{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T21:27:39Z","timestamp":1760909259241,"version":"3.37.3"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61572090"],"award-info":[{"award-number":["61572090"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Science Foundation of Zhejiang Sci-Tech University","award":["18032230Y"],"award-info":[{"award-number":["18032230Y"]}]},{"DOI":"10.13039\/501100013223","name":"Chongqing Research Program of Basic Research and Frontier Technology","doi-asserted-by":"publisher","award":["cstc2017jcyjAX0270"],"award-info":[{"award-number":["cstc2017jcyjAX0270"]}],"id":[{"id":"10.13039\/501100013223","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s10586-021-03385-2","type":"journal-article","created":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T06:02:46Z","timestamp":1629180166000},"page":"203-214","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A two-stage virtual machine abnormal behavior-based anomaly detection mechanism"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3781-1793","authenticated-orcid":false,"given":"Hancui","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Weida","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,17]]},"reference":[{"key":"3385_CR1","doi-asserted-by":"crossref","unstructured":"Chiba, Z., Abghour, N., Moussaid, K., et al.: A survey of intrusion detection systems for cloud computing environment. In: Presented at the 2016 International Conference on Engineering and MIS (ICEMIS) (2016)","DOI":"10.1109\/ICEMIS.2016.7745295"},{"key":"3385_CR2","first-page":"1","volume":"99","author":"A Razaque","year":"2020","unstructured":"Razaque, A., Amsaad, F., Hariri, S., et al.: Enhanced Grey risk assessment model for support of cloud service provider. IEEE Access 99, 1 (2020)","journal-title":"IEEE Access"},{"key":"3385_CR3","doi-asserted-by":"crossref","unstructured":"Jian, Z., Zheng, L., Gong, L., et al.: A survey on security of cloud environment: threats, solutions, and innovation. In: 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC). IEEE Computer Society (2018)","DOI":"10.1109\/DSC.2018.00145"},{"key":"3385_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.03.353","author":"T Daniya","year":"2021","unstructured":"Daniya, T., Suresh Kumar, K., Santhosh Kumar, B., Chandra Sekhar, K.: A survey on anomaly based intrusion detection system. Mater. Today Proc. (2021). https:\/\/doi.org\/10.1016\/j.matpr.2021.03.353","journal-title":"Mater. Today Proc."},{"key":"3385_CR5","doi-asserted-by":"crossref","unstructured":"Fargo, F., Franza, O., Tunc, C., et al.: Autonomic resource management for power, performance, and security in cloud environment. In: 2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA). IEEE (2019)","DOI":"10.1109\/AICCSA47632.2019.9035213"},{"key":"3385_CR6","doi-asserted-by":"crossref","unstructured":"Doshi, R., Kute, V.: A review paper on security concerns in cloud computing and proposed security models. In: 2020 International Conference on Emerging Trends in Information Technology and Engineering (IC-ETITE). (2020)","DOI":"10.1109\/ic-ETITE47903.2020.37"},{"issue":"Aug.","key":"3385_CR7","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.cose.2019.04.011","volume":"85","author":"Z Pan","year":"2019","unstructured":"Pan, Z., Hariri, S., Pacheco, J.: Context aware intrusion detection for building automation systems. Comput. Secur. 85(Aug.), 181\u2013201 (2019)","journal-title":"Comput. Secur."