Computer Science ›› 2021, Vol. 48 ›› Issue (1): 295-300.doi: 10.11896/jsjkx.191200186
• Information Security • Previous Articles Next Articles
LEI Yang, JIANG Ying
CLC Number:
[1] LEE J.A View of Cloud Computing [J].Communications of the ACM,2013,53(4):50-58. [2] WANG T,ZHANG W B,XUN J W,et al.A Survey of Fault Detection for Distributed Software Systems with Statistical Monitoring in Cloud Computing [J].Chinese Journal of Computers,2017,40(2):397-413. [3] FU S.Performance Metric Selection for AutonOMic AnomalyDetection on Cloud Computing Systems[C]//2011 IEEE Global Telecommunications Conference-GLOBECOM 2011.Kathmandu:IEEE,2011:1-5. [4] LIN M,CHEN S.An Efficient Anomaly Detection Framework for Cloud Computing Environment [J].Journal of Computers,2015,10(3):155-165. [5] GUAN Q,FU S.Adaptive Anomaly Identification by Exploring Metric Subspace in Cloud Computing Infrastructures[C]//2013 IEEE 32nd International Symposium on Reliable Distributed Systems.Braga:IEEE,2013:205-214. [6] LAN Z,ZHENG Z,LI Y.Toward Automated Anomaly Identification in Large-scale Systems [J].IEEE Transactions on Parallel and Distributed Systems,2010,21(2):174-187. [7] KANG H,CHEN H,JIANG G.PeerWatch:A Fault Detection and Diagnosis Tool for Virtualized Consolidation Systems[C]//Proceedings of the 7th International Conference on Autonomic Computing.ACM,2010:119-128. [8] LI Y,LAN Z.A Scalable,Non-Parametric Method for Detecting Performance Anomaly in Large Scale Computing[J].IEEE Transactions on Parallel and Distributed Systems,2015,27(7):1902-1914. [9] PERTET S,GANDHI R,NARASIMHAN P.FingerpointingCorrelated Failures in Replicated Systems [C]//Proceedings of the Second Workshop on Tackling Computer Systems Problems with Machine Learning.2007:220-230. [10] KASICK M P,TAN J,GANDHI R,et al.Black-Box Problem Diagnosis in Parallel File Systems[C]//8th USENIX Conference on File and Storage Technologies.San Jose:USENIX Association,2010:23-26. [11] QIANG C.Research on Cloud Computing Resource Manage-ment Model Based on Multi-Agent System[C]//2016 12th International Conference on Computational Intelligence and Security.Wuxi:IEEE,2016:378-381. [12] ALHAMAZANI K,RANJAN R,MITRA K,et al.Clams:Cross-layer Multi-cloud Application Monitoring-as-a-service Framework[C]//2014 IEEE International Conference on Services Computing.Anchorage:IEEE,2014:283-290. [13] REDDY P V V,RAJAMANI L.Performance Comparison ofDifferent Operating Systems in the Private Cloud with KVM hypervisor using SIGAR framework[C]//2015 International Conference on Communication,Information and Computing Technology(ICCICT).Mumbai:IEEE,2015:1-6. [14] WANG X,HUANG S,FU S,et al.Characterizing Workload of Web Applications on Virtualized Servers[C]//Architectural Support for Programming Languages and Operating Systems.2014:98-108. [15] WANG D Q,WANG X X.Large Data Optimization ParticleSwarm Clustering Algorithm Based on Cloud Storage [J].Electronic Design Engineering,2017,25(2):26-30. [16] LEI Y,JIANG Y.Anomaly Judgment for Nodes Based on Agent under Cloud Environment[C]//2019 IEEE International Conference on Computer Science and Educational Informatization(CSEI).Kunming:IEEE,2019:161-167. [17] REN T.Research on Virtual Machine Anomaly Detection System Oriented IaaS[D].Chongqing:Chongqing University,2014. [18] JIANG M,MUNAWAR M A,REIDEMEISTER T,et al.Automatic Fault Detection and Diagnosis in Complex Software Systems by Information-theoretic monitoring[C]//2009 IEEE/IFIP International Conference on Dependable Systems & Networks.Lisbon:IEEE,2009:285-294. [19] O'DRISCOLL A,DAUGELAITE J,SLEATOR R D.‘Big data',Hadoop and cloud computing in genomics[J].Journal of biomedical informatics,2013,46(5):774-781. [20] LIU C C,JIANG Y.Fault Detection Method for Cloud Computing Using Improved Fuzzyk Nearest Neighbor[J].Journal of Chinese Computer Systems,2018,39(10):159-164. |
[1] | GENG Hai-jun, WANG Wei, YIN Xia. Single Node Failure Routing Protection Algorithm Based on Hybrid Software Defined Networks [J]. Computer Science, 2022, 49(2): 329-335. |
[2] | DU Yan-ming, XIAO Jian-hua. Workflow Scheduling Strategy with Multi-QoS Constraint Based on Priority in Cloud Environment [J]. Computer Science, 2019, 46(10): 128-134. |
[3] | CHEN Gan-lang, YAN Fei-long and PAN Jia-hui. Study on Fast Incremental Clustering Algorithm for High Complexity Dynamic Data in Cloud Computing Environment [J]. Computer Science, 2018, 45(2): 287-290. |
[4] | LIU Gang, ZHOU Heng, LIANG Xiao-geng and WANG Ming-jing. Image Registration Algorithm for Infrared and Visible Light Based on Non-subsampled Contourlet Transform [J]. Computer Science, 2016, 43(11): 313-316. |
[5] | . Telecommunications Network Capability Services Model Based on Mashup Technology in Cloud Computing Environment [J]. Computer Science, 2012, 39(1): 32-36. |
[6] | . [J]. Computer Science, 2008, 35(6): 175-177. |
|