Filters








663 Hits in 5.3 sec

Cloud Computing Reliability, Availability and Serviceability (RAS): Issues and Challenges

Farzad Sabahi
2012 The International Journal on Advances in ICT for Emerging Regions  
It also examines intrusion detection methods and outlines counter measures to improve cloud RAS.  ...  Examination of the benefits and risks of cloud computing is necessary for a full evaluation of the viability of cloud computing.  ...  database systems for specific markets complicates system selection, especially for customers whose workloads do not neatly fall into one category.  Peak provisioning leads to unnecessary costs: Database  ... 
doi:10.4038/icter.v4i2.4673 fatcat:zyd4kglll5cyvbtvebjrv4yyeq

Learning Explainable Representations of Malware Behavior [article]

Paul Prasse, Jan Brabec, Jan Kohout, Martin Kopp, Lukas Bajer, Tobias Scheffer
2021 arXiv   pre-print
In our system, an array of specialized detectors abstracts network-flow data into comprehensible network events in a first step.  ...  We demonstrate how this system detects njRAT and other malware based on behavioral patterns.  ...  Finally, the malware category broadly characterizes the monetization scheme or harmful behavior of a wide range of malware products.  ... 
arXiv:2106.12328v1 fatcat:go4odftttna4veyaqklyccukji

Complex event processing for reactive security monitoring in virtualized computer systems

Lars Baumgärtner, Christian Strack, Bastian Hoßbach, Marc Seidemann, Bernhard Seeger, Bernd Freisleben
2015 Proceedings of the 9th ACM International Conference on Distributed Event-Based Systems - DEBS '15  
In this paper, we present a new approach for reactive security monitoring in a virtualized computer environment based on minimally-intrusive dynamic sensors deployed vertically across virtualization layers  ...  Furthermore, a novel event store that supports fast event logging is utilized for offline analysis of collected historical data.  ...  Application Container In today's production systems, enterprise applications run on application servers like Glassfish or Tomcat.  ... 
doi:10.1145/2675743.2771829 dblp:conf/debs/BaumgartnerSHSS15 fatcat:3wgzgml3mfclflz3nxzwa2r74i

Esext3 for Reducing the Effect of Harboring Bug in File System

Raza Muhammad, Basheer Riskhan
2017 Journal of Software Engineering and Applications  
One of the most critical threats to the reliability and robustness for file system is harboring bug (silent data corruption).  ...  Demonstration testing shows satisfactory results in file server and web server environments in terms of less memory consumption and avoidable delay in system's updating.  ...  EXPLODE can comprehensively test storage systems by acclimatizing key designs from model scrutiny in a way that keeps their authority but removes their intrusiveness.  ... 
doi:10.4236/jsea.2017.104021 fatcat:45gsv3nw4fdznehth5sc3hnwza

Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats [article]

Zhiyan Chen, Jinxin Liu, Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Petar Djukic
2022 arXiv   pre-print
Meanwhile, signature-based, anomaly-based, and hybrid intrusion detection systems are summarized for IoT networks.  ...  Finally, open issues and challenges for common network intrusion and APT attacks are presented for future research.  ...  ACKNOWLEDGMENTS This work is supported in part by the Ontario Centre for Innovation under ENCQOR 5G Project #31993.  ... 
arXiv:2204.03433v1 fatcat:kjuwgifuqbbazm6lfrqsfynliy

Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats

Zhiyan Chen, Jinxin Liu, Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Petar Djukic
2022 ACM Computing Surveys  
Finally, open issues and challenges for common network intrusion and APT attacks are presented for future research.  ...  Advanced persistent threat (APT) is prominent for cybercriminals to compromise networks, and it is crucial to long-term and harmful characteristics.  ...  ACKNOWLEDGMENTS This work is supported in part by the Ontario Centre for Innovation under ENCQOR 5G Project #31993.  ... 
doi:10.1145/3530812 fatcat:msuclulqu5bddaalyeluabhkpy

Security Benchmarks for Web Serving Systems

Naaliel Mendes, Henrique Madeira, Joao Duraes
2014 2014 IEEE 25th International Symposium on Software Reliability Engineering  
Our methodology follows the approach of benchmarks proposed in the field of performance and dependability, containing elements such as metrics, workload, and experimental setup, and defining a comprehensive  ...  The static part corresponds to a static analysis of the target system and uses the knowledge about the impact and exploitability of known vulnerabilities discovered for that component or system.  ...  Web servers with default configuration, for example, may have template web sites with Cross-site scripting vulnerabilities.  ... 
doi:10.1109/issre.2014.38 dblp:conf/issre/MendesMD14 fatcat:mtvyoch3jrbgrmgylfqsm4uiiy

A survey on security issues and solutions at different layers of Cloud computing

Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan
2012 Journal of Supercomputing  
An attack is an action to harm Cloud resources. Exploitation of vulnerabilities would affect the availability and productivity of Cloud computing.  ...  For example, C. C. Lo et al. [28] introduced a snort based intrusion detection system framework for Cloud system.  ... 
doi:10.1007/s11227-012-0831-5 fatcat:mj7kwrsbqnedhjbw72wbtjwfve

