Development of an Anomaly Detection Algorithm in Distributed Systems based on Runtime and System Status
DOI:
https://doi.org/10.31185/wjcm.Vol1.Iss1.25Keywords:
Anomaly Detection Algorithm, Distributed Systems, System StatusAbstract
Computational grades have emerged as a new approach to solving large-scale problems in the fields of science, engineering, and commerce. The computing grid is a hardware and software infrastructure that provides affordable, reliable, comprehensive, and affordable access to the computational abilities of others. A computational grid is associated with a set of resources on a large scale. Computational grades have emerged as a new approach to solving large-scale problems in the fields of science, engineering, and commerce. The computing grid is a hardware and software infrastructure that provides affordable, reliable, comprehensive, and affordable access to the computational abilities of others. A computational grid is associated with a set of resources on a large scale. The purpose of this thesis is to provide a method that optimizes resource management and scheduling in at least one direction. The main focus of the research is on the time criterion, the deadline for doing things and receiving the response from the grid are parameters that can be examined. From a more general perspective, the aim of the research is to get the answer as quickly as possible from the calculation grid. The proposed algorithm improves the scheduling and resource management of the grid in the direction of improvement, and the structure and form of this problem have not yet been resolved. The proposed solution has been considered hypothesis and removed some of the definitions of grid scheduling, such as cost, quality of service, architectures, and others, but ultimately heed it and timed the grid in some ways.
References
B. Zhang, H. Zhang, P. Moscato, and A. Zhang, “Anomaly detection via mining numerical workflow relations from logs,” 2020 International Symposium on Reliable Distributed Systems (SRDS), pp. 195–204, 2020.
L. Pan, Z. Gu, Y. Ren, C. Liu, and Z. Wang, “An anomaly detection method for system logs using Venn-Abers predictors,” 2020 IEEE Fifth International Conference on Data Science in Cyberspace (DSC), pp. 362–368, 2020.
S. O. Al-Mamory and H. Zhang, “New data mining technique to enhance IDS alarms quality,” Journal in Computer Virology, vol. 6, no. 1, pp. 43–55, 2010.
E. Alpaydin, Introduction to Machine Learning. Cambridge, Massachusetts, London, England: The MIT Press, 2020.
J. P. Anderson, Computer security threat monitoring and surveillance. Fort Washington, Pennsylvania: James P. Anderson Company, 1980.
R. Bace and P. Mell, “NIST special publication on intrusion detection systems, DTIC Document,” 2021.
E. Bloedorn, A. D. Christiansen, W. Hill, C. Skorupka, L. M. Talbot, and J. Tivel, “Data mining for network intrusion detection: How to get started,” 2001.
S. T. Brugger, “Data mining methods for network intrusion detection,” 2004. http://neuro.bstu.by/ai/Todom/My_research/failed%201%20subitem/For-research/D-mining/Anomaly-D/Intrusion-detection/brugger-dmnid.pdf.
J. Balthrop, S. Forrest, and M. R. Glickman, “Revisiting LISYS: parameters and normal behavior,” 2022.
Y. Zuo, Y. Wu, G. Min, C. Huang, and K. Pei, “An intelligent anomaly detection scheme for micro-services architectures with temporal and spatial data analysis,” IEEE Transactions on Cognitive Communications and Networking, vol. 6, no. 2, pp. 548–561, 2020.
H. Cheng-Yuan, L. Yuan-Cheng, I. W. Chen, W. Fu-Yu, and T. Wei-Hsuan, “Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems,” Communications Magazine, vol. 50, no. 3, pp. 146–154, 2012.
V. H. Le and H. Zhang, “Log-based anomaly detection without log parsing,” 36th IEEE/ACM International Conference on Automated Software Engineering (ASE), pp. 492–504, 2021.
Darpa, “MIT Lincoln Laboratory: Communications & Information Technology,” 1998. http://www.ll.mit.edu/mission/communications/ist/index.html.
D. E. Denning, “An Intrusion-Detection Model,” Software Engineering, IEEE Transactions on, SE-13, pp. 222–232, 1987.
S. S. Dongre and K. K. Wankhade, “Intrusion Detection System Using New Ensemble Boosting Approach,” International Journal of Modeling and Optimization, vol. 2, 2022.
Emerald, “Event Monitoring Enabling Responses to Anomalous Live Disturbances (EMERALD,” 1996. http://www.sdl.sri.com/projects/emerald/.
M. V. Mahoney and P. K. Chan, “An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection,” in Recent Advances in Intrusion Detection 2820 (G. Vigna and C. K. E. Jonsson, eds.), pp. 220–237, Springer, 2013.
J. Mchugh, “Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory,” ACM Transactions on Information and System Security, vol. 3, no. 4, pp. 262–294, 2020.
R. G. Mohammed and A. M. Awadelkarim, “Design and Implementation of a Data Mining-Based Network Intrusion Detection Scheme,” Asian Journal of Information Technology, vol. 10, no. 4, pp. 136–141, 2011.
C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, and M. Rajarajan, “A survey of intrusion detection techniques in Cloud,” Journal of Network and Computer Applications, vol. 36, no. 1, pp. 42–57, 2013.
Nmap, “Nmap - Free Security Scanner for Network Exploration & Security Audits.” http://nmap.org/.
V. H. Le and H. Zhang, “Log-based anomaly detection without log parsing,” 36th IEEE/ACM International Conference on Automated Software Engineering (ASE), pp. 492–504, 2021.
R. Xu, Y. Cheng, Z. Liu, Y. Xie, and Y. Yang, “Improved Long Short-Term Memory based anomaly detection with concept drift adaptive method for supporting IoT services,” Future Generation Computer Systems, vol. 112, pp. 228–242, 2020
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Razieh Asgarnezhad, Ali Naseer Kadhim alwali , Mhmood Hamid Sahar Alsaedi , Samer Alwan Zaboon Albwhusseinsarr
This work is licensed under a Creative Commons Attribution 4.0 International License.