Filters








17,016 Hits in 4.4 sec

Intrusion Detection Techniques in Cloud Computing: A Review

Nurudeen Mahmud, Anazida Zainal
2018 International Journal of Computer Applications  
In this paper a review of cloud-based intrusion detection system was provided.  ...  Based on the review open problems and research direction in cloud intrusion detection was provided. General Terms Review  ...  Research work in cloud-based IDS has employed both static and dynamic approach for normal profile creation.  ... 
doi:10.5120/ijca2018916139 fatcat:afazs54iknd2veot4r5w7tsuzq

State of the Art Intrusion Detection System for Cloud Computing

Azuan Ahmad, Wan Shafiuddin Zainudin, Mohd Nazri Kama, Norbik Bashah Idris, Madihah Mohd Saudi, Nur Hafiza Zakaria
2022 International Journal of Communication Networks and Information Security  
in cloud computing systems.  ...  The term Cloud computing is not new anymore in computing technology.  ...  static strategy.  ... 
doi:10.17762/ijcnis.v10i3.3590 fatcat:xu3wo6ncbvcb3lvgo4obvijkki

Software development environments on the web

Lennart C.L. Kats, Richard G. Vogelij, Karl Trygve Kalleberg, Eelco Visser
2012 Proceedings of the ACM international symposium on New ideas, new paradigms, and reflections on programming and software - Onward! '12  
For software development, the Web presents a shift away from developer workstations as a silo, and has the promise of closer collaboration and improved feedback through innovations in Web-based interactive  ...  development environments (IDEs).  ...  We would like to thank Molham Aref, Martin Bravenboer, Shan Shan Huang (LogicBlox), and Rik Arends (Cloud9) for our discussions about software development on the web.  ... 
doi:10.1145/2384592.2384603 dblp:conf/oopsla/KatsVKV12 fatcat:otaopqstuvd2jchq3nmhbvpbyu

Towards Immediate Feedback for Security Relevant Code in Development Environments [article]

Markus Haug Ana Cristina Franco Da Silva, Stefan Wagner
2022 arXiv   pre-print
To support developers in their tasks of developing secure code, we present an approach for providing them with continuous immediate feedback of SAST tools in integrated development environments (IDEs).  ...  A common practice in software development is the use of static application security testing (SAST) tools to analyze code regarding security vulnerabilities.  ...  Eclipse CogniCrypt 10 is an open-source platform for static code analysis based on CrySL rules [6] .  ... 
arXiv:2207.03225v1 fatcat:infdsqmr7jew3k5vrnppicmcwa

Cooperative Trust Framework for Cloud Computing Based on Mobile Agents

Hicham Toumi, Amal Talea, Bouchra Marzak, Ahmed Eddaoui, Mohamed Talea
2015 International Journal of Communication Networks and Information Security  
Our Hybrid IDS is based on two types of IDS, the first is for the detection of attacks at the level of virtual machines (VMs). The second is for the network attack detection and Mobile Agents.  ...  In this paper, we develop a collaborative approach based on Hy-IDS and Mobile Agents in Cloud Environment, to define a dynamic context which enables the detection of new attacks, with much detail as possible  ...  in the Figure.5) to Analyser Agent in IDS-C.  ... 
dblp:journals/ijcnis/ToumiTMET15 fatcat:7tyyedjozvbdzgzsjwn5ojikz4

Building MDE Cloud Services with Distil

Carlos Carrascal Manzanares, Jesús Sánchez Cuadrado, Juan de Lara
2015 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems  
We illustrate the approach through the construction of a repository and a set of cloud-based services for bent ō reusable transformation components.  ...  In order to alleviate this situation, we present DISTIL, a domain-specific language to describe MDE services, which is able to generate (NoSQL-based) respositories for the artefacts of interest, and skeletons  ...  For example, AToMPM [6] offers a complete cloud-based modelling environment, while Hypersonic [1] is a cloud-based tool to perform model analysis.  ... 
dblp:conf/models/ManzanaresCL15 fatcat:jvvnfl6rq5etvpjmt3qtdax53m

Modelling and managing deployment costs of microservice-based cloud applications

Philipp Leitner, Jürgen Cito, Emanuel Stöckli
2016 Proceedings of the 9th International Conference on Utility and Cloud Computing - UCC '16  
CostHat is based on a network model, and allows for what-if and cost sensitivity analysis.  ...  Our model, which we dubbed CostHat, supports both, Microservices deployed on traditional IaaS or PaaS clouds, and services that make use of novel cloud programming paradigms, such as AWS Lambda.  ...  executions of the application; while technically not trivial, tools that support this kind of service dependency mining exist (e.g., Dynatrace); (2) prior to deployment, by statically analysing the source  ... 
doi:10.1145/2996890.2996901 dblp:conf/ucc/LeitnerCS16 fatcat:z3kzeupq5vaolefotfjv6hs7cy

A Novel Framework for Video Delivery to Handheld Devices using Cloud Environment

2019 International Journal of Engineering and Advanced Technology  
The novel framework was tested with the cloud environment, within our parametric boundary it provide smooth streaming services to the handheld devices.  ...  Handheld devices are responsible for most of the internet traffic nowadays. Video streaming services plays a vital role in internet traffic because of its increasing size and high definition.  ...  The static Id was permanently stored in a server Data Base (DB) with the unique username as a key.  ... 
doi:10.35940/ijeat.b4042.129219 fatcat:ubwbnamq7bbmdji3p6g2cupbke

