Asian Journal of Computer Science and Technology (AJCST)
Network Traffic Analysis in Cloud: A SurveyAuthor : K. Ruckshana and G. Ravi
Volume 8 No.2 Special Issue:March 2019 pp 61-65
A data center (DC) denotes to any huge faithful group of computers that is retained and operated by an organization. Data centers of numerous sizes are being made and hired for a dissimilar set of resolves today. On the one hand, big universities and isolated enterprises gradually consolidating their IT services within on-site data centers comprising hundreds to thousands of servers. On the other hand, huge online service providers such as Google, Microsoft, and Amazon quickly constructing geographically varied cloud data centers often have more than 10K servers; to offer a variation of cloud-based services such as Email, Web servers, Gaming, Storage, and Instant Messaging. Though there is great interest in planning developed networks for data centers, very little is identified about the network-level traffic characteristics of present data centers. In this paper, we focused on a study of the network traffic in data centers and defining the anomaly detection system in secure cloud computing environment.
Data Center, Cloud Computing, Network Traffic, Anomaly Detection, Risk Aware Network
 Aug (2017) [Online] Available at: https://en.wikipedia.org/wiki/Network_traffic
 A. Chuvakin, “Security Event Analysis through Correlation”, Information Systems Security, Vol. 13, No. 2, pp. 13-18, 2004.
 J. Pineda and R. Yatco, “Adaptable Software-based Log Consolidation and Incident Management for a Security Information Event Management System AdLCIM”, Manila: Undergraduate Thesis, De La Salle University-Manila, Philippines, Dec. 2010.
 J. Bernardo and A. Valencia, “Network Threat Detection System,”Makati, Undergraduate Thesis, De La Salle University-Manila, Philippines, 2016.
 D. Gordon, “Extending Intrusion Detection with Alert Correlation and Intrusion Tolerance”, Goteborg: Thesis for the Degree of Licentiate of Engineering, Chalmers University of Technology, Sweden, 2003.
 Zhengbing Hu Sergiy Gnatyuk, Oksana Koval, Viktor Gnatyuk and Serhii Bondarovets, “Anomaly Detection System in Secure Cloud Computing Environment”, I. J. Computer Network and Information Security, pp. 10-21, 2017.
 Weigang Hou, Zhaolong Ning, Lei Guo, Zhikui Chen, and Mohammad S. Obaidat, “Novel Framework of Risk-Aware Virtual Network Embedding in Optical Data Center Networks “, IEEE systems journal, Vol. 12, No. 3, pp. 2473-2482, Sep. 2018.
 D. Rajesh Kumar and A. Shanmugam, “Energy Efficient and Trust Based Black Hole Attack Identification Model in Wireless Sensor Networks”, Journal of Network Security Computer Networks, Vol. 2, No. 3, pp. 1-9, 2017.
 Justin David Pineda, Joanna De Guzman and Adrian Tobias,“Classifying Multi-Layered Attacks Using Correlation of Relevant Data in Network Access Technologies”, Proceedings of the 17th Philippine Computing Science Congress, pp. 73-78, 2017.
 Paolo Costa, Matteo Migliavacca, Peter Pietzuch, and Alexander L. Wolf, “NaaS: Network-as-a-Service in the Cloud”, InHot-ICE’12 Proceedings of the 2nd USENIX conference on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services, 2012.
 Theophilus Benson, Aditya Akella and A. David Maltz, “Network Traffic Characteristics of Data Centers in the Wild”, In IMC ’10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, p. 267-280, 2010.