Research Article

Applying Catastrophe Theory for Network Anomaly Detection in Cloud Computing Traffic

Table 1

Comparison of anomaly detection approaches via their methods.

MethodsAuthor NameTechniquesPros and Cons

ClassificationBhat et al. [11]NB Tree & Random ForestThrough powerful algorithms, the method can distinguish between different class instances but they depend on labels. This is often impossible to achieve.
Fu et al. [12]One Class and Two Class Support Vector Machines
Feng Zhao and Hai Jin [13]Hidden Markov Model & mining algorithm

Nearest neighborJabez et al. [5]Outlier DetectionThey are commonly used because they are unsupervised and do not require any data distribution, but for unsupervised techniques, if the normal data instances lack close enough neighbors or the anomalies have close enough neighbors, the technique fails to label them and computing complexity is, therefore, a challenge.

ClusteringXinlong Zhao et al. [8]K-means ClusteringThe method is relatively faster than distance-based methods and they could reduce the computational complexity during the process of detecting intrusions in large datasets, but in smaller datasets, they may not provide accurate insights at the desired level of detail and dynamic updating of profiles is time consuming.
Pandeeswari and Kumar [14]Fuzzy C-means Clustering & Artificial Neural Network

StatisticalKumar and Pandeeswari [7]Fuzzy system & Neural NetworkA statistically-justifiable solution for detecting anomalies can be yielded from these methods, if the assumptions considering the data distribution hold true and the confidence interval for the anomaly score can be applied for decision making as additional information, but they are dependent on the assumption that the data is generated via a specific distribution.
Xiong et al. [4]Neural Network & Catastrophe theory

PredictionYuehui Chen et al. [15]Flexible Neural TreeIn some cases, predicting anomalies is done independently from normal traffic, but they almost depend on large historic data.
Moayedi and Shirazi [16]Autoregressive Integrated Moving Average
Dalmazo et al. [6]Poisson Moving Average