INFORMATION CHANGE THE WORLD

International Journal of Modern Education and Computer Science (IJMECS)

ISSN: 2075-0161 (Print), ISSN: 2075-017X (Online)

Published By: MECS Press

IJMECS Vol.6, No.6, Jun. 2014

An Automatic Approach to Detect Software Anomalies in Cloud Computing Using Pragmatic Bayes Approach

Full Text (PDF, 566KB), PP.37-45


Views:55   Downloads:1

Author(s)

Nethaji V, Chandrasekar C

Index Terms

Cloud Environment;Pragmatic Bayes approach;Gaussian mixture;Marginal Distributions;Trusted Computing Base;Profiling Data

Abstract

Software detection of anomalies is a vital element of operations in data centers and service clouds. Statistical Process Control (SPC) cloud charts sense routine anomalies and their root causes are identified based on the differential profiling strategy. By automating the tasks, most of the manual overhead incurred in detecting the software anomalies and the analysis time are reduced to a larger extent but detailed analysis of profiling data are not performed in most of the cases. On the other hand, the cloud scheduler judges both the requirements of the user and the available infrastructure to equivalent their requirements. OpenStack prototype works on cloud trust management which provides the scheduler but complexity occurs when hosting the cloud system. At the same time, Trusted Computing Base (TCB) of a computing node does not achieve the scalability measure. This unique paradigm brings about many software anomalies, which have not been well studied. This work, a Pragmatic Bayes approach studies the problem of detecting software anomalies and ensures scalability by comparing information at the current time to historical data. In particular, PB approach uses the two component Gaussian mixture to deviations at current time in cloud environment. The introduction of Gaussian mixture in PB approach achieves higher scalability measure which involves supervising massive number of cells and fast enough to be potentially useful in many streaming scenarios. Wherein previous works has been ensured for scheduling often lacks of scalability, this paper shows the superiority of the method using a Bayes per section error rate procedure through simulation, and provides the detailed analysis of profiling data in the marginal distributions using the Amazon EC2 dataset. Extensive performance analysis shows that the PB approach is highly efficient in terms of runtime, scalability, software anomaly detection ratio, CPU utilization, density rate, and computational complexity.

Cite This Paper

Nethaji V, Chandrasekar C,"An Automatic Approach to Detect Software Anomalies in Cloud Computing Using Pragmatic Bayes Approach", IJMECS, vol.6, no.6, pp.37-45, 2014.DOI: 10.5815/ijmecs.2014.06.05

Reference

[1]Donghun Lee., Sang K. Cha., and Arthur H. Lee., "A performance anomaly detection and analysis framework for DBMS development," IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 8, AUGUST 2012.

[2]Imad M. Abbadi., and AnbangRuan., "towards trustworthy resource scheduling in clouds," IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 6, JUNE 2013.

[3]Flavio Lombardi., RobertoDiPietro., "Secure virtualization for cloud computing," Journal of Network and Computer Applications, Elsevier journal., 2010.

[4]A.S.SyedNavaz., V.Sangeetha.,C.Prabhadevi., "Entropy based anomaly detection system to prevent DDoS attacks in cloud," International Journal of Computer Applications (0975 – 8887) Volume 62– No.15, January 2013.

[5]Rongxing Lu., Xiaodong Lin., Xiaohui Liang., and Xuemin (Sherman) Shen., "Secure provenance: The essential of bread and butter of data forensics in cloud computing," ACM journal., 2010.

[6]VivekNallur., Rami Bahsoon., "A decentralized self-adaptation mechanism for service-based applications in the cloud," IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2012.

[7]WenjuanXu, Xinwen Zhang., Hongxin Hu., Gail-JoonAhn., and Jean-Pierre Seifert., "Remote attestation with domain-based integrity model and policy analysis," TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, IEEE, 2012.

[8]KonstantinosTsakalozos., MemaRoussopoulos., and Alex Delis., "Hint-based execution of workloads in clouds with nefeli," IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 7, JULY 2013.

[9]AlexandruIosup., Simon Ostermann,NezihYigitbasi., RaduProdan., ThomasFahringer., and Dick Epema., "Performance analysis of cloud computing services for many-tasks scientific computing," IEEE TPDS, MANY-TASK COMPUTING, NOVEMBER 2010.

[10]Mohamed Nabeel., Elisa Bertino., "Privacy-preserving fine-grained access control in public clouds," IEEE Computer Society Technical Committee on Data Engineering, 2012.

[11]KuiXu., HuijunXiong, Chehai Wu., Deian Stefan., and Danfeng Yao., "Data-provenance verification for secure hosts," IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 2, MARCH/APRIL 2012.

[12]Qian Wang., Cong Wang., KuiRen., Wenjing Lou., and Jin Li., "Enabling public auditability and data dynamics for storage security in cloud computing," IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 5, MAY 2011.

[13]Mark Harmana., KiranLakhotiaa., Jeremy Singerb., David R. Whiteb.,Shin Yooa., "Cloud engineering is search based software engineering too," The Journal of Systems and Software., Elsevier journal., 2013.

[14]DimitriosZissis., DimitriosLekkas., "Addressing cloud computing security issues," Future Generation Computer Systems., Elsevier journal., 2012.