A Review of Machine Learning Algorithms for Cloud Computing Security

Umer Ahmed Butt, Muhammad Mehmood, Syed Bilal Hussain Shah, Rashid Amin, M. Waqas Shaukat, Syed Mohsan Raza, Doug Young Suh, Md. Jalil Piran
2020 Electronics  
In thisreview paper, we present an analysis of CC security threats, issues, and solutions that utilizedone or several ML algorithms.  ...  Mobile CC (MCC) uses distributed computing to convey applications to cell phones.However, CC and edge computing have security challenges, including vulnerability for clients andassociation acknowledgment  ...  In the CC security issue with banking organizations, LMBP algorithms have been confirmed to be extremely productive for testing and prepartion systems.  ... 
doi:10.3390/electronics9091379 fatcat:quog4rpl2beaxfoei2377oaoci

Combined Security and Schedulability Analysis for MILS Real-Time Critical Architectures

Ill-Ham Atchadam, Frank Singhoff, Hai Nam Tran, Noura Bouzid, Laurent Lemarchand, Michael Wagner
2019 Euromicro Conference on Real-Time Systems  
Acknowledgements The authors would like to thank the anonymous reviewers of the paper at CERTS and internal reviewers at SYSGO for their valuable feedback.  ...  For this reason, intrusion detection and fault diagnosis and fault and vulnerability removal starts after the system goes into production, 4 which also is imperfect in detecting only a subset of intrusions  ...  Variability of system call count measurements is high in two situations: for workloads which raise few system calls; e.g. native ping server and empty Linux OS. for short execution time; e.g. ps and dd  ... 
doi:10.4230/oasics.certs.2019.1 dblp:conf/ecrts/AtchadamSTBL19 fatcat:5jglkqo3tjg35grf2riw2wtzl4

A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions

Osama Alkadi, Nour Moustafa, Benjamin Turnbull
2020 IEEE Access  
Above this layer, there are the software, hypervisors and management layers that permit the effective running across servers and gateways [28] .  ...  The management layer can monitor peaks in traffic and auto-scale to meet the demands of changing workloads by controlling provisioning state of VMs.  ...  For example, Snapp et al. proposed one of the earlier centralised based CID systems called distributed intrusion detection system (DIDS), which combined distributed monitoring with a centralised data analysis  ... 
doi:10.1109/access.2020.2999715 fatcat:qz677wrupvcblbvcrm74owmjyu

Evaluation des systèmes de détection d'intrusions

-Anas -ABOU EL KALAM
2006 Revue de l Electricité et de l Electronique  
for intrusion detection systems.  ...  Network carrier: Application Layer The main and effective elements of the activity are encapsulated in the packet workload reserved for the application layer.  ...  Intrusion A malicious fault externally induced resulting from an attack that  ... 
doi:10.3845/ree.2006.102 fatcat:erwecavq3zh33o3b5aemi5q5gm

Sensing Home: A Cost-Effective Design for Smart Home via Heterogeneous Wireless Networks

Xiaohu Fan, Hao Huang, Shipeng Qi, Xincheng Luo, Jing Zeng, Qubo Xie, Changsheng Xie
2015 Sensors  
Thus, a cost-effective ARM-based home server capable of working with lower power consumption is devised.  ...  Humidity, gas, smoke, temperature, pressure, illumination and passive infra-red (PIR) sensors are applied for designing and developing our sensing home system in this paper.  ...  We use PHP scripts to write the server program, and deploy the program on a cloud server, for data processing, analysis, transmission and storage.  ... 
doi:10.3390/s151229797 pmid:26633424 pmcid:PMC4721718 fatcat:ogrx2eebx5hihn5bt3sxtihfli

An Overview of Medical Electronic Hardware Security and Emerging Solutions

Shayan Taheri, Navid Asadizanjani
2022 Electronics  
Increased connectivity to existing computer networks has exposed the medical devices/systems and their communicating data to new cybersecurity vulnerabilities.  ...  The medical domain is an attractive area for cybercrimes for two fundamental reasons: (a) it is rich resource of valuable and sensitive data; and (b) its protection and defensive mechanisms are weak and  ...  A modern intrusion detection system (IDS) suitable for this application is provided in Figure 36 . [114] . Abbreviations used: IDS, intrusion detection system. Reprinted with permission from ref.  ... 
doi:10.3390/electronics11040610 fatcat:t2e7fnz26bc3dabxuyy7hqtjva

SDN-Based Architecture for Transport and Application Layer DDoS Attack Detection by Using Machine and Deep Learning

Noe M. Yungaicela-Naula, Cesar Vargas-Rosales, Jesus Arturo Perez-Diaz
2021 IEEE Access  
ACKNOWLEDGMENT The authors would like to thank Maritza Rosales Hernández, Fátima Sánchez Suárez, and Martín Helmut Domínguez Álvarez, for their assistance in training and testing the ML/DL models using  ...  This web service can be deployed in a different physical or virtual server. We call this server Intrusion Detection Server (IDS).  ...  The Intrusion Prevention System (IPS) proposed in [13] uses the KNN model to detect TCP-SYN and ICMP flooding attacks.  ... 
doi:10.1109/access.2021.3101650 fatcat:4x2clm3anvcijolphwlnaqzacq
« Previous Showing results 1 — 15 out of 663 results