Skip to main content
Erschienen in: Cluster Computing 1/2019

11.10.2017

Research on abnormal data detection method of web browser in cloud computing environment

verfasst von: Xindong Duan

Erschienen in: Cluster Computing | Sonderheft 1/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The traditional abnormal data detection method uses the simplified gradient method to detect the abnormal data of web browser, which can not accurately remove the web abnormal data with the interference frequency components, and has low detection performance. Therefore, this paper proposed a distributed web browser abnormal data detection method based on the improved genetic algorithm and spatio-temporal correlation. Based on analyzing the principle of the abnormal data detection in the web browser, we select the abnormal data points of web browser through the deviation function and centralized algorithm, and determine the anomaly factor of web browser using the spatio-temporal distribution, and introduce the improved genetic algorithm to realize the detection of abnormal data of web browser. Simulation results show that the proposed method can reduce the energy consumption of the web data, and the signal amplitude is larger than the amplitude of the interference noise data, which has good anti-jamming performance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chen, P.S., Lin, S.C., Sun, C.H.: Simple and effective method for detecting abnormal internet behaviors of mobile devices. Inf. Sci. 321, 193–204 (2015)CrossRef Chen, P.S., Lin, S.C., Sun, C.H.: Simple and effective method for detecting abnormal internet behaviors of mobile devices. Inf. Sci. 321, 193–204 (2015)CrossRef
2.
Zurück zum Zitat Chen, J., Peng, J., Zhi, X., et al.: Research on application classification method in cloud computing environment. J. Supercomput. 73(8), 3488–3507 (2017) Chen, J., Peng, J., Zhi, X., et al.: Research on application classification method in cloud computing environment. J. Supercomput. 73(8), 3488–3507 (2017)
3.
Zurück zum Zitat Zhu, Q.: Research on data location method under the cloud computing environment. In: International Conference on Electrical, Computer Engineering and Electronics (2015) Zhu, Q.: Research on data location method under the cloud computing environment. In: International Conference on Electrical, Computer Engineering and Electronics (2015)
4.
Zurück zum Zitat Zhang, P., Xu, J., Muazu, H., et al.: Access control research on data security in Cloud computing. In: IEEE International Conference on Communication Technology. IEEE, pp. 873–877 (2015) Zhang, P., Xu, J., Muazu, H., et al.: Access control research on data security in Cloud computing. In: IEEE International Conference on Communication Technology. IEEE, pp. 873–877 (2015)
5.
Zurück zum Zitat Wang, J.Y., Liu, Y.Z., Wang, J.K.: A data-stream-based abnormal data mining in web texts environment. J. Comput. Methods Sci. Eng. 16(2), 361–368 (2016)MathSciNet Wang, J.Y., Liu, Y.Z., Wang, J.K.: A data-stream-based abnormal data mining in web texts environment. J. Comput. Methods Sci. Eng. 16(2), 361–368 (2016)MathSciNet
6.
Zurück zum Zitat Beltrán, M.: Automatic provisioning of multi-tier applications in cloud computing environments. J. Supercomput. 71(6):2221–2250 (2015) Beltrán, M.: Automatic provisioning of multi-tier applications in cloud computing environments. J. Supercomput. 71(6):2221–2250 (2015)
7.
Zurück zum Zitat He, W., Qiao, P., Xing, L.: Research on multidimensional and evolutionary network security model in cloud computing environment. C. E. Ca. 42(6), 2563–2571 (2017) He, W., Qiao, P., Xing, L.: Research on multidimensional and evolutionary network security model in cloud computing environment. C. E. Ca. 42(6), 2563–2571 (2017)
