid approach for efficient anomaly detection using metaheuristic methods. J. Adv. Res. 6(4), 609–619 (2015)CrossRefGoogle Scholar
  20. 20.
    Riboni, D., Bettini, C., Civitarese, G., et al.: SmartFABER: recognizing fine-grained abnormal behaviors for early detection of mild cognitive impairment. Artif. Intell. Med. 67, 57–74 (2016)CrossRefGoogle Scholar
  21. 21.
    Yang, J. J., Li, J. Q., Niu, Y.: A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener. Comput. Syst. 43-44(45),74–86 (2015)Google Scholar
  22. 22.
    Kwon, K., Park, H., Jung, S., et al.: Dynamic scheduling method for cooperative resource sharing in mobile cloud computing environments. Trans. Internet Inf. Syst. 10(2), 484–503 (2016)Google Scholar
  23. 23.
    Shao, J., Xingshi, H.E., Wang, J., et al.: Identification method for abnormal factors of spinning quality based on massive data. Comput. Integr. Manuf. Syst. 21(10), 2644–2652 (2015)Google Scholar
  24. 24.
    Melendez, J., Van, G.B., Maduskar, P., et al.: A novel multiple-instance learning-based approach to computer-aided detection of tuberculosis on chest x-rays. IEEE Trans. Med. Imaging 34(1), 179–92 (2015)CrossRefGoogle Scholar
  25. 25.
    Jeong, C.W., Kim, W.H., Lypengleang, S., et al.: The development of a medical image information system environment using data synchronization based on cloud computing. Multimed. Tools Appl. 75(23), 1–14 (2016)Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  1. 1.Department of SoftwareNanyang Institute of TechnologyNanyangChina
  2. 2.School of Computer Science and TechnologyZhoukou Normal UniversityZhoukouChina

Personalised recommendations