{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:11Z","timestamp":1750220831754,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T00:00:00Z","timestamp":1561075200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,21]]},"DOI":"10.1145\/3340997.3341005","type":"proceedings-article","created":{"date-parts":[[2019,8,2]],"date-time":"2019-08-02T12:17:07Z","timestamp":1564748227000},"page":"70-75","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["An Anomaly Detection Method for Cloud Service Platform"],"prefix":"10.1145","author":[{"given":"Ping","family":"Lou","sequence":"first","affiliation":[{"name":"School of Information Engineering Wuhan University of Technology, Wuhan, China"}]},{"given":"Yun","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Information Engineering Wuhan University of Technology, Wuhan, China"}]},{"given":"Junwei","family":"Yan","sequence":"additional","affiliation":[{"name":"School of Information Engineering Wuhan University of Technology, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2019,6,21]]},"reference":[{"volume-title":"Network Data Analytics: A Hands-On Approach for Application Development","author":"Srinivasa K.G.","key":"e_1_3_2_1_1_1","unstructured":"Srinivasa , K.G. 2018. Hadoop . In Network Data Analytics: A Hands-On Approach for Application Development . Springer International Publishing , Cham , 29--53. Srinivasa, K.G. 2018. Hadoop. In Network Data Analytics: A Hands-On Approach for Application Development. Springer International Publishing, Cham, 29--53."},{"key":"e_1_3_2_1_2_1","volume-title":"Performance Comparison of Apache Spark and Hadoop Based Large Scale Content Based Recommender System. In Intelligent Systems Technologies and Applications","author":"Saravanan S.","year":"2017","unstructured":"Saravanan , S. and Karthick , K. E . 2018 . Performance Comparison of Apache Spark and Hadoop Based Large Scale Content Based Recommender System. In Intelligent Systems Technologies and Applications ( Udupi, India , August 10-13, 2017 ). Springer International Publishing, Cham, 66--73. Saravanan, S. and Karthick, K. E. 2018. Performance Comparison of Apache Spark and Hadoop Based Large Scale Content Based Recommender System. In Intelligent Systems Technologies and Applications (Udupi, India, August 10-13, 2017). Springer International Publishing, Cham, 66--73."},{"volume-title":"Processing Big Data with Azure HDInsight: Building Real-World Big Data Systems on Azure HDInsight Using the Hadoop Ecosystem","author":"Yadav V.","key":"e_1_3_2_1_3_1","unstructured":"Yadav , V. 2017. Working with HBase . In Processing Big Data with Azure HDInsight: Building Real-World Big Data Systems on Azure HDInsight Using the Hadoop Ecosystem . Apress. Berkeley, CA, USA , 123--142. Yadav, V. 2017. Working with HBase. In Processing Big Data with Azure HDInsight: Building Real-World Big Data Systems on Azure HDInsight Using the Hadoop Ecosystem. Apress. Berkeley, CA, USA, 123--142."},{"volume-title":"Certified OpenStack Administrator Study Guide","author":"Markelov A.","key":"e_1_3_2_1_4_1","unstructured":"Markelov , A. 2016. Getting to Know OpenStack . In Certified OpenStack Administrator Study Guide . Apress. Berkeley, CA, USA , 1--6. Markelov, A. 2016. Getting to Know OpenStack. In Certified OpenStack Administrator Study Guide. Apress. Berkeley, CA, USA, 1--6."},{"key":"e_1_3_2_1_5_1","volume-title":"ACM\/IFIP\/USENIX International Conference on Distributed Systems Platforms and Open Distributed Processing","author":"Kumar V.","year":"2007","unstructured":"Kumar , V. and Cooper , B. F . 2007. iManage: Policy-Driven Self-management for Enterprise-Scale Systems . In ACM\/IFIP\/USENIX International Conference on Distributed Systems Platforms and Open Distributed Processing ( Newport Beach, CA, USA , November 26-30, 2007 ). Springer, Berlin Heidelberg, 287--307. Kumar, V. and Cooper, B. F. 2007. iManage: Policy-Driven Self-management for Enterprise-Scale Systems. In ACM\/IFIP\/USENIX International Conference on Distributed Systems Platforms and Open Distributed Processing (Newport Beach, CA, USA, November 26-30, 2007). Springer, Berlin Heidelberg, 287--307."},{"key":"e_1_3_2_1_6_1","volume-title":"Diagnosing Dependent Failures in the Hardware and Software of Mobile Autonomous Robots. In International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems","author":"Weber J.","year":"2007","unstructured":"Weber , J. and Wotawa , F . 2007 . Diagnosing Dependent Failures in the Hardware and Software of Mobile Autonomous Robots. In International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems ( Kyoto, Japan , June 26-29, 2007 ). Springer, Berlin Heidelberg, 633--643. Weber, J. and Wotawa, F. 2007. Diagnosing Dependent Failures in the Hardware and Software of Mobile Autonomous Robots. In International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (Kyoto, Japan, June 26-29, 2007). Springer, Berlin Heidelberg, 633--643."},{"key":"e_1_3_2_1_7_1","volume-title":"The Insider Threat in Cloud Computing. In International Conference on Critical Information Infrastructures Security","author":"Kandias M.","year":"2013","unstructured":"Kandias , M. and Virvilis , N . 2013 . The Insider Threat in Cloud Computing. In International Conference on Critical Information Infrastructures Security ( Amsterdam, The Netherlands , September 16-18, 2013 ). Springer, Berlin Heidelberg, 93--103. Kandias, M. and Virvilis, N. 2013. The Insider Threat in Cloud Computing. In International Conference on Critical Information Infrastructures Security (Amsterdam, The Netherlands, September 16-18, 2013). Springer, Berlin Heidelberg, 93--103."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Ghorbani A. A. and Lu W. 2010. Network Attacks. In Network Intrusion Detection and Prevention: Concepts and Techniques. Springer. Boston MA USA 1--25.  