176 Hits in 3.4 sec

R-IDPS: Real Time SDN-Based IDPS System for IoT Security

Noman Mazhar, Rosli Saleh, Reza Zaba, Muhammad Zeeshan, M. Muzaffar Hameed, Nauman Khan
2022 Computers Materials & Continua  
There has been a lot of research for IoT based detection systems to secure the IoT devices such as centralized and distributed architecture-based detection systems.  ...  The R-IDPS is scalable, and the system is suitable for heterogeneous IoT devices and networks.  ...  This database serves as a repository for real-time network flows, that helps in mining the device features based on its network flows.  ... 
doi:10.32604/cmc.2022.028285 fatcat:a6njdvakc5b3viqhi4vdl3gwnm

A collaborative framework for intrusion detection (C-NIDS) in Cloud computing

Zayed Al Haddad, Mostafa Hanoune, Abdelaziz Mamouni
2016 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)  
In our NIDS framework, we use Snort as a signature based detection to detect known attacks, while for detecting network anomaly; we use Support Vector Machine (SVM).  ...  In recent years, Cloud computing has emerged as a new paradigm for delivering highly scalable and on-demand shared pool IT resources such as networks, servers, storage, applications and services through  ...  Cl-CIDPS uses both techniques viz; signature based detection and anomaly detection in a network based IDPS, distributed in different cloud regions.  ... 
doi:10.1109/cloudtech.2016.7847708 fatcat:ppx3j7pbabfcrd2snoyfvvxuha

A Cloud Storage overlay to aggregate heterogeneous Cloud services

Guilherme Sperb Machado, Thomas Bocek, Michael Ammann, Burkhard Stiller
2013 38th Annual IEEE Conference on Local Computer Networks  
This paper proposes PiCsMu (Platform-independent Cloud Storage System for Multiple Usage), a novel approach exploiting heterogeneous data storage of different Cloud services by building a Cloud storage  ...  As opposed to P2P file sharing, where data and indices are stored on peers, PiCsMu uses Cloud storage systems for data storage, while maintaining a distributed index.  ...  , an Initialization Vector (IV), and a password.  ... 
doi:10.1109/lcn.2013.6761296 dblp:conf/lcn/MachadoBAS13 fatcat:isfwvhi37rblfh75ny3tw3fgky

Privacy Preserving Policy-Based Content Sharing in Public Clouds

Mohamed Nabeel, Ning Shang, Elisa Bertino
2013 IEEE Transactions on Knowledge and Data Engineering  
Using our BGKM construct, we propose an efficient approach for fine-grained encryption based access control for documents stored in an untrusted cloud file storage.  ...  Based on this idea, we formalize a new key management scheme called broadcast group key management (BGKM) and then give a secure construction of a BGKM scheme called ACV-BGKM.  ...  , our scheme for policy based content sharing in the cloud involves four main en tities: the Data Owner (Owner), the Users (Usrs) , the Identity Providers (IdPs), and the Cloud Storage Service (Cloud  ... 
doi:10.1109/tkde.2012.180 fatcat:vqnyiyhqezcbnetf34dmexec64

Constellation: A High Performance Geo-Distributed Middlebox Framework [article]

Milad Ghaznavi, Ali Jose Mashtizadeh, Bernard Wong, Raouf Boutaba
2020 arXiv   pre-print
We introduce Constellation, a framework for the geo distributed deployment of middleboxes.  ...  The evaluation of our implementation shows that, compared with the state-of-the-art [80], Constellation improves the throughput by a factor of 96 in wide area networks.  ...  Database replication protocols: Two phase commit is a common protocol to replicate transactions in distributed databases.  ... 
arXiv:2003.05111v1 fatcat:k7enkwwn2zffdmtaz3hbhjx7oe


R. I. Mukhamediev, Satbayev University, Institute of information and telecommunication technologies, Almaty, R. Mustakayev, K. O. Yakunin, Y. I. Kuchin, S. V. Kiseleva, V. I. Gopejenko,,, Institute of information and telecommunication technologies;;, Institute of information and telecommunication technologies;;, Institute of information and telecommunication technologies;; (+2 others)
2020 NEWS of National Academy of Sciences of the Republic of Kazakhstan  
Although DP can perform any tasks, three categories of data processors can be distinguished: Import data processors (IDP).  ...  The main functionality of MIGIS is implemented using data processors (DP), the number of which is highly scalable.  ...  Ақпараттық жəне телекоммуникациялық технологиялар институты; 3 Мəскеу мемлекеттік университеті, Мəскеу, Ресей; 4 ISMA University, Riga, Latvia; 5 Ventspils University of Applied Sciences, Ventspils,  ... 
doi:10.32014/2020.2518-170x.10 fatcat:enehac7cpnctxlpatx7ikphc7a

Automated Generation of Custom Processor Core from C Code

Jelena Trajkovic, Samar Abdi, Gabriela Nicolescu, Daniel D. Gajski
2012 Journal of Electrical and Computer Engineering  
We present a method for construction of application-specific processor cores from a given C code. Our approach consists of three phases.  ...  Each processor core was constructed and refined in under a minute, allowing the designer to explore several different configurations in much less time than needed for manual design.  ...  The Tensilica XPRES (Xtensa PRocessor Extension Synthesis) Compiler [15] automatically generates extensions that are formed from the existing instructions in style of VLIW, vector, fused operations,  ... 
doi:10.1155/2012/862469 fatcat:3w6lbl6t5retbdc7vtm2v6u52m