A Proactive Cloud Management Architecture for Private Clouds

Dapeng Dong, John Herbert
2013 2013 IEEE Sixth International Conference on Cloud Computing  
the current status of the cloud, supporting optimal decision making; and a Calendar-based Data Storage Model to reduce the storage required for cloud metric data and increase analysis performance.  ...  A proactive response to cloud events is generated based on statistical analysis of historical metrics and predicted usage.  ...  Its Virtual Placement and Balancing solution automatically optimises cloud resource usage based on both statical and optimisation techniques. Beside industrial solutions, Sotomayor et al.  ... 
doi:10.1109/cloud.2013.19 dblp:conf/IEEEcloud/DongH13 fatcat:ngpxw53ug5bghjemeeyk4pqb4u

Utilising stream reasoning techniques to underpin an autonomous framework for cloud application platforms

Rustem Dautov, Iraklis Paraskakis, Mike Stannett
2014 Journal of Cloud Computing: Advances, Systems and Applications  
with static ontological knowledge and apply intelligent reasoning.  ...  cloud providers is to develop appropriate mechanisms for run-time monitoring and adaptation, to prevent cloud application platforms from quickly dissolving into a non-reliable environment.  ...  This separation of concerns allows for seamless and transparent modification of the analysis rules constituting the static knowledge base. • Support for expressive queries and complex schemas: Figure  ... 
doi:10.1186/s13677-014-0013-5 fatcat:77lksagfjba6bibgfpw3gbwsru

REAL WORKLOAD CHARACTERIZATION AND SYNTHETIC WORKLOAD GENERATION

Keerthi Bangari .
2016 International Journal of Research in Engineering and Technology  
Synthetic workloads are generated based on our experiments. The real trace is downloaded from Google cluster data which consists of two workloads.  ...  paper we are analyzing the Google cluster data version 2 trace in IBM SPSS statistics and generating another workload called synthetic workload with the same characteristics and behavior of real workload based  ...  Some of research based cloud simulator are Cloud Sim, Green Cloud, and GroudSim [1] .  ... 
doi:10.15623/ijret.2016.0505080 fatcat:ntjlbkcma5cutkaxjczz42754m

Intrusion Detection and Marking Transactions in a Cloud of Databases Environment

Syrine Chatti, Habib Ounelli
2016 International Journal on Cloud Computing Services and Architecture  
The cloud computing is a paradigm for large scale distributed computing that includes several existing technologies.  ...  In this context, we propose an intrusion detection and marking transactions for a cloud of database environment.  ...  The unification of transaction based application in these environments present a set of threats that can target a cloud of database environment.  ... 
doi:10.5121/ijccsa.2016.6502 fatcat:omwrqhe6ojdpjpfwckzghhlfve

Using ATL Transformation Services in the MDEForge Collaborative Modeling Platform [chapter]

Juri Di Rocco, Davide Di Ruscio, Alfonso Pierantonio, Jesús Sánchez Cuadrado, Juan de Lara, Esther Guerra
2016 Lecture Notes in Computer Science  
This demo paper illustrates the extensibility of MDEForge by integrating ATL services for the remote execution, automated testing, and static analysis of ATL transformations.  ...  Harnessing the softwareas-a-service (SaaS) paradigm and shifting applications from local, mono-core implementations to cloud-based architectures is key to enhance scalability and flexibility.  ...  The analysis service uses anATLyzer [10] , a static analyser for ATL able to detect over 40 types of errors statically (e.g., rule conflicts, unresolved bindings, uninitialized features).  ... 
doi:10.1007/978-3-319-42064-6_5 fatcat:2ompuqrarjcn7mj5yqulsjxq44

Re-provisioning of Cloud-Based Execution Infrastructure Using the Cloud-Aware Provenance to Facilitate Scientific Workflow Execution Reproducibility [chapter]

Khawar Hasham, Kamran Munir, Richard McClatchey, Jetendr Shamdasani
2016 Communications in Computer and Information Science  
2016) Re-provisioning of cloud-based execution infrastructure using the cloudaware provenance to facilitate scientific workflow execution repro-  ...  Besides this, the support provided by OSDC by o↵ering a free Cloud infrastructure of 20 cores is highly appreciated.  ...  [15, 16] ) performed to capture provenance in the Cloud. However, they lack the support for workflow reproducibility.  ... 
doi:10.1007/978-3-319-29582-4_5 fatcat:j44fx7txsbea5atvv342x3b64a

PolicyCloud D2.5 STATE OF THE ART & REQUIREMENTS ANALYSIS M22

Boyan Kolev, Jose María Zaragoza, Patricio Martinez, Luis Miguel Garcia, Ofer Biran, Kostas Moutselos, Marios Koniaris, Christos Pavlatos, Aggelos Kolaitis, María Ángeles Sanguino, Jorge Montero, Ana Luiza Pontual (+22 others)
2021 Zenodo  
Licence/Privacy It can be imported in PolicyCLOUD Data type Structural Type of Process static (Stream or Static data) TABLE 71 71 -DATASET REQUIREMENT FOR DS-IIPDD-04 Section Description ID DS-IIPDD  ...  option for businesses in the cloud market.  ...  management, enabling public authorities and stakeholders to create, analyse, evaluate and optimize policies based on the "fresh" data, the information that can be continuously collected by citizens and  ... 
doi:10.5281/zenodo.6043823 fatcat:fuf7egsgfvea3ky5it2wpmt4ha
« Previous Showing results 1 — 15 out of 17,016 results