},{"issue":"6","key":"3385_CR8","doi-asserted-by":"publisher","first-page":"1419","DOI":"10.1109\/TPDS.2020.2967373","volume":"31","author":"N Kumbhare","year":"2020","unstructured":"Kumbhare, N., Marathe, A., Akoglu, A., et al.: A value-oriented job scheduling approach for power-constrained and oversubscribed HPC systems. IEEE Trans. Parallel Distrib. Syst. 31(6), 1419\u20131433 (2020)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"3385_CR9","doi-asserted-by":"crossref","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), Article No. 15 (2009)","DOI":"10.1145\/1541880.1541882"},{"issue":"5","key":"3385_CR10","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.1109\/TNNLS.2016.2527796","volume":"28","author":"B Gu","year":"2017","unstructured":"Gu, B., Sheng, V.S.: A robust regularization path algorithm for $$\\nu $$-support vector classification. IEEE Trans. Neural Netw. Learn. Syst. 28(5), 1241\u20131248 (2017)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"3385_CR11","doi-asserted-by":"crossref","unstructured":"Kumar, M., Mathur, R.: Unsupervised outlier detection technique for intrusion detection in cloud computing. In: IEEE International Conference for Convergence of Technology (I2CT). IEEE (2015)","DOI":"10.1109\/I2CT.2014.7092027"},{"key":"3385_CR12","doi-asserted-by":"crossref","unstructured":"Song, C., Wang, Y., Zhang, S., et al.: A low cost and easy implement highway accident detection model based on Big Data. In: 2019 IEEE International Conferences on Ubiquitous Computing and Communications (IUCC) and Data Science and Computational Intelligence (DSCI) and Smart Computing, Networking and Services (Smart CNS). IEEE (2020)","DOI":"10.1109\/IUCC\/DSCI\/SmartCNS.2019.00125"},{"issue":"16","key":"3385_CR13","doi-asserted-by":"publisher","first-page":"16911","DOI":"10.1007\/s11042-016-3638-1","volume":"76","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhang, S.: Parallel implementing improved k-means applied for image retrieval and anomaly detection. Multimed. Tools Appl. 76(16), 16911\u201316927 (2017)","journal-title":"Multimed. Tools Appl."},{"issue":"1","key":"3385_CR14","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.ejor.2009.03.050","volume":"202","author":"N Adler","year":"2010","unstructured":"Adler, N., Yazhemsky, E.: Improving discrimination in data envelopment analysis: PCA-DEA or variable reduction. Eur. J. Oper. Res. 202(1), 273\u2013284 (2010)","journal-title":"Eur. J. Oper. Res."},{"issue":"13","key":"3385_CR15","doi-asserted-by":"publisher","first-page":"1643","DOI":"10.1049\/iet-map.2020.0101","volume":"14","author":"S Koziel","year":"2020","unstructured":"Koziel, S., Pietrenkodabrowska, A.: Low-cost data-driven modelling of microwave components using domain confinement and PCA-based dimensionality reduction. IET Microw. Antennas Propag. 14(13), 1643\u20131650 (2020)","journal-title":"IET Microw. Antennas Propag."},{"issue":"6","key":"3385_CR16","doi-asserted-by":"publisher","first-page":"2581","DOI":"10.1109\/TCST.2019.2936793","volume":"28","author":"Z Li","year":"2020","unstructured":"Li, Z., Yan, X.: Fault-relevant optimal ensemble ICA model for non-Gaussian process monitoring. IEEE Trans. Control Syst. Technol. 28(6), 2581\u20132590 (2020)","journal-title":"IEEE Trans. Control Syst. Technol."},{"key":"3385_CR17","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1016\/j.neunet.2020.08.022","volume":"132","author":"MS Advani","year":"2020","unstructured":"Advani, M.S., Saxe, A.M.: High-dimensional dynamics of generalization error in neural networks. Neural Netw. 132, 428\u2013446 (2020)","journal-title":"Neural Netw."},{"issue":"C","key":"3385_CR18","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.ins.2019.03.069","volume":"494","author":"IM Stephanakis","year":"2019","unstructured":"Stephanakis, I.M., Chochliouros, I.P., Sfakianakis, E., Shirazi, S.N.: Hybrid self-organizing feature map (SOM) for anomaly detection in cloud infrastructures using granular clustering based upon value-difference metrics. Inf. Sci. 494(C), 247\u2013277 (2019)","journal-title":"Inf. Sci."