1,472 Hits in 6.7 sec

Analyzing distributed denial of service attacks in cloud computing towards the Pakistan information technology industry

Kamran Ali Memon, chool of Electronic Engineering, Beijing University of Posts and Telecommunications,China
2020 Indian Journal of Science and Technology  
Conclusion: Our proposed solution based on Dempsters combination rule is to analyzed mixture proof of different types of cloud attacks in IT industries in Pakistan.  ...  We are adopting a system and real-world analysis using data set experiments.  ...  key Laboratory of Intelligent Communication, Navigation and Micro-Nano System, Beijing University of Posts and Telecommunications, Beijing, China.  ... 
doi:10.17485/ijst/v13i29.1040 fatcat:b6lxr2uphzddtn3l62lkaxd7qy

Touchless and always-on cloud analytics as a service

Sahil Suneja, Canturk Isci, Ricardo Koller, Eyal de Lara
2016 IBM Journal of Research and Development  
NFM is highly practical and general, supporting more than 1000 different system distributions, allowing instantaneous monitoring as soon as a guest system gets hosted on the cloud, without any setup prerequisites  ...  A revised version of this draft features in  ...  On the other hand, the NFM based monitor can actively inspect the guest in all these scenarios by decoupling monitoring from the context of the guest system, and providing users with a pseudo console to  ... 
doi:10.1147/jrd.2016.2518438 fatcat:hqomnhrvdne4jl4ftcsbfzukwu

Taking Drones to the Next Level: Cooperative Distributed Unmanned-Aerial-Vehicular Networks for Small and Mini Drones

Jingjing Wang, Chunxiao Jiang, Zhu Han, Yong Ren, Robert G. Maunder, Lajos Hanzo
2017 IEEE Vehicular Technology Magazine  
Index Terms-Multi-UAV network system of small and mini drones, FANET network structure, distributed gateway selection algorithms, cloud-based stability control for collaboration and cooperation.  ...  On the other hand, the stability control of the hierarchical UAV network guarantees the efficient collaboration of the drones.  ...  Fig. 3 . 3 The Architecture of a Multi-UAV Network Relying on a Cloud Control System.  ... 
doi:10.1109/mvt.2016.2645481 fatcat:dy3ythk3wbfp7fwaw5xdjyvhra

Fine-Grained Endpoint-Driven In-Network Traffic Control for Proactive DDoS Attack Mitigation [article]

Zhuotao Liu, Hao Jin, Yih-Chun Hu, Michael Bailey
2018 arXiv   pre-print
On one hand, few academical proposals have ever been deployed in the Internet; on the other hand, solutions offered by existing DDoS prevention vendors are not a silver bullet to defend against the entire  ...  Guided by such large-scale study of today's DDoS defense, in this paper, we present MiddlePolice, the first readily deployable and proactive DDoS prevention mechanism.  ...  This assumption is a standard assumption for cloud-based systems. Victim Cooperation. MiddlePolice's defense requires the victim's cooperation.  ... 
arXiv:1709.05710v6 fatcat:zc4lt4tiajgd3e5jrcbopqvdue

Congestion Aware Packet Routing for Delay Sensitive Cloud Communications

Vincent O. Nyangaresi, Silvance O. Abeka, Solomon O. Ogara
2017 International Journal of Computer Networks And Applications  
One of the most outstanding requirements for cloud customers is availability the customers must be able to access their information and other resources stored in the cloud any time and from anywhere on  ...  This paper therefore presents a congestion aware packet routing where the delay period is hinged on the prevailing network conditions.  ...  This study builds on the current study on TCP pacing by incorporating the DTN dynamism in epidemic routing, based on the round trip times instead of buffer sizes, in delay sensitive networks (DSNs).  ... 
doi:10.22247/ijcna/2017/49121 fatcat:q5fyyouf7ncsjfc6gqr6nioktu

Accelerating the Performance of Software Tunneling Using a Receive Offload-Aware Novel L4 Protocol

2015 IEICE transactions on communications  
Ryota KAWASHIMA †a) and Hiroshi MATSUO †b) , Members SUMMARY An L2-in-L3 tunneling technology plays an important role in network virtualization based on the concept of Software-Defined Networking (SDN)  ...  VXLAN (Virtual eXtensible LAN) and NVGRE (Network Virtualization using Generic Routing Encapsulation) protocols are being widely used in public cloud datacenters.  ...  On the other hand, STT tunneling solves this problem by using the pseudo-TCP header.  ... 
doi:10.1587/transcom.e98.b.2180 fatcat:m6lxvfgc3vdjxjl53rxu4m6qhi

Multi-Objective Task Scheduling Using Smart MPI-Based Cloud Resources

Mehran Mokhtari, Peyman Bayat, Homayun Motameni
2021 Computing and informatics  
time in the network virtualization.  ...  In this matter, SMPIA is applied on different resource allocation and task scheduling strategies.  ...  Acknowledgements This project was conducted at Islamic Azad University -Sari Branch, Iran, with the cooperation of MCITI and Iran Telecommunication Company.  ... 
doi:10.31577/cai_2021_1_104 fatcat:syvmaevhtbgixjafcyi5toskqq

An Exploration of Bitcoin Mining Practices

Irni Eliana Khairuddin, Corina Sas
2019 Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems - CHI '19  
By sharing blockchain's characteristics, mining is a decentralized, transparent and unregulated practice, but we know little about miners' motivations and experiences and how these may impact on different  ...  This paper reports on interviews with 20 bitcoin miners about their practices and trust challenges.  ...  As a result, miners operate anonymously: "all nodes in the network only know each other pseudo-anonymously and they have the same privilege but yet they can come to the consensus to agree on which record  ... 
doi:10.1145/3290605.3300859 dblp:conf/chi/KhairuddinS19 fatcat:b2opgimrlbaqhpxkcuyh6ocg2y

