Based on the investigation of periodic shrew distributed DoS Attacks among enormous normal end-users39; flow in cloud computing, this paper proposed a new method to take frequency-domain characteristics from the aut...
详细信息
ISBN:
(纸本)9788996865063
Based on the investigation of periodic shrew distributed DoS Attacks among enormous normal end-users' flow in cloud computing, this paper proposed a new method to take frequency-domain characteristics from the autocorrelation sequence of network flow as clustering feature to group end-user flow data by BIRTH algorithm, and re-merge these clustering results into new groups by overcoming the deficiency of BIRTH algorithm. At last, the result of simulation proves the proposed method distinguishes abnormal network flows with higher detection accuracy and faster response time, and prevents abnormal network flow groups with less impaction.
The proceedings contain 812 papers. The topics discussed include: power consumption analysis across heterogeneous data center using cloudsim;underlying text independent speaker recognition;automatic ration distributio...
ISBN:
(纸本)9789380544199
The proceedings contain 812 papers. The topics discussed include: power consumption analysis across heterogeneous data center using cloudsim;underlying text independent speaker recognition;automatic ration distribution system-a review;evaluation for POS tagger, chunk and resolving issues in word sense disambiguate in machine translation for Hindi to English languages;virtual calling number for ESME;traffic signal preemption (TSP) system by ordinary vehicles in case of emergency based on internet of Things ecosystem;ICT based communication systems as enabler for technology transfer;adaptability in constant modulus algorithm and optimization for smart antenna systems;design of gain enhanced stacked rectangular dielectric resonator antenna for C-band applications;design of rectangular dielectric resonator antenna using offset micro-strip feed for satellite application;identification of parameters of digital IIR filters using teaching-learning optimization algorithm and statistical inference comparison with particle swarm optimization algorithms;proximal privacy preserving linear classification of horizontally and checkerboard partitioned data;beyond m-score for detection of misusability by malicious insiders;effect of population and bit size on optimization of function by genetic algorithm;and design and advances of cylindrical dielectric resonator antenna - a review.
Wireless sensor networks (WSNs) become an emerging area of research now-a-days. It plays an important role to support a wide range of applications. In this work, we propose an architecture for data management in WSNs ...
详细信息
ISBN:
(纸本)9788132225294;9788132225287
Wireless sensor networks (WSNs) become an emerging area of research now-a-days. It plays an important role to support a wide range of applications. In this work, we propose an architecture for data management in WSNs where in each cluster, sensor nodes transfer data to their cluster-head (CH) and among the CHs one CH is selected based on the highest energy label. The CH aggregates data and reduces the size of the data to be transmitted to the base station. We have also proposed an algorithm which determines how fast the data is transferred from the source node to the base station.
The technological environment is a competitive ground used by IT industries for provisioning Cloud services. It is essential for the organizations to facilitate higher availability of quality services, computing resou...
详细信息
ISBN:
(纸本)9789380544199
The technological environment is a competitive ground used by IT industries for provisioning Cloud services. It is essential for the organizations to facilitate higher availability of quality services, computing resources and faster delivery. Fog computing can work with much the same Cloud computing in promoting faster IT services. The incorporation looks after affording, maintaining and provisioning of resources like storage space, hardware virtualization, high-capacity networks, service-oriented architectures, autonomic and utility computing etc, proximal to the access point. The maximal uniform distribution of the load across closer and more number of simpler nodes can help managing and providing the big data and large workloads more easily. The paper proposes an efficient load balancing algorithm for a Fog-Cloud based architecture. The algorithm uses data replication technique for maintaining data in Fog networks which reduces overall dependency on big data centers. A comparison of present load balancing techniques in 'Cloud-based' infrastructure to the presented 'Cloud-Fog' duo is also shown. The ultimate goal is to balance load through Fog networks and make internet less Cloud dependent by having data available closer to the user end.
This paper focuses on detecting and analyzing cyber-attacks in cloud environment, it represents a novel approach of detecting cyber-attacks by analyzing attacks pattern using risk assessment methodologies. The aims of...