REVAMP2T: Real-time Edge Video Analytics for Multi-camera Privacy-aware Pedestrian Tracking

Christopher Neff, Matias Mendieta, Shrey Mohan, Mohammadreza Baharani, Samuel Rogers, Hamed Tabkhi
2019 IEEE Internet of Things Journal  
For the results and evaluation, this article also proposes a new metric, Accuracy·Efficiency (Æ), for holistic evaluation of IoT systems for real-time video analytics based on accuracy, performance, and  ...  At the same time, it avoids facial recognition, and tracks and re-identifies pedestrians based on their key features at runtime.  ...  extractors, processors, reducers, and combiners  ... 
doi:10.1109/jiot.2019.2954804 fatcat:oyeijzcn3jbrpbakkinifditse

Dataspace Support Platform for e-Science

Ibrahim Elsayed, Peter Brezany
2012 Computer Science  
This work intends to provide a data management solution based on the concepts of dataspaces for the large-scale and long-term management of scientific data.  ...  We present a theoretical dataspace model for e-Science applications, its implementation within a dataspace support platform and an experimental evaluation on top of two real world application domains.  ...  The experimental evaluation uses an initial prototype of jSpace (v1.2), which uses the Jena framework [1] to provide persistent RDF data storage in a MySQL database and the iRODS system as to implement  ... 
doi:10.7494/csci.2012.13.1.49 fatcat:op7qjb6wtnay5ia56scr32sjwe

A novel IoT-based health and tactical analysis model with fog computing

Aykut Karakaya, Sedat Akleylek
2021 PeerJ Computer Science  
For this, a task management algorithm based on priority queue and list of fog nodes is modified in the fog layer.  ...  In the architecture based on fog computing and IoT, priority processes are computed with low latency.  ...  In another study, the health status of marathon runners was monitored with a WSN (Pfisterer et al., 2006) . Data was collected with sensors in runners and analyzed offline in a database.  ... 
doi:10.7717/peerj-cs.342 pmid:33816993 pmcid:PMC7959607 fatcat:v2x4aiy755fz7ckb5qx5zd34ye

Towards Improving the Usability and Security of Web Single Sign-On Systems

San-Tsai Sun
2013 Zenodo  
The formal analysis identified three weaknesses in the protocol, and based on the attack traces from the model checking engine, six exploits and a semiautomated vulnerability assessment tool were designed  ...  Third, we examined the OAuth 2.0 implementations of three major IdPs and 96 popular RP websites.  ...  B sends response type=code, i, p, r and optional a to IdP. IdP checks i, p and r against its own local storage. 4. IdP presents a login form to authenticate the user.  ... 
doi:10.5281/zenodo.3264671 fatcat:iorqjr7rmnevfp2opa7uvv3qpq

Experimental Cyber Attack Detection Framework

Cătălin Mironeanu, Alexandru Archip, Cristian-Mihai Amarandei, Mitică Craus
2021 Electronics  
Digital security plays an ever-increasing, crucial role in today's information-based society.  ...  However, such instruments are used mainly offline with the purpose of auditing existing IDS/IDPS solutions.  ...  Gheorghit ,ȃ is a system and network engineer at the "Gheorghe Asachi" Technical University of Iasi, Romania.  ... 
doi:10.3390/electronics10141682 fatcat:h4tpj4ihkvfanhn6fpmwkjwqjy

Security And Privacy Requirements And Secure Storage Architecture

Petr Holub, Jim Dowling, Salman Muhammad, Khan Niazi, Kamal Hakimzadeh, Boris Parák
2016 Zenodo  
Last but not least, it summarizes cloud-based architecture for processing of privacy-sensitive data related to biobanking and architecture for their secure storage.  ...  This document focuses on providing a comprehensive list of requirements for implementing IT services of BBMRI-ERIC as well as for interacting with other infrastructures which will provide services to BBMRI-ERIC  ...  of a vector.  ... 
doi:10.5281/zenodo.161551 fatcat:ib7ll46gifc3foabgsbrpjylnm

Implementation and Design of Wireless IoT Network using Deep Learning

2021 Turkish Journal of Computer and Mathematics Education  
The Internet of Things (IoT) is a technology and plays a key role in just this process.  ...  WC is a budding technology in IoT, and it involves further learning. This dilemma motivates the authors to suggest a standardized IoT WC system.  ...  The overloading consideration of the proposed decision process based on ML is Often superior to IDP, at 1.36 IDP times on great average.  ... 
doi:10.17762/turcomat.v12i3.761 fatcat:6zrmbsn4gbettoldvpyjouhp64

An Autonomic Framework for Integrating Security and Quality of Service Support in Databases

Firas Alomari, Daniel A. Menasce
2012 2012 IEEE Sixth International Conference on Software Security and Reliability  
Similar to traditional IDPSs, database IDPS (DBIDPS) can be broadly classified as misuse and anomaly based.  ...  Equally, there is a great dependence on databases to provide data storage and retrieval mechanisms for the organization's information systems.  ... 
doi:10.1109/sere.2012.15 dblp:conf/ssiri/AlomariM12 fatcat:fzp6bqpr7fdhbcwpduqx7pc2sa
« Previous Showing results 1 — 15 out of 176 results