Integrating Anomaly Detection for Enhanced Data Protection in Cloud-Based Applications
dc.contributor.author | Czerkas, Konrad | |
dc.contributor.author | Drozd, Michał | |
dc.contributor.author | Duraj, Agnieszka | |
dc.contributor.author | Lichy, Krzysztof | |
dc.contributor.author | Lipiński, Piotr | |
dc.contributor.author | Morawski, Michał | |
dc.contributor.author | Napieralski, Piotr | |
dc.contributor.author | Puchała, Dariusz | |
dc.contributor.author | Kwapisz, Marcin | |
dc.contributor.author | Warcholiński, Adrian | |
dc.contributor.author | Karbowańczyk, Michał | |
dc.contributor.author | Wosiak, Piotr | |
dc.date.accessioned | 2023-09-22T05:58:09Z | |
dc.date.available | 2023-09-22T05:58:09Z | |
dc.date.issued | 2023 | |
dc.description.abstract | In this research, anomaly detection techniques and artificial neural networks were employed to address the issue of attacks on cluster computing systems. The study investigated the detection of Distributed Denial of Service (DDoS) and Partition attacks by monitoring metrics such as network latency, data transfer rate, and number of connections. Additionally, outlier detection algorithms, namely Local Outlier Factor (LOF) and COF, as well as ARIMA and SHESD models were tested for anomaly detection. Two types of neural network architectures, multi-layer perceptron (MLP) and recursive LSTM networks, were used to detect attacks by classifying events as “attack” or “no attack”. The study underscores the importance of implementing proactive security measures to protect cluster computing systems from cyber threats. | en_EN |
dc.identifier.citation | Czerkas K., Drozd M., Duraj A., Lichy K., Lipiński P., Morawski M., Napieralski P., Puchała D., Kwapisz M., Warcholiński A., Karbowańczyk M., Wosiak P., Integrating Anomaly Detection for Enhanced Data Protection in Cloud-Based Applications. W: Progress in Polish Artificial Intelligence Research 4, Wojciechowski A. (Ed.), Lipiński P. (Ed.)., Seria: Monografie Politechniki Łódzkiej Nr. 2437, Wydawnictwo Politechniki Łódzkiej, Łódź 2023, s. 173-179, ISBN 978-83-66741-92-8, doi: 10.34658/9788366741928.27. | |
dc.identifier.doi | 10.34658/9788366741928.27 | |
dc.identifier.isbn | 978-83-66741-92-8 | |
dc.identifier.uri | http://hdl.handle.net/11652/4803 | |
dc.identifier.uri | https://doi.org/10.34658/9788366741928.27 | |
dc.language.iso | en | en_EN |
dc.page.number | s. 173-179 | |
dc.publisher | Wydawnictwo Politechniki Łódzkiej | pl_PL |
dc.publisher | Lodz University of Technology Press | en_EN |
dc.relation.ispartof | Wojciechowski A. (Ed.), Lipiński P. (Ed.)., Progress in Polish Artificial Intelligence Research 4, Seria: Monografie Politechniki Łódzkiej Nr. 2437, Wydawnictwo Politechniki Łódzkiej, Łódź 2023, ISBN 978-83-66741-92-8, doi: 10.34658/9788366741928. | |
dc.rights | Dla wszystkich w zakresie dozwolonego użytku | pl_PL |
dc.rights | Fair use condition | en_EN |
dc.rights.license | Licencja PŁ | pl_PL |
dc.rights.license | LUT License | en_EN |
dc.subject | computer games | en_EN |
dc.subject | artificial intelligence | en_EN |
dc.subject | gry komputerowe | pl_PL |
dc.subject | sztuczna inteligencja | pl_PL |
dc.title | Integrating Anomaly Detection for Enhanced Data Protection in Cloud-Based Applications | en_EN |
dc.type | Rozdział - monografia | pl_PL |
dc.type | Chapter - monograph | en_EN |
Pliki
Oryginalne pliki
1 - 1 z 1
Brak miniatury
- Nazwa:
- 27. Integrating_anomaly_detection_Czerkas_Drozd_2023.pdf
- Rozmiar:
- 258.26 KB
- Format:
- Adobe Portable Document Format
- Opis:
Licencja
1 - 1 z 1
Brak miniatury
- Nazwa:
- license.txt
- Rozmiar:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Opis: