8,752 Hits in 4.1 sec

A Streaming Intrusion Detection System for Grid Computing Environments

Matthew Smith, Fabian Schwarzer, Marian Harbach, Thomas Noll, Bernd Freisleben
2009 2009 11th IEEE International Conference on High Performance Computing and Communications  
In this paper, a novel architecture for a streaming intrusion detection system for Grid computing environments is presented.  ...  Two cross-site example attacks in a Grid environment and the streaming detection logic for these attacks are presented to illustrate the approach.  ...  In this paper, a novel Stream Intrusion Detection System (S-IDS) for Grid computing environments is presented.  ... 
doi:10.1109/hpcc.2009.99 dblp:conf/hpcc/SmithSHNF09 fatcat:x4ycjmwrfnhjhpdgv5flhuhmgy

Intrusion Detection System Inside Grid Computing Environment (IDS-IGCE)

Basappa B. Kodada
2011 International Journal of Grid Computing & Applications  
So this paper proposes the Architecture of IDS-IGCE (Intrusion Detection System -Inside Grid Computing Environment) which can provide the protection against the complete threats inside the Grid Environment  ...  The wide varieties of IDS (Intrusion Detection System) are available which are designed to handle the specific types of attacks.  ...  In [29] , a novel architecture for a streaming intrusion detection system for Grid Computing Environments is presented.  ... 
doi:10.5121/ijgca.2011.2403 fatcat:4zivrffhenfqrip7cnb4tmesnm

Towards a Grid-wide Intrusion Detection System [chapter]

Stuart Kenny, Brian Coghlan
2005 Lecture Notes in Computer Science  
We describe the Canon-icalProducer, the component that allows for instrument monitoring, and how it would be used to construct the basis of a Grid-wide intrusion detection system.  ...  We describe SANTA-G (Grid-enabled System Area Networks Trace Analysis), an instrument monitoring framework that uses the R-GMA (Relational Grid Monitoring Architecture).  ...  Since the logs are published to the R-GMA grid information system this can provide the basis for a Grid-wide intrusion detection system.  ... 
doi:10.1007/11508380_29 fatcat:weoiqrsaa5cahlli526hptao2u

Supporting a Real-Time Distributed Intrusion Detection Application on GATES [chapter]

Qian Zhu, Liang Chen, Gagan Agrawal
2006 Lecture Notes in Computer Science  
We view the problem of flexible and adaptive processing of distributed data streams as a grid computing problem.  ...  In our recent work, we have been developing a middleware, GATES (Grid-based AdapTive Execution on Streams), for enabling gridbased processing of distributed data streams.  ...  Our system is referred to as GATES (Grid-based AdapTive Execution on Streams).  ... 
doi:10.1007/11823285_37 fatcat:xendzq2qhjhvhfyr6lx3uxpcsa

Data Structures and Algorithms for Packet Forwarding and Classification

Sartaj Sahni
2009 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks  
make structured peer-to-peer systems topology-aware p. 816 A workflow management mechanism for peer-to-peer computing platforms p. 827 DDSQP : A WSRF-based distributed data stream query system  ...  p. 701 A holistic approach to survivable distributed information system for critical applications p. 713 A personalized and scalable service broker for the global computing environment p. 725  ... 
doi:10.1109/i-span.2009.122 dblp:conf/ispan/Sahni09 fatcat:p44oexvkrzbobdwhmrc4lkpglu

Security analytics of large scale streaming data [article]

Sheeraz Niaz Lighari
2018 The PhD Series of the Faculty of Engineering and Science  
The intrusion detection system in the reference [34] , is based on the distributed environment in which systems are co-operating with each other to perform the intrusion detection.  ...  Hence, our method of incident detection will act as a final and efficient layer of defense for the big data security of Smart Grid systems.  ... 
doi:10.5278/ fatcat:mewllh4hjzh3bjunk47gwkwa2q

DHT-based security infrastructure for trusted internet and grid computing

Kai Hwang, Min Cai, Yu Kwong Kwok, Shanshan Song, Yu Chen, Ying Chen
2006 International Journal of Critical Infrastructures  
The design is based on a novel Distributed Hash Table ( DHT) for security enforcement among Grid sites scattered over the internet.  ...  We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications.  ...  This work was fully supported by National Science Foundation (NSF) under Information Technology Research (ITR) grant 0325409 at the USC internet and Grid Computing Laboratory.  ... 
doi:10.1504/ijcis.2006.011348 fatcat:wdz6gltfbrfh3iws4ze3cel7jq

Real-Time Surveillance System for Analyzing Abnormal Behavior of Pedestrians

Dohun Kim, Heegwang Kim, Yeongheon Mok, Joonki Paik
2021 Applied Sciences  
In this paper, we propose a real-time surveillance system for abnormal behavior analysis in a closed-circuit television (CCTV) environment by constructing an algorithm and system optimized for a CCTV environment  ...  In spite of excellent performance of deep learning-based computer vision algorithms, they are not suitable for real-time surveillance to detect abnormal behavior because of very high computational complexity  ...  Since existing intrusion detection methods using a polygonal ROI require a large amount of computation, we proposed a computationally efficient method for intrusion detection in a polygonal ROI using background  ... 
doi:10.3390/app11136153 doaj:983a88e2769d4110845818987d951007 fatcat:4uhhuqbm5vcevdotmkkdmw7tre

Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining [chapter]

Mustafa Amir Faisal, Zeyar Aung, John R. Williams, Abel Sanchez
2012 Lecture Notes in Computer Science  
In this paper, we propose an intrusion detection system (IDS) architecture for AMI which will act as a complimentary with other security measures.  ...  For detecting anomaly, we use data stream mining approach on the public KDD CUP 1999 data set for analysis the requirement of the three components in AMI.  ...  This research was sponsored by the Government of Abu Dhabi, United Arab Emirates through its funding of the MIT-Masdar Institute Collaborative Research Project on "Data Mining for Smart Grids" (award number  ... 
doi:10.1007/978-3-642-30428-6_8 fatcat:cxp7tgm6snh7bh64qfgb25ycue

Arhuaco: Deep Learning and Isolation Based Security for Distributed High-Throughput Computing [article]

A. Gomez Ramirez and C. Lara and L. Betev and D. Bilanovic and U. Kebschull
2018 arXiv   pre-print
The results show that Arhuaco outperforms other methods used in Intrusion Detection Systems for Grid Computing.  ...  A dataset for malware detection in Grid computing is described. We show in addition the utilization of generative methods with Recurrent Neural Networks to improve the collected dataset.  ...  Authors are also grateful with the German Federal Ministry of Education and Research (Bundesministerium fur Bildung und Forschung -BMBF) and HGS-HIRe for their financial support.  ... 
arXiv:1801.04179v1 fatcat:q5ni4mhi7zdxbdztpt52gsl7jm

Anomaly Detection Based on Multiple Streams Clustering for Train Real-Time Ethernet

2021 Tehnički Vjesnik  
Therefore, we propose a train real-time Ethernet anomaly detection system (TREADS).  ...  In the experiment, the reliability of TREADS is tested based on the TRDP data set collected from the real network environment, and the models of anomaly detection algorithms are established for evaluation  ...  In 1986, Anderson established a feasible intrusion detection system for the first time and used innovative statistical algorithms for anomaly detection [11] .  ... 
doi:10.17559/tv-20210414030120 fatcat:7pemuhm2dfdqxegl4dqlx6ai6e

A training-resistant anomaly detection system

Steve Muller, Jean Lancrenon, Carlo Harpes, Yves Le Traon, Sylvain Gombault, Jean-Marie Bonnin
2018 Computers & security  
However, the ability to learn the network behaviour in real-time comes at a cost: malicious software can interfere with the learning process, and teach the intrusion detection system to accept dangerous  ...  Modern network intrusion detection systems rely on machine learning techniques to detect trac anomalies and thus intruders.  ...  The nal intrusion detection system thus consists of (for instance) 9 independent instances, each invoked with a dierent value for Γ.  ... 
doi:10.1016/j.cose.2018.02.015 fatcat:56rluhxx5zac3ckz2nbsijj4g4

Signature-Based Method and Stream Data Mining Technique Performance Evaluation for Security and Intrusion Detection in Advanced Metering Infrastructures (AMI)

Ziaeddin Najafian, Vahe Aghazarian, Alireza Hedayati
2015 International Journal of Computer and Electrical Engineering  
The Intrusion Detection System is defined to hardware, software or a combination of them which is used for informational computer systems has the responsibility for identifying the efforts for attacking  ...  Today IDS is used as an advanced tool in intrusion detection and prevention in computer systems.  ...  Conclusion In this paper, the relative advantage of anomaly-based intrusion detection Systems which use stream data mining system in comparison with signature-based intrusion detection systems such as  ... 
doi:10.17706/ijcee.2015.v7.879 fatcat:7nghui5u5vadppf4kc5vhsvzqq

On Density-Based Data Streams Clustering Algorithms: A Survey

Amineh Amini, Teh Ying Wah, Hadi Saboohi
2014 Journal of Computer Science and Technology  
Density-based method is a remarkable class in clustering data streams, which has the ability to discover arbitrary shape clusters and to detect noise.  ...  Data streams are infinite and evolving over time, and we do not have any knowledge about the number of clusters. In a data stream environment due to various factors, some noise appears occasionally.  ...  system DUC-Stream [43] SSQ n d O(c b ) Network intrusion detection system D-Stream I [4] SSQ g O(1) + O(g) Network intrusion detection system DD-Stream [80] N/A g O(g 2 ) Network intrusion  ... 
doi:10.1007/s11390-014-1416-y fatcat:bdcx5lhokfftje5niuuneo2yxm

GDPI: Signature based Deep Packet Inspection using GPUs

Nausheen Shoaib, Jawwad Shamsi, Tahir Mustafa, Akhter Zaman, Jazib ul, Mishal Gohar
2017 International Journal of Advanced Computer Science and Applications  
The signature based Network Intrusion and Detection System (NIDS) works on packet inspection and pattern matching mechanisms for the detection of malicious content in network traffic.  ...  Deep Packet Inspection (DPI) is necessitated for many networked application systems in order to prevent from cyber threats.  ...  Machine learning (ML) and deep learning (DL) techniques providing a new paradigm to Network Intrusion Detection Systems.  ... 
doi:10.14569/ijacsa.2017.081128 fatcat:hrzim6u7efaedjvinb3luumfqe
« Previous Showing results 1 — 15 out of 8,752 results