},{"issue":"7","key":"3385_CR19","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1109\/TNNLS.2014.2342533","volume":"26","author":"B Gu","year":"2017","unstructured":"Gu, B., Sheng, V.S., Tay, K.Y., Romano, W., Li, S.: Incremental support vector learning for ordinal regression. IEEE Trans. Neural Netw. Learn. Syst. 26(7), 1403\u20131416 (2017)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"3385_CR20","doi-asserted-by":"crossref","unstructured":"Injadat, M., Salo, F., Nassif, A.B., et al.: Bayesian optimization with machine learning algorithms towards anomaly detection. In: IEEE Global Communications Conference. IEEE (2018)","DOI":"10.1109\/GLOCOM.2018.8647714"},{"issue":"1","key":"3385_CR21","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s10586-016-0711-5","volume":"20","author":"CC Chen","year":"2017","unstructured":"Chen, C.C., Fu, X., Chang, C.Y.: A terms mining and clustering technique for surveying network and content analysis of academic groups exploration. Clust. Comput. 20(1), 43\u201352 (2017)","journal-title":"Clust. Comput."},{"key":"3385_CR22","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1016\/j.ins.2020.09.003","volume":"546","author":"Y Ji","year":"2021","unstructured":"Ji, Y., Zhang, H., Zhang, Z., et al.: CNN-based encoder\u2013decoder networks for salient object detection: a comprehensive review and recent advances. Inf. Sci. 546, 835\u2013857 (2021)","journal-title":"Inf. Sci."},{"key":"3385_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09406-3","author":"W Ullah","year":"2020","unstructured":"Ullah, W., Ullah, A., Haq, I.U., et al.: CNN features with bi-directional LSTM for real-time anomaly detection in surveillance networks. Multimed. Tools Appl. (2020). https:\/\/doi.org\/10.1007\/s11042-020-09406-3","journal-title":"Multimed. Tools Appl."},{"key":"3385_CR24","doi-asserted-by":"crossref","unstructured":"Kc, K., Gu, X.: ELT: efficient log-based troubleshooting system for cloud computing infrastructures. In: Proceedings of the IEEE Symposium on Reliable Distributed Systems, pp. 11\u201320 (2011)","DOI":"10.1109\/SRDS.2011.11"},{"key":"3385_CR25","doi-asserted-by":"crossref","unstructured":"Wang, C., Schwan, K., Wolf M.: EbAT: an entropy based online Anomaly Tester for data center management. In: 2009 IFIP\/IEEE International Symposium on Integrated Network Management-Workshops. IEEE (2009)","DOI":"10.1109\/INMW.2009.5195940"},{"key":"3385_CR26","unstructured":"Wang, C., Talwar, V., Schwan, K., et al.: Online detection of utility cloud anomalies using metric distributions. In: IEEE\/IFIP Network Operations and Management Symposium. IEEE (2010)"},{"key":"3385_CR27","doi-asserted-by":"crossref","unstructured":"Bhaduri, K., Das, K., Matthews, B.L.: Detecting abnormal machine characteristics in cloud infrastructures. In: 2011 IEEE 11th International Conference on Data Mining Workshops (ICDMW), Vancouver, BC, Canada. IEEE (2012)","DOI":"10.1109\/ICDMW.2011.62"},{"issue":"1","key":"3385_CR28","first-page":"14","volume":"2","author":"AD Lopez","year":"2019","unstructured":"Lopez, A.D., et al.: Network traffic behavioral analytics for detection of DDoS attacks. SMU Data Sci. Rev. 2(1), 14 (2019)","journal-title":"SMU Data Sci. Rev."},{"key":"3385_CR29","doi-asserted-by":"crossref","unstructured":"Zhang, X., Meng, F., Xu, J.: PerfInsight: a robust clustering-based abnormal behavior detection system for large-scale cloud. In: 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), pp. 896\u2013899 (2018)","DOI":"10.1109\/CLOUD.2018.00130"},{"key":"3385_CR30","first-page":"1","volume":"4","author":"J Liu","year":"2016","unstructured":"Liu, J., Chen, S., Zhou, Z., et al.: An anomaly detection algorithm of cloud platform based on self-organizing maps. Math. Probl. Eng. 4, 1\u20139 (2016)","journal-title":"Math. Probl. Eng."