Review on Anomaly Detection In Cloud Computing

  • Ragini * Computer Science & Engineering Ganga Institute of Technology and Management Kablana
  • Mahesh Kumar Computer Science & Engineering Ganga Institute of Technology and Management Kablana
Keywords: pattern recognition,, cloud computing,anomaly, detection,clustering

Abstract

In research checking of a given sequence of tokens for presence of constituents of some pattern is made to find anomaly in
cloud environment. Proposed algorithm would be integrated to cloud environment to find anomalies. Contrast to pattern recognition;
match usually has to be exact. Detecting anomaly behaviors is one of most challenging tasks for Information Systems (IS)
administrators. Anomaly behavior is defined as any behavior from either inside or outside of organization’s information system that
deviates from normal; this includes insider attacks as well as any behavior that threatens confidentiality, integrity & availability of
organization's information systems. Anomaly detection is applicable in a variety of domains, such as intrusion detection, fraud detection,
fault detection, system health monitoring, event detection in sensor networks, & detecting Eco-system disturbances.

Downloads

Download data is not yet available.

Author Biographies

Ragini *, Computer Science & Engineering Ganga Institute of Technology and Management Kablana

M.Tech. Student ,Computer Science & Engineering Ganga Institute of Technology and Management Kablana, Jhajjar, Haryana, India

Mahesh Kumar, Computer Science & Engineering Ganga Institute of Technology and Management Kablana

Associate Professor, Computer Science & Engineering Ganga Institute of Technology and Management Kablana, Jhajjar, Haryana, India

Published
2017-04-30
How to Cite
*, R., & Kumar, M. (2017). Review on Anomaly Detection In Cloud Computing. IJRDO -Journal of Computer Science Engineering, 3(4), 17-20. https://doi.org/10.53555/cse.v3i4.274