Ghorbani A. A. and Lu W. 2010. Network Attacks. In Network Intrusion Detection and Prevention: Concepts and Techniques. Springer. Boston MA USA 1--25.","DOI":"10.1007\/978-0-387-88771-5_1"},{"volume-title":"Practical Hadoop Security","author":"Lakhe B.","key":"e_1_3_2_1_9_1","unstructured":"Lakhe , B. 2014. Monitoring in Hadoop . In Practical Hadoop Security . Apress. Berkeley, CA, USA , 119--141. Lakhe, B. 2014. Monitoring in Hadoop. In Practical Hadoop Security. Apress. Berkeley, CA, USA, 119--141."},{"key":"e_1_3_2_1_10_1","volume-title":"Linux Server Monitoring and Self-healing System Using Nagios. In International Conference on Mobile Web and Information Systems (Prague","author":"Anusas","year":"2017","unstructured":"Anusas -amornkul, T. and Sangrat , S . 2017 . Linux Server Monitoring and Self-healing System Using Nagios. In International Conference on Mobile Web and Information Systems (Prague , Czech Republic , August 21-23, 2017 ). Springer, Cham, 290--302. Anusas-amornkul, T. and Sangrat, S. 2017. Linux Server Monitoring and Self-healing System Using Nagios. In International Conference on Mobile Web and Information Systems (Prague, Czech Republic, August 21-23, 2017). Springer, Cham, 290--302."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465355"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.38"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282383"},{"key":"e_1_3_2_1_14_1","first-page":"4","article-title":"Design of network threat detection and classification based on machine learning on cloud computing","volume":"20","author":"Kim H.","year":"2018","unstructured":"Kim , H. , Kim , J. and Kim , Y. 2018 . Design of network threat detection and classification based on machine learning on cloud computing . The Journal of Networks, Software Tools and Applications. 20 , 4 (December 2017), 211--220. Kim, H., Kim, J. and Kim, Y. 2018. Design of network threat detection and classification based on machine learning on cloud computing. The Journal of Networks, Software Tools and Applications. 20, 4 (December 2017), 211--220.","journal-title":"The Journal of Networks, Software Tools and Applications."},{"key":"e_1_3_2_1_15_1","first-page":"9","article-title":"HIDS: A host based intrusion detection system for cloud computing environment","volume":"3","author":"Deshpande P.","year":"2018","unstructured":"Deshpande , P. , Sharma , S. C. , Peddoju , S. K. and Junaid , S. 2018 . HIDS: A host based intrusion detection system for cloud computing environment . International Journal of System Assurance Engineering and Management. 3 , 9 (June 2018), 567--576. Deshpande, P., Sharma, S. C., Peddoju, S. K. and Junaid, S. 2018. HIDS: A host based intrusion detection system for cloud computing environment. International Journal of System Assurance Engineering and Management. 3, 9 (June 2018), 567--576.","journal-title":"International Journal of System Assurance Engineering and Management."},{"key":"e_1_3_2_1_16_1","first-page":"2","article-title":"LR-HIDS: logistic regression host-based intrusion detection system for cloud environments","volume":"9","author":"Besharati E.","year":"2018","unstructured":"Besharati , E. , Naderan , M. and Namjoo , E. 2018 . LR-HIDS: logistic regression host-based intrusion detection system for cloud environments . Journal of Ambient Intelligence and Humanized Computing. 9 , 2 (April 2018), 503--527. Besharati, E., Naderan, M. and Namjoo, E. 2018. LR-HIDS: logistic regression host-based intrusion detection system for cloud environments. Journal of Ambient Intelligence and Humanized Computing. 9, 2 (April 2018), 503--527.","journal-title":"Journal of Ambient Intelligence and Humanized Computing."},{"key":"e_1_3_2_1_17_1","unstructured":"Tou J. T. and Gonzalez R. C. 1974. Pattern recognition principles. Pattern recognition principles.  Tou J. T. and Gonzalez R. C. 1974. Pattern recognition principles. Pattern recognition principles."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48386-2_7"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(99)00087-2"},{"volume-title":"Samsung ARTIK Reference: The Definitive Developers Guide","author":"Wootton C.","key":"e_1_3_2_1_20_1","unstructured":"Wootton , C. 2016. The \/proc Virtual File System . In Samsung ARTIK Reference: The Definitive Developers Guide . Apress. Berkeley, CA, USA , 127--143. Wootton, C. 2016. The \/proc Virtual File System. In Samsung ARTIK Reference: The Definitive Developers Guide. Apress. Berkeley, CA, USA, 127--143."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Shaw S. and Bach M. 2010. Linux Performance Monitoring. In Pro Oracle Database 11g RAC on Linux. Apress. Berkeley CA USA 653--685.  Shaw S. and Bach M. 2010. Linux Performance Monitoring. In Pro Oracle Database 11g RAC on Linux. Apress. Berkeley CA USA 653--685.","DOI":"10.1007\/978-1-4302-2959-9_13"}],"event":{"name":"ICMLT 2019: 2019 4th International Conference on Machine Learning Technologies","acronym":"ICMLT 2019","location":"Nanchang China"},"container-title":["Proceedings of the 2019 4th International Conference on Machine Learning Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340997.3341005","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3340997.3341005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:32Z","timestamp":1750202012000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340997.3341005"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,21]]},"references-count":21,"alternative-id":["10.1145\/3340997.3341005","10.1145\/3340997"],"URL":"https:\/\/doi.org\/10.1145\/3340997.3341005","relation":{},"subject":[],"published":{"date-parts":[[2019,6,21]]},"assertion":[{"value":"2019-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}