},{"key":"3385_CR31","doi-asserted-by":"publisher","first-page":"44927","DOI":"10.1109\/ACCESS.2018.2865114","volume":"6","author":"J Liu","year":"2018","unstructured":"Liu, J., Zhang, H., Xu, G.: An anomaly detector deployment awareness detection framework based on multi-dimensional resources balancing in coud platform. IEEE Access 6, 44927\u201344933 (2018)","journal-title":"IEEE Access"},{"key":"3385_CR32","first-page":"1","volume":"99","author":"J Liu","year":"2020","unstructured":"Liu, J., Tang, S., Xu, G., et al.: A novel configuration tuning method based on feature selection for Hadoop MapReduce. IEEE Access 99, 1 (2020)","journal-title":"IEEE Access"},{"issue":"4","key":"3385_CR33","first-page":"1","volume":"23","author":"HA Alnafessa","year":"2020","unstructured":"Alnafessa, H.A., Casale, G.: Artificial neural networks based techniques for anomaly detection in Apache Spark. Clust. Comput. 23(4), 1\u201316 (2020)","journal-title":"Clust. Comput."},{"key":"3385_CR34","doi-asserted-by":"crossref","unstructured":"Jindal, A., Staab, P., Cardoso, J., et al.: Online memory leak detection in the cloud-based infrastructures. In: International Workshop on Artificial Intelligence for IT Operations (AIOPS) 2020 (2021)","DOI":"10.1007\/978-3-030-76352-7_21"},{"key":"3385_CR35","first-page":"1","volume":"2016","author":"J Luo","year":"2016","unstructured":"Luo, J., Tang, J., Xiao, X.: Abnormal gait behavior detection for elderly based on enhanced Wigner\u2013Ville analysis and cloud incremental SVM learning. J. Sens. 2016, 1\u201318 (2016)","journal-title":"J. Sens."},{"key":"3385_CR36","doi-asserted-by":"crossref","unstructured":"Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, vol. 29(2), pp. 93\u2013104 (2000)","DOI":"10.1145\/335191.335388"},{"key":"3385_CR37","first-page":"1","volume":"99","author":"N Guizani","year":"2020","unstructured":"Guizani, N., Ghafoor, A.: A network function virtualization system for detecting malware in large IoT based networks. IEEE J. Sel. Areas Commun. 99, 1 (2020)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"3385_CR38","doi-asserted-by":"crossref","unstructured":"Alatawi, S., Alhasani, A., Alfaidi, S., et al.: A survey on cloud security issues and solution. In: 2020 International Conference on Computing and Information Technology (ICCIT-1441) (2020)","DOI":"10.1109\/ICCIT-144147971.2020.9214397"},{"issue":"1","key":"3385_CR39","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.aci.2016.03.001","volume":"13","author":"SA Hussain","year":"2017","unstructured":"Hussain, S.A., Fatima, M., Saeed, A., et al.: Multilevel classification of security concerns in cloud computing. Appl. Comput. Inform. 13(1), 57\u201365 (2017)","journal-title":"Appl. Comput. Inform."},{"issue":"5","key":"3385_CR40","first-page":"1","volume":"12","author":"J Liu","year":"2020","unstructured":"Liu, J., Zheng, S., Xu, G., et al.: Cross-domain sentiment aware word embeddings for review sentiment analysis. Int. J. Mach. Learn. Cybern. 12(5), 1\u201312 (2020)","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"3385_CR41","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.compeleceng.2016.03.004","volume":"59","author":"L Coppolino","year":"2017","unstructured":"Coppolino, L., D\u2019Antonio, S., Mazzeo, G., et al.: Cloud security: emerging threats and current solutions. Comput. Electr. Eng. 59, 126\u2013140 (2017)","journal-title":"Comput. Electr. Eng."},{"key":"3385_CR42","doi-asserted-by":"crossref","unstructured":"Yazdanov, L., Fetzer, C.: VScaler: autonomic virtual machine scaling. In: IEEE Sixth International Conference on Cloud Computing. IEEE (2013)","DOI":"10.1109\/CLOUD.2013.142"},{"key":"3385_CR43","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2608826","author":"T Chen","year":"2017","unstructured":"Chen, T., Bahsoon, R.: Self-adaptive and online QoS modeling for cloud-based software services. IEEE Trans. Softw. Eng. (2017). https:\/\/doi.org\/10.1109\/TSE.2016.2608826","journal-title":"IEEE Trans. Softw. Eng."},{"key":"3385_CR44","doi-asserted-by":"crossref","unstructured":"Hosseini, F.S., Yang, C.: Comprehensive evaluation of program reliability with ComFIDet: an integrated fault injection and detection framework for embedded systems. In: 2019 IEEE International Conference on Embedded Software and Systems (ICESS). IEEE (2019)","DOI":"10.1109\/ICESS.2019.8782444"},{"issue":"4","key":"3385_CR45","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/978-3-642-15651-9_34","volume":"6351","author":"R Alexandersson","year":"2010","unstructured":"Alexandersson, R., Karlsson, J.: Fault injection-based assessment of aspect-oriented implementation of fault tolerance. Lect. Notes Comput. Sci. 6351(4), 466\u2013479 (2010)","journal-title":"Lect. Notes Comput. Sci."},{"issue":"11","key":"3385_CR46","first-page":"1","volume":"62","author":"X Chen","year":"2019","unstructured":"Chen, X., Lin, J., Ma, Y., et al.: Self-adaptive resource allocation for cloud-based software services based on progressive QoS prediction model. Sci. China Inf. Sci. 62(11), 1\u20133 (2019)","journal-title":"Sci. China Inf. Sci."},{"key":"3385_CR47","doi-asserted-by":"crossref","unstructured":"Sethi, K., Kumar, R., Prajapati, N., et al.: Deep reinforcement learning based intrusion detection system for cloud infrastructure. In: 2020 International Conference on COMmunication Systems and NETworkS (COMSNETS) (2020)","DOI":"10.1109\/COMSNETS48256.2020.9027452"},{"key":"3385_CR48","doi-asserted-by":"crossref","unstructured":"Ferrari, P., Rinaldi, S., Sisinni, E., et al.: Performance evaluation of full-cloud and edge-cloud architectures for industrial IoT anomaly detection based on deep learning. In: 2019 II Workshop on Metrology for Industry 4.0 and IoT (MetroInd4.0 & IoT) (2019)","DOI":"10.1109\/METROI4.2019.8792860"},{"key":"3385_CR49","doi-asserted-by":"crossref","unstructured":"Huang, J., Jiang, Z., Gong, L., et al.: Construction of hidden fault channel cloud test platform based on deep learning. In: 2020 12th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA) (2020)","DOI":"10.1109\/ICMTMA50254.2020.00013"},{"key":"3385_CR50","doi-asserted-by":"publisher","first-page":"68066","DOI":"10.1109\/ACCESS.2021.3077498","volume":"9","author":"JC Kimmel","year":"2021","unstructured":"Kimmel, J.C., Mcdole, A.D., Abdelsalam, M., et al.: Recurrent neural networks based online behavioural malware detection techniques for cloud infrastructure. IEEE Access 9, 68066\u201368080 (2021)","journal-title":"IEEE Access"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03385-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-021-03385-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-021-03385-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,19]],"date-time":"2022-01-19T22:05:17Z","timestamp":1642629917000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-021-03385-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,17]]},"references-count":50,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["3385"],"URL":"https:\/\/doi.org\/10.1007\/s10586-021-03385-2","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2021,8,17]]},"assertion":[{"value":"25 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}