Browse > Article
http://dx.doi.org/10.9708/jksci.2020.25.04.105

CLIAM: Cloud Infrastructure Abnormal Monitoring using Machine Learning  

Choi, Sang-Yong (Dept. of Cyber Security, Yeungnam University College)
Abstract
In the fourth industrial revolution represented by hyper-connected and intelligence, cloud computing is drawing attention as a technology to realize big data and artificial intelligence technologies. The proliferation of cloud computing has also increased the number of threats. In this paper, we propose one way to effectively monitor to the resources assigned to clients by the IaaS service provider. The method we propose in this paper is to model the use of resources allocated to cloud systems using ARIMA algorithm, and it identifies abnormal situations through the use and trend analysis. Through experiments, we have verified that the client service provider can effectively monitor using the proposed method within the minimum amount of access to the client systems.
Keywords
Cloud computing; ARIMA algorithm; Machine learning; Resource; Monitoring;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 M. J. Lee, "Internet & Information Security:Big Data and the Utilization of Public Data", KISA, PP. 47-64, 2011
2 hyun seok jeong, "A Study on the Application of Cloud Computing in the 4th Industrial Revolution", Korean Institute of Communications and Information Sciences, Vol. 44, No. 6, pp. 1213-1222, 2019, DOI:10.7840/kics.2019.44.6.1213   DOI
3 Amazon AWS, https://aws.amazon.com/ko/
4 Mocrosoft Azure, https://azure.microsoft.com/ko-kr/
5 Cloud Services Information Protection Guide, KISA, pp. 1-98, 2011
6 Cloud Computing Issues and Status, KEIT, pp. 1-48, 2011
7 Cloud Computing, https://en.wikipedia.org/wiki/Cloud_computing
8 Jihye Shin, "Regulations and the standard form contract for the user protection on the cloud computing service", HUFS Law Review, Vol. 40, No. 4 pp.117-140, 2016, DOI : 10.17257/hufslr.2016.40.4.117   DOI
9 "Top Threats to Cloud Computing Plus: Industry Insights", Cloud Security Alliance, Dec. 2017
10 Vyas, Giriraj, Sanjay Meena, and Pramendra Kumar. "Intrusion Detection Systems: A Modern Investigation." International Journal of Engineering, Management & Sciences (IJEMS) Vol. 1, No. 11, 2014.
11 Alpaydin, "Ethem. Introduction to machine learning", MIT press, 2020.
12 Patric R. Nicolas, "Scala for Machine Learning", Packt Publishing Ltd, Dec. 2015,
13 Contreras, Javier, et al. "ARIMA models to predict next-day electricity prices." IEEE transactions on power systems, Vol. 18, No. 3, pp.1014-1020. 2003, DOI: 10.1109/TPWRS.2002.804943   DOI
14 Yin-Goo Yim, Hyun-Wook Jin,."Analysis of Impact of Multi-core CPU Bandwidth in Docker Containers", KIISE Transactions on Computing Practices, Vol. 24, No. 12, pp.675-680, 2018, DOI: 10.5626/ktcp.2018.24.12.675   DOI
15 D. Merkel, "Docker: Lightweight Linux Containers for Consistent Development and Deployment", Journal of Linux Journal 2014, Vol. 2014, No. 239, pp. 2, May. 2014.
16 STRESS, https://www.cyberciti.biz/faq/stress-test-linux-unix-server-with-stress-ng/