Anomaly Detection for Nodes Under the Cloud Computing Environment

Anomaly Detection for Nodes Under the Cloud Computing Environment

Yang Lei, Ying Jiang
Copyright: © 2021 |Pages: 19
DOI: 10.4018/IJDST.2021010103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Due to the services diversity and dynamic deployment, the anomalies will occur on nodes under cloud computing environment. If a single node generates an anomaly, the associated nodes are affected by the abnormal node, which will result in anomaly propagation and nodes failure. In this paper, a method of anomaly detection for nodes under the cloud computing environment is proposed. Firstly, the node monitoring model is established by the agents deployed on each node. Secondly, the comprehensive score is used to identify abnormal data. The anomaly of the single node is judged by the time window-based method. Then, the status of directly associated nodes is detected through normalized mutual information and the status of indirectly associated nodes is detected through the node attributes in the case of a single node anomaly. Finally, other associated nodes affected by the abnormal node are detected. The experimental results showed that the method in this paper can detect the anomalies of single node and associated node under the cloud computing environment effectively.
Article Preview
Top

In order to ensure the normal operation of cloud computing services, the operating status of nodes must be obtained in time. Effective anomaly detection methods can not only reduce the impact of node anomalies, but also improve service quality. The importance of nodes contributes to the research of node anomaly detection under the cloud computing environment.

2.1. Node Importance

A large number of research results (Malliaros et al., 2016; Yu et al., 2008; Zhao et al., 2009) show that the importance of nodes represents the degree of impact on node's performance when it failures.

Many researches have proposed related computing methods for node importance evaluation. Zhao Y.H et al. defined the Node Importance Contribution Matrix (NICM) based on the interrelationship between interconnected nodes. A node importance evaluation algorithm combining NICM and intermediary was proposed (Zhao et al., 2009). Liang Y.Y et al. proposed an algorithm for mining key nodes in a directed network based on association relationships (Liang et al., 2017). Ren Z.M et al. comprehensively considered the number of neighbors of a node and the closeness of connections between its neighbors, and proposed a node importance evaluation method based on neighbor information and clustering coefficient (Ren et al., 2013).

The above researches are all based on the mining of important nodes or key nodes. The nodes with high importance are more likely to be abnormal under the cloud computing environment in the case of abnormal occurrence. The nodes with high importance can be detected in time. The nodes with low importance have low probability of abnormal occurrence and have little impact on the cloud environment. So it is necessary to filter less important nodes to speed up anomaly detection.

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024)
Volume 14: 2 Issues (2023)
Volume 13: 8 Issues (2022)
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing