Filters








27,863 Hits in 2.5 sec

Securing web application by using qualitative research methods for detection of vulnerabilities in any application of DevSecOps

B.S.Vishnu Vardhan Reddy
2020 International Journal of Emerging Trends in Engineering Research  
The hypothetical discoveries of this exploration are stretched out by a viable case study.  ...  Papers containing security techniques and security tools that broaden the DevSecOps approach complete this methodology  ...  Securing Continuity Deployment pipelines "A key challenge in a continuous deployment is simply the security of the pipeline". A few people have created approaches for securing the pipelines.  ... 
doi:10.30534/ijeter/2020/44832020 fatcat:eyeeekxwbjfbzaph3edb6b6b2u

Applying Unsupervised Machine Learning in Continuous Integration, Security and Deployment Pipeline Automation for Application Software System

2019 International journal of recent technology and engineering  
The Pipeline involves Implementation of CI – CS - CD on a web application ClubSoc which is a Club Management Application and using unsupervised machine learning algorithms to detect anomalies in the CI-CS-CD  ...  Continuous integration and Continuous Deployment (CICD) is a trending practice in agile software development.  ...  of security concerns and testing in the Continuous Deployment pipeline, and is as much a part of Continuous Deployment as operations, testing, or security is a part of the DevOps culture.  ... 
doi:10.35940/ijrte.d7387.118419 fatcat:ryoqxj3pqnfixjb5ehcnwwkxji

Data Note: COVID-19, social distancing, and pipeline vandalism in Nigeria

P. N. Onwuachi-Iheagwara, B.I Iheagwara
2021 F1000Research  
The four sub-groups are sub-group A (one-year before deployment), sub-group B (the year of deployment), sub-group C (one-year after deployment), and sub-group D (two-years after deployment).  ...  We present a dataset of the monthly cases of pipeline vandalism in Nigeria from January 2015 to January 2021.  ...  of the historical data are: Prior to the deployment, the pipeline security method involved the active patrol in pipeline installation by security agents using patrol vehicles.  ... 
doi:10.12688/f1000research.54315.1 fatcat:fhwulan45bfojcr7nthcsf6oui

D6.1 – ASSIST-IoT DevSecOps Methodology and tools

ASSIST-IoT Consortium
2021 Zenodo  
Release: The Release phase is a milestone in a DevOps pipeline, as it is the point at which a build is ready for deployment into the production environment.  ...  This practice of automatically provisioning a new environment at the time of deployment is referred to as Infrastructure-as-Code (IaC) and is a core part of many DevOps pipelines.  ... 
doi:10.5281/zenodo.6771737 fatcat:rtdysx6wwneffblofkmpggfl4y

Wireless Sensor Network in Niger Delta Oil and Gas Field Monitoring: The Security Challenges and Countermeasures

Fidelis C Obodoeze
2012 International Journal of Distributed and Parallel systems  
High cases of vandalisation of oil and gas pipelines and other oil installations were identified even when there is evidence of wireless sensor deployment.  ...  report incidences of pipeline and equipment vandalisation easily and on time while at the same time maintain data security of the WSN.  ...  of oil and gas pipelines vandalisation and the inability to detect oil and gas pipeline vandalisation on time or at all still remains a very serious security challenge [10] .  ... 
doi:10.5121/ijdps.2012.3606 fatcat:aoi4vcvggnbmhptlkyxyczjgga

DEVSECOPS METHODOLOGY FOR NG-IOT ECOSYSTEM DEVELOPMENT LIFECYCLE – ASSIST-IOT PERSPECTIVE

Marcin Paprzycki, Maria Ganzha, Katarzyna Wasielewska, Piotr Lewandowski
2021 Journal of Computer Science and Cybernetics  
for Next Generation IoT deployments.  ...  development and instantiation of software platforms with minimal impact in any kind of operations environment, this contribution proposes the introduction of DevOps methodology for Next Generation IoT deployments  ...  using a sequence of steps or jobs normally described in a YAML file for describing the pipeline in GitLab or CircleCI or in a Jenkins file that will describe pipeline steps; (b) Provisioning of a test  ... 
doi:10.15625/1813-9663/37/3/16245 fatcat:jyhfo26vfnawrc5xcvs7eexz6a

Problems and Solutions of Continuous Deployment: A Systematic Review [article]

Antoine Proulx, Francis Raymond, Bruno Roy, Fabio Petrillo
2018 arXiv   pre-print
Conclusion: this article is to serve as a reference for the practitioner who wants to find how to solve a specific challenge when implementing the continuous deployment practice.  ...  Method: This paper is a systematic literature review of the problems and the solutions found when implementing the continuous deployment practice inside an organization.  ...  The categories with the most challenges that could not be associated with a solution are Infrastrucure, Application Architecture and Testing.  ... 
arXiv:1812.08939v1 fatcat:lo7aqxgh7jdhbpupyvbq5y63ie

Security for Devops Deployment Processes: Defenses, Risks, Research Directions

Norman Wilde, Brian Eddy, Khyati Patel, Nathan Cooper, Valeria Gamboa, Bhavyansh Mishra, Keenal Shah
2016 International Journal of Software Engineering & Applications  
In this paper we examine the security implications of two of the key DevOps practices, automation of the deployment pipeline using a deployment toolchain and infrastructure-as-code to specify the environment  ...  attack surface. • Research directions that look promising to support this new approach to software management. • Recommendations for DevOps adopters A DevOps continuous deployment pipeline is an automated  ...  As with Toolchain A, an attacker who succeeds in compromising the PVM could go on to penetrate the deployment pipeline.  ... 
doi:10.5121/ijsea.2016.7601 fatcat:u3ayin7nl5chbpg5m6i54cg65q

Harnessing the power of threat intelligence for WLCG cybersecurity

David Crooks, Liviu Valsan
2019 Zenodo  
The WLCG Security Operations Centre Working Group has produced a reference design for a minimally viable Security Operations Centre, applicable at a range of WLCG sites.  ...  An important way to mount an appropriate response is through the use of a Security Operations Centre (SOC).  ...  Zeek) Basic pipeline provided by WG Logstash + Elastiflow (Netflow) Dedicated pipeline for netflow/sflow Storage and Visualisation Elasticsearch Share deployment configs within group Kibana  ... 
doi:10.5281/zenodo.3599207 fatcat:n72egig4yvaolg37bnhcmvwoda

Cloud Computing – Everything As A Service [article]

Michael Howard
2022 arXiv   pre-print
However, managing cloud deployments requires a sophisticated framework that can autoscale the infrastructure and guarantee the up-time of running container images.  ...  The application developer no longer needs to worry about the up-front investment in a server farm provisioned for a worst-case load scenario.  ...  the triggers and actions of a Continuous Integration/Continuous Deployment (CI/CD) pipeline.  ... 
arXiv:2206.07094v1 fatcat:2jbbq7iv5vddjd4nyyhaezifjm

The Challenges that Frustrate the Deployment and use of Wireless Sensor Networks for Oil Pipeline Monitoring in the Niger Delta Region of Nigeria

A.O Oyubu, C.B Mbachu, C.A Nwabueze, J.P Iloh
2022 Zenodo  
The deployment and use of Wireless Sensor Networks in pipeline and oil facilities surveillance in the Niger Delta notwithstanding, incidences of pipeline vandalization and consequent oil theft are still  ...  Employing the technologyis thus frustrated by a myriad of challenges.  ...   Physical Security. A. Operational/Communication Security According to [8] , operational security assures that WSN is always available.  ... 
doi:10.5281/zenodo.6670374 fatcat:tj22abko65dfra6lid7dmeieyi

Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists

Claudio A. Ardagna, Valerio Bellandi, Ernesto Damiani, Michele Bezzi, Cedric Hebert
2021 Computers & electrical engineering  
Our solution acts as a middleware allowing a security expert and a data scientist to collaborate to the deployment of an analytics addressing their needs.  ...  In this paper, we propose a solution based on the concept of Model-Based Big Data Analytics-as-a-Service (MBDAaaS) that bridges the gap between security experts and data scientists.  ...  Acknowledgments This work was partly supported by the European Union's Horizon 2020 research and innovation programme under the CONCORDIA: Cyber security cOmpeteNce fOr Research anD Innovation project,  ... 
doi:10.1016/j.compeleceng.2021.107215 fatcat:3g46gzlyhnff7np4d7o2ypqgqu

Efficient Data Migration Method in Distributed Systems Environment [chapter]

Natheeswari N, Sivaranjani P, Vijay K, Vijayakumar R
2020 Advances in Parallel Computing  
Nonstop joining and arrangement pipeline technique might be a product improvement practice where designers consistently blend their code changes into a focal vault, after which computerized fabricates  ...  We applied Continuous Integration and Continuous Deployment strategy for information relocation.  ...  Deployment pipeline should support deployments, during which either the database or the appliance changes.  ... 
doi:10.3233/apc200198 fatcat:bxrvhmdyzfb5lk5sput5l6amka

Fast Delivery, Continuously Build, Testing and Deployment with DevOps Pipeline Techniques on Cloud

Muhammad Owais Khan
2020 Indian Journal of Science and Technology  
Fast Delivery, Continuously Build, Testing and Deployment with DevOps Pipeline Techniques on Cloud 554 / 575  ...  The best practices of DevOps are for automated test execution, automated deployment on different environments, and monitoring of the application.  ...  Application security issues -Everybody is scare, so DevOps we are talking about increasing the speed of deployment if we are a go to deploy things in a fast way security and compliance will raise all bad  ... 
doi:10.17485/ijst/2020/v13i05/148983 fatcat:njtnmp3qojftrdnmplpu4y75b4

Towards Continuous Deployment for Blockchain

Tomasz Górski
2021 Applied Sciences  
In a blockchain network, nodes communicate, storing data in a decentralized manner. Each node executes the same business application but operates in a distinct execution environment.  ...  Ensuring a production-ready state of the application under development is the immanent feature of the continuous delivery approach.  ...  The pipeline Build node deployment package is triggered when a new deployment configuration is generated from the UML Deployment model.  ... 
doi:10.3390/app112411745 fatcat:tah3qpqnengyrp3d34talvtvha
« Previous Showing results 1 — 15 out of 27,863 results