Abstract
Injection attacks and anomalies pose significant threats to the security and reliability of cloud-based web applications. Traditional detection methods, such as rule-based systems and supervised learning techniques, often struggle to adapt to evolving threats and large-scale, unstructured log data. This paper introduces a novel framework, the Semi-Supervised Log Analyzer (SSLA), designed for real-time injection detection and anomaly monitoring in cloud environments. SSLA uses semi-supervised learning to utilize both labeled and unlabeled data, reducing the reliance on extensive annotated datasets. A similarity graph is built from the log data, allowing for effective anomaly detection using graph-based methods. At the same time, privacy-preserving techniques are integrated to protect sensitive information. The proposed method is evaluated on large-scale datasets, including Hadoop Distributed File System (HDFS) and BlueGene/L (BGL) logs, demonstrating superior performance in terms of precision, recall, and scalability compared to state-of-the-art methods. SSLA achieves high detection accuracy with minimal computational overhead, ensuring reliable, real-time protection for cloud-based web applications.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details
1 National University of Science and Technology POLITEHNICA Bucharest, Telecommunications Department, Faculty of Electronics, Telecommunications and Information Technology, Bucharest, Romania (GRID:grid.4551.5) (ISNI:0000 0001 2109 901X); Research Center Campus, POLITEHNICA Bucharest, Bucharest, Romania (GRID:grid.4551.5) (ISNI:0000 0001 2109 901X); Faculty of Engineering and Natural Science, Istinye University, Department of Software Engineering, Istanbul, Türkiye (GRID:grid.508740.e) (ISNI:0000 0004 5936 1556)
2 Faculty of Engineering and Natural Science, Istinye University, Department of Software Engineering, Istanbul, Türkiye (GRID:grid.508740.e) (ISNI:0000 0004 5936 1556); Khazar University, Department of Computer Science, Baku, Azerbaijan (GRID:grid.442897.4) (ISNI:0000 0001 0743 1899); Applied Science Research Center, Applied Science Private University, Amman, Jordan (GRID:grid.411423.1) (ISNI:0000 0004 0622 534X)
3 National University of Science and Technology POLITEHNICA Bucharest, Telecommunications Department, Faculty of Electronics, Telecommunications and Information Technology, Bucharest, Romania (GRID:grid.4551.5) (ISNI:0000 0001 2109 901X); Research Center Campus, POLITEHNICA Bucharest, Bucharest, Romania (GRID:grid.4551.5) (ISNI:0000 0001 2109 901X); Academy of Romanian Scientists, Bucharest, Romania (GRID:grid.435118.a) (ISNI:0000 0004 6041 6841)