8.
Zurück zum Zitat Hirschprung, R., Toch, E., Maimon, O.: Simplifying data disclosure configurations in a cloud computing environment. ACM Trans. Intell. Syst. Technol. 6(3), 1–26 (2015)CrossRef Hirschprung, R., Toch, E., Maimon, O.: Simplifying data disclosure configurations in a cloud computing environment. ACM Trans. Intell. Syst. Technol. 6(3), 1–26 (2015)CrossRef
9.
Zurück zum Zitat Wang, C.H., Chen, X.L.: Design of hypervisor-based integrated intrusion detection system in cloud computing environment. Front. Artif. Intell. Appl. 274, 972–981 (2015) Wang, C.H., Chen, X.L.: Design of hypervisor-based integrated intrusion detection system in cloud computing environment. Front. Artif. Intell. Appl. 274, 972–981 (2015)
10.
Zurück zum Zitat Iyengar, N.C.S.N., Ganapathy, G.: Chaotic theory based defensive mechanism against distributed denial of service attack in cloud computing environment. Int. J. Secur. Appl. 9(9), 197–212 (2015) Iyengar, N.C.S.N., Ganapathy, G.: Chaotic theory based defensive mechanism against distributed denial of service attack in cloud computing environment. Int. J. Secur. Appl. 9(9), 197–212 (2015)
11.
Zurück zum Zitat Zhang, H., Song, Y.: Research on intrusion detection algorithm of user data based on cloud computing. Int. J. Secur. Appl. 9(9), 275–284 (2015) Zhang, H., Song, Y.: Research on intrusion detection algorithm of user data based on cloud computing. Int. J. Secur. Appl. 9(9), 275–284 (2015)
12.
Zurück zum Zitat Jeong, C.W., Kim, W.H., Lypengleang, S., et al.: The development of a medical image information system environment using data synchronization based on cloud computing. Multimed. Tools Appl. 115(5), 1–14 (2015) Jeong, C.W., Kim, W.H., Lypengleang, S., et al.: The development of a medical image information system environment using data synchronization based on cloud computing. Multimed. Tools Appl. 115(5), 1–14 (2015)
13.
Zurück zum Zitat Luo, J., Tang, J., Xiao, X.: Abnormal Gait behavior detection for elderly based on enhanced Wigner-Ville analysis and cloud incremental SVM learning. J. Sens. 2016, 1–18 (2016) Luo, J., Tang, J., Xiao, X.: Abnormal Gait behavior detection for elderly based on enhanced Wigner-Ville analysis and cloud incremental SVM learning. J. Sens. 2016, 1–18 (2016)
14.
Zurück zum Zitat Sookhak, M., Gani, A., Talebian, H., et al.: Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues. ACM Comput. Surv. 47(4), 65–67 (2015)CrossRef Sookhak, M., Gani, A., Talebian, H., et al.: Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues. ACM Comput. Surv. 47(4), 65–67 (2015)CrossRef
15.
Zurück zum Zitat Wang, Z., Su, X.: Dynamically hierarchical resource-allocation algorithm in cloud computing environment. J. Supercomput. 71(7), 2748–2766 (2015) Wang, Z., Su, X.: Dynamically hierarchical resource-allocation algorithm in cloud computing environment. J. Supercomput. 71(7), 2748–2766 (2015)
16.
Zurück zum Zitat Zhu, Q., Ye, L., Zhao, Y., et al.: Methods for elimination and reconstruction of abnormal power data in wind farms. Power Syst. Prot. Control 43(3), 38–45 (2015) Zhu, Q., Ye, L., Zhao, Y., et al.: Methods for elimination and reconstruction of abnormal power data in wind farms. Power Syst. Prot. Control 43(3), 38–45 (2015)
17.
Zurück zum Zitat Li, C., Li, L. Y.: Cost and energy aware service provisioning for mobile client in cloud computing environment. J. Supercomput. 71(4):1196–1223 (2015) Li, C., Li, L. Y.: Cost and energy aware service provisioning for mobile client in cloud computing environment. J. Supercomput. 71(4):1196–1223 (2015)
18.
Zurück zum Zitat Kchaou, H., Kechaou, Z., Alimi, A. M.: Towards an offloading framework based on big data analytics in mobile cloud computing environments. Procedia Comput. Sci. 53(1):292–297 (2015) Kchaou, H., Kechaou, Z., Alimi, A. M.: Towards an offloading framework based on big data analytics in mobile cloud computing environments. Procedia Comput. Sci. 53(1):292–297 (2015)
19.
Zurück zum Zitat Ghanem, T.F., Elkilani, W.S., Abdul-Kader, H.M.: A hybrid approach for efficient anomaly detection using metaheuristic methods. J. Adv. Res. 6(4), 609–619 (2015)CrossRef Ghanem, T.F., Elkilani, W.S., Abdul-Kader, H.M.: A hybrid approach for efficient anomaly detection using metaheuristic methods. J. Adv. Res. 6(4), 609–619 (2015)CrossRef
20.
Zurück zum Zitat Riboni, D., Bettini, C., Civitarese, G., et al.: SmartFABER: recognizing fine-grained abnormal behaviors for early detection of mild cognitive impairment. Artif. Intell. Med. 67, 57–74 (2016)CrossRef Riboni, D., Bettini, C., Civitarese, G., et al.: SmartFABER: recognizing fine-grained abnormal behaviors for early detection of mild cognitive impairment. Artif. Intell. Med. 67, 57–74 (2016)CrossRef
21.
Zurück zum Zitat Yang, J. J., Li, J. Q., Niu, Y.: A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener. Comput. Syst. 43-44(45),74–86 (2015) Yang, J. J., Li, J. Q., Niu, Y.: A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Gener. Comput. Syst. 43-44(45),74–86 (2015)
22.
Zurück zum Zitat Kwon, K., Park, H., Jung, S., et al.: Dynamic scheduling method for cooperative resource sharing in mobile cloud computing environments. Trans. Internet Inf. Syst. 10(2), 484–503 (2016) Kwon, K., Park, H., Jung, S., et al.: Dynamic scheduling method for cooperative resource sharing in mobile cloud computing environments. Trans. Internet Inf. Syst. 10(2), 484–503 (2016)
23.
Zurück zum Zitat Shao, J., Xingshi, H.E., Wang, J., et al.: Identification method for abnormal factors of spinning quality based on massive data. Comput. Integr. Manuf. Syst. 21(10), 2644–2652 (2015) Shao, J., Xingshi, H.E., Wang, J., et al.: Identification method for abnormal factors of spinning quality based on massive data. Comput. Integr. Manuf. Syst. 21(10), 2644–2652 (2015)
24.
Zurück zum Zitat Melendez, J., Van, G.B., Maduskar, P., et al.: A novel multiple-instance learning-based approach to computer-aided detection of tuberculosis on chest x-rays. IEEE Trans. Med. Imaging 34(1), 179–92 (2015)CrossRef Melendez, J., Van, G.B., Maduskar, P., et al.: A novel multiple-instance learning-based approach to computer-aided detection of tuberculosis on chest x-rays. IEEE Trans. Med. Imaging 34(1), 179–92 (2015)CrossRef
25.
Zurück zum Zitat Jeong, C.W., Kim, W.H., Lypengleang, S., et al.: The development of a medical image information system environment using data synchronization based on cloud computing. Multimed. Tools Appl. 75(23), 1–14 (2016) Jeong, C.W., Kim, W.H., Lypengleang, S., et al.: The development of a medical image information system environment using data synchronization based on cloud computing. Multimed. Tools Appl. 75(23), 1–14 (2016)
Metadaten
Titel
Research on abnormal data detection method of web browser in cloud computing environment
verfasst von
Xindong Duan
Publikationsdatum
11.10.2017
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe Sonderheft 1/2019
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-1221-9

Weitere Artikel der Sonderheft 1/2019

Cluster Computing 1/2019 Zur Ausgabe