[1] GOLDBERG R P. Survey of virtual machine research[J]. Computer, 1974, 7(9):34-45. [2] VARUN C, ARINDAM B, VIPIN K. Anomaly detection:a survey[J]. ACM Computing Surveys, 2009, 41(3):14-35. [3] PARK H, JUN C. A simple and fast algorithm for K-medoids clustering[J]. Expert Systems with Applications, 2009, 36(2):3336-3341. [4] BIVENS A, PALAGIRI C, SMITH R, et al. Network-based intrusion detection using neural networks[C]//Proceedings of the 2002 Intelligent Engineering Systems Through Artificial Neural Networks. New York:ASME Press, 2002:579-584. [5] JAIN A K, DUBES R C. Algorithms for Clustering Data[M]. Upper Saddle River:Prentice Hall, 1988:45-57. [6] WANG C W, TALWAR V, SCHWAN K, et al. Online detection of utility cloud anomalies using metric distributions[C]//Proceedings of the 2010 IEEE/IFIP Network Operations and Management Symposium. Piscataway, NJ:IEEE, 2010:96-103. [7] XIONG N X, ATHANASIOS V V, WU J, et al. A self-tuning failure detection scheme for cloud computing service[C]//Proceedings of the 2012 IEEE 26th International Parallel and Distributed Processing Symposium. Piscataway, NJ:IEEE, 2012:668-679. [8] 周真.云平台下运行环境感知的虚拟机异常检测策略及算法研究[D].重庆:重庆大学, 2015:14-50.(ZHOU Z. Research on anomaly detection strategy and algorithms aware of running environment for virtual machines in the cloud platform[D]. Chongqing:Chongqing University, 2015:14-50.) [9] 刘俊, 陈蜀宇, 周真, 等.一种自适应的虚拟机异常检测算法[C]//第十六届全国容错计算学术会议. 上海:同济大学出版社, 2015:12-18.(LIU J, CHEN S, ZHOU Z, et al. A self-adaptability virtual machine abnormal detection algorithm[C]//Proceedings of the 16th Chinese Fault Tolerant Computing Conference. Shanghai:Tongji University Press, 2015:12-18.) [10] PANNU H S, LIU J G, SONG F. A self-evolving anomaly detection framework for developing highly dependable utility clouds[C]//Proceedings of the 2012 IEEE Global Communications Conference. Piscataway, NJ:IEEE, 2012:1605-1610. [11] WARRENDER C, FORREST S, PEARLMUTTER B. Detecting intrusions using system calls:alternate data models[C]//Proceedings of the 1999 IEEE Symposium on Security and Privacy. Washington, DC:IEEE Computer Society, 1999:133-145. [12] CHAWLA S, SUN P. Slom:a new measure for local spatial outliers[J]. Knowledge and Information Systems, 2006, 9(4):412-429. [13] KOHONEN T. Self-Organizing Maps[M]. Berlin:Springer, 1997:24-47. |