[1] |
AWS.Summary of the Amazon EC2 and Amazon RDS service disruption in the US east region[EB/OL].[2011-04-29].
|
|
http://aws.amazon.com/message/65648/.
|
[2] |
Wang Rui-han.Research on key technology of real-time anomaly detection of virtual machine in cloud environment [D].Guiyang:Guizhou University,2018.(in Chinese)
|
[3] |
Bouchenak S,Chockler G,Chockler H,et al.Verifying cloud services:Present and future[J].ACM SIGOPS Operating Systems Review,2013,47(2):6-19.
|
[4] |
Chandola V, Banerjee A,Kumar V.Anomaly detection:A survey[J].ACM Computing Surveys,2009,41(3):1-58.
|
[5] |
Hua Hui-you, Chen Qi-mai, Liu Hai,et al. Hybrid K-means with KNN for
|
|
network intrusion detection algorithm [J].Computer Science,2016,43(3):158-162.(in Chinese)
|
[6] |
Wang Rui-han,Gao Jian-ling,Chen Yu.Research on anomaly detection of LASVM in cloud environment [J].Electronic Science and Technology,2018,31(6):75-79.(in Chinese)
|
[7] |
Breunig M M,Kriegel H P,Ng R T.LOF:Identifying density-based local outliers[C]∥Proc of ACM SIGMOD International Conference on Management of Data,2000:93-104.
|
[8] |
Zhang Qian-nan.Research of the real-time anomaly detection and auto reaction system based on cloud computing[D].Shanghai:Shanghai Jiao Tong University,2014.(in Chinese)
|
[9] |
Liu Chang.Multi attribute analysis of virtual machine exceptions in cloud environment [D].Dalian:Dalian University of Technology,2014.(in Chinese)
|
[10] |
Núez J A,Cincotta P M,Wachlin F C.Information entropy[J].Celestial Mechanics & Dynamical Astronomy,1996,64(1/2):43-53.
|
[11] |
Richardson A,Kaminka G, Kraus S. CUBS:Multivariate sequence classification using bounded Z-score with sampling[C]∥
|
|
Proc of IEEE International Conference on Data Mining Workshops,2010:72-79.
|
[12] |
Song Yu-chen,Zhang Yu-ying,Meng Hai-dong.Research based on Euclidean distance with weights of clustering method[J].Computer Engineering and Applications,2007,43(4):179-180.(in Chinese)
|
[13] |
Li Wu-zhi,Zhang Bin. Context-based web service discovery mechanism[J].Computer Engineering and Design,2012,33(7):2580-2583.(in Chinese)
|
[14] |
Liu Xiao-guo,Tian Jing. Application research of improved K-means algorithm in intrusion detection[C]∥Proc of 2015 International Conference on Computational Science and Engineering,2015:96-100.
|
[15] |
Han Xiao-hong,Hu Yu.Research of K-means algorithm[J].Journal of Taiyuan University of Technology,2009,40(3):236-239.(in Chinese)
|
[16] |
Liu Cheng-cheng,Jiang Ying. Fault detection method for cloud computing using improved fuzzy k nearest neighbor[J].Journal of Chinese Computer Systems,2018,39(10):2285-2290.(in Chinese)
|
|
附中文参考文献:
|
[2] |
王瑞晗.云环境下虚拟机实时异常检测关键技术研究[D].贵阳:贵州大学,2018.
|
[5] |
华辉有,陈启买,刘海,等.一种融合Kmeans和KNN的网络入侵检测算法[J].计算机科学,2016,43(3):158-162.
|
[6] |
王瑞晗,高建瓴,陈语.适用于云环境的 LASVM 异常检测研究[J].电子科技,2018,31(6):75-79.
|
[8] |
张倩楠.基于云计算异常的实时检测和自动响应系统研究[D].上海:上海交通大学,2014.
|
[9] |
刘畅.云环境下虚拟机异常的多属性分析[D].大连:大连理工大学,2014.
|
[12] |
宋宇辰,张玉英,孟海东.一种基于加权欧氏距离聚类方法的研究[J].计算机工程与应用,2007,43(4):179-180.
|
[13] |
李武智,张斌.基于服务上下文的Web服务发现机制[J].
|
|
计算机工程与设计,2012,33(7):2580-2583.
|
[15] |
韩晓红,胡彧.K-means聚类算法的研究[J].太原理工大学学报,2009,40(3):236-239.
|
[16] |
刘诚诚,姜瑛.一种改进模糊kNN的云计算故障检测方法[J].小型微型计算机系统,2018,39(10):2285-2290.
|