Enhancing Cybersecurity Posture: A Framework for Anomaly Detection in Cloud Computing Environments
DOI:
https://doi.org/10.62951/ijies.v1i3.66Keywords:
Cybersecurity, Anomaly Detection, Cloud Computing, Machine Learning, Security FrameworkAbstract
The rapid adoption of cloud computing has transformed the way organizations manage and store their data. However, this shift has also increased vulnerabilities to cyber threats. Anomaly detection is a critical component of cybersecurity frameworks, allowing for the identification of unusual patterns that may indicate security breaches. This paper presents a comprehensive framework for anomaly detection in cloud computing environments. It reviews existing methodologies, explores the integration of machine learning techniques, and discusses the challenges associated with implementing these systems. The proposed framework aims to enhance the cybersecurity posture of organizations by providing proactive detection of anomalies.
References
Becker, M., Sadeghi, A., & Schneider, G. (2019). "A survey of anomaly detection techniques in cybersecurity." Computer Science Review, 30, 1-22.
Chandola, V., Banerjee, A., & Kumar, V. (2009). "Anomaly detection: A survey." ACM Computing Surveys, 41(3), 1-58.
Cortes, C., & Vapnik, V. (1995). "Support-vector networks." Machine Learning, 20(3), 273-297.
Dillon, T. S., Wu, C., & Chang, E. (2010). "Cloud Computing: Issues and Challenges." 2010 24th IEEE International Conference on Advanced Information Networking and Applications, 27-33.
Dunteman, G. H. (1989). Principal Components Analysis. Sage Publications.
Friedman, J. H., Hastie, T., & Tibshirani, R. (2001). "The Elements of Statistical Learning." Springer Series in Statistics.
Garrison, G., Kim, S. S., & Wakefield, R. L. (2015). "Cloud Computing Adoption and Use in Information Systems." MIS Quarterly Executive, 14(1), 43-54.
Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep Learning. MIT Press.
Hodge, V. J., & Austin, J. (2004). "A survey of outlier detection methodologies." Artificial Intelligence Review, 22(2), 85-126.
Khan, M. A., & Sadiq, A. (2021). "Security and Privacy in Cloud Computing: A Survey." IEEE Access, 9, 53347-53368.
Mell, P., & Grance, T. (2011). "The NIST Definition of Cloud Computing." National Institute of Standards and Technology.
Sommer, R., & Paxson, V. (2010). "Outside the Closed World: On Using Machine Learning for Network Intrusion Detection." 2010 IEEE European Symposium on Security and Privacy, 35-50.
Wright, D., & Raab, C. (2014). "Surveillance and the Data Protection Act." Computer Law & Security Review, 30(5), 491-503.
Xu, R., & Wunsch, D. (2005). "Survey of clustering algorithms." IEEE Transactions on Neural Networks, 16(3), 645-678.
Iglewski, A., Matuszewski, P., & Bzdęga, J. (2019). "A survey of anomaly detection methods in the context of cloud computing." Cloud Computing and Services Science (CLOSER), 21-32.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Information Engineering and Science

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.