Research Roadmap Driven by Network Benchmarking Lab (NBL): Deep Packet Inspection, Traffic Forensics, Embedded Benchmarking, Software Defined Networking and Beyond

Ying-Dar Lin
2014 International Journal of Networking and Computing  
Among them, our multi-hop cellular work was the first along this line and has a high impact on both academia and industry, with over 600 citations and standardizations in WLAN mesh (IEEE 802.11s), WiMAX  ...  Side products from our research include a startup (L7 Networks  ...  I have never seen a book giving such details on explaining the design and implementation of such practical systems...Those open source implementations are excellent demonstrations for practical networking  ... 
doi:10.15803/ijnc.4.2_223 fatcat:dgwtoaiq3ze3dguukezx3iemeu

Distributed Energy Efficient Clouds Over Core Networks

Ahmed Q. Lawey, Taisir E. H. El-Gorashi, Jaafar M. H. Elmirghani
2014 Journal of Lightwave Technology  
In this paper, we introduce a framework for designing energy efficient cloud computing services over non-bypass IP/WDM core networks.  ...  Our results indicate that replicating content into multiple clouds based on content popularity yields 43% total saving in power consumption compared to power un-aware centralized content delivery.  ...  In a practical cloud implementation the CPU normalised workload needed is estimated by the cloud provider based on users' requirements.  ... 
doi:10.1109/jlt.2014.2301450 fatcat:hn7bewiuu5f7lhqr2o6baz2hme

Cybersecurity in Intelligent Transportation Systems

Teodora Mecheva, Nikolay Kakanakov
2020 Computers  
of fog-based structures at support layer and description and standardization of the complex model of data and metadata and defense of systems, based on AI at application layer.  ...  Ensuring cybersecurity in ITS is a complex task on which the safety and efficiency of transportation depends.  ...  The funders had no role in the design of the study; in the collection, analyses or interpretation of data; in the writing of the manuscript or in the decision to publish the results.  ... 
doi:10.3390/computers9040083 fatcat:lct3ng6lk5frnfd2htxhlraqle

Network Coding for Cooperation in Wireless Networks [article]

Nestor Hernandez
2016 Ph.d.-serien for Det Teknisk-Naturvidenskabelige Fakultet, Aalborg Universitet  
In this thesis we focused on the design, analysis and simulation of cooperation techniques based on Random Linear Network Coding (RLNC) for wireless networks.  ...  Network Coding (NC) has proven to be an effective solution in cooperative networks since it does not require to encode and decode on a hop-by-hop basis as state of the art erasure correcting codes require  ...  Hartmut Kremling, for providing data consumption trends in current well-deployed mobile networks.  ... 
doi:10.5278/ fatcat:oboanhzctvcbpdol4kwu3ovebi

Smart Containers Schedulers for Microservices Provision in Cloud-Fog-IoT Networks. Challenges and Opportunities

Rocío Pérez de Prado, Sebastián García-Galán, José Enrique Muñoz-Expósito, Adam Marchewka, Nicolás Ruiz-Reyes
2020 Sensors  
Particularly, the improvement is studied in terms of quality of service (QoS) parameters such as latency, load balance, energy consumption and runtime, based on the analysis of previous works and implementations  ...  This work raises and discusses two main challenges in Docker containers' scheduling in cloud-fog-internet of things (IoT) networks.  ...  at the network level in contrast to host-centric approach of traditional IP-based ones.  ... 
doi:10.3390/s20061714 pmid:32204390 fatcat:eoqufaaoynhl5eqas7qcsamhlq

Low-power internet of things with NDN & cooperative caching

Oliver Hahm, Emmanuel Baccelli, Thomas C. Schmidt, Matthias Wählisch, Cédric Adjih, Laurent Massoulié
2017 Proceedings of the 4th ACM Conference on Information-Centric Networking - ICN '17  
Energy e ciency is a major driving factor in the Internet of Things (IoT). In this context, an IoT approach based on Information-Centric Networking (ICN) o ers prospects for low energy consumption.  ...  We furthermore provide auto-con guration mechanisms enabling practical ICN deployments on IoT networks of arbitrary size with NDN+CoCa.  ...  Comparing with IP: Cooperative distributed caching with CoCa (or a similar protocol) could also be implemented on top of IP.  ... 
doi:10.1145/3125719.3125732 dblp:conf/acmicn/HahmBSWAM17 fatcat:hvudks5cx5gxlctbezcx3mzo4m

Physical Layer Anonymous Precoding: The Path to Privacy-Preserving Communications [article]

Zhongxiang Wei, Christos Masouros, H. Vincent Poor, Athina P. Petropulu, Lajos Hanzo
2021 arXiv   pre-print
Next-generation systems aim to increase both the speed and responsiveness of wireless communications, while supporting compelling applications such as edge and cloud computing, remote-Health, vehicle-to-infrastructure  ...  In particular, we examine the recent interest in physical layer (PHY) anonymous solutions.  ...  A typical example of anonymous communication is found in cloud/edge computing, where the users wish to get their personal data processed at the cloud or edge.  ... 
arXiv:2109.08876v1 fatcat:ymxcaebtsbdyfjbatxc7l4rfxi
« Previous Showing results 1 — 15 out of 1,472 results