详细信息
Nowadays, the distributed Denial of Service (DDoS) attack is still one of the most common and devastating security threats to the internet. This problem is progressing quickly, and it is becoming more and more difficu...
详细信息
ISBN:
(数字)9788132227571
ISBN:
(纸本)9788132227571;9788132227564
Nowadays, the distributed Denial of Service (DDoS) attack is still one of the most common and devastating security threats to the internet. This problem is progressing quickly, and it is becoming more and more difficult to grasp a global view of the problem. In this paper, we propose a new defense method used the bandwidth in second that a server can use for UDP packets is set as a parameter for controlling a DDoS attack by using the number of UDP packets available. It is registered in the private security policy as a parameter for detecting a flood attack. The efficiency of our proposed method was also proved in the experiments with NS2. DDoS attack is controlled effectively by the private security policy the bandwidth of the regular traffic would be maintained.
Cloud computing is being used for data-intensive computing for enterprise and scientific applications that process large data sets originating from globally distributed data centers. In this work, we propose a system ...
详细信息
ISBN:
(纸本)9783319280349;9783319280332
Cloud computing is being used for data-intensive computing for enterprise and scientific applications that process large data sets originating from globally distributed data centers. In this work, we propose a system model for multiple data centers cooperating to serve a client's request for data and to identify data centers which can provide the fastest response time to a client. Further, dynamic data replication strategy across geo-distributed data centers based on popularity is detailed. Simulation results are presented and the performance evaluation shows that our method consistently maintains the replica count to an optimal value.
As observed in the statistics, the electricity usage is increasing day by day. User comes to know about the electricity consumption of his house after a month. Till then he is not aware about it. After receiving the e...
详细信息
ISBN:
(纸本)9789380544199
As observed in the statistics, the electricity usage is increasing day by day. User comes to know about the electricity consumption of his house after a month. Till then he is not aware about it. After receiving the electricity bill user starts worrying. To reduce the wastage of energy and money as well as use the electricity efficiently, this device has been designed. The device notifies the user about his home electricity usages by sending alerts, suggestions, statistics, graphs, etc. which will tend to energy saving. This device uses concept of IOT (internet of Things) i.e. connecting the devices to the internet and transferring data collected by them to storage server. The user can then read and decide his actions and act accordingly. The aim of this paper is to help user to monitor the electricity consumed by its device and if the device is malfunctioning it will ultimately consume large amount of energy, and this can be detected and user would be informed about the malfunctioning of the device.
Healthy environment is imperative to a healthy and happy community. With the age old system of hiring people to regularly check and empty filled dustbins, the process has been prone to human error and neglect. Additio...
详细信息
ISBN:
(纸本)9781509021604
Healthy environment is imperative to a healthy and happy community. With the age old system of hiring people to regularly check and empty filled dustbins, the process has been prone to human error and neglect. Additionally, due to different frequency of usage of dustbins in different areas, routine checks which are based on time crevices is inefficient because a dustbin might get filled early and may need immediate attention or there might not be any need of a routine check for a long period of time. This makes present system resource expensive and ineffectual, as overflowing, stinking dustbins become more of a problem than a solution. In this paper we present a solution about the SmartBin is a network of dustbins which integrates the idea of IoT with Wireless Sensor Networks. We also put forward the concept of a network of smart garbage bins based on the Stack Based Front End approach of integrating Wireless Sensor Network with the Cloud computing and discuss how Machine Learning techniques like Decision Forest Regression can be applied to the sensor data leveraged by the system to gain useful insights to improve the efficiency of the garbage monitoring.
The internet is a Heterogeneous entity which is constantly changing and evolving. The concept of "internet of Things" (IOT) refers to extending the intelligent sensors in our day to day objects such as telev...
详细信息
ISBN:
(纸本)9789380544199
The internet is a Heterogeneous entity which is constantly changing and evolving. The concept of "internet of Things" (IOT) refers to extending the intelligent sensors in our day to day objects such as televisions, fridge, media players, heating appliances etc. This would help in extending the ability of the objects to provide feedback to the user. This enables the object to have some sort of consciousness. What we have today is the human interacting with the object and not vice-versa, but the IOT would help us to complete this loop. This kind of digitization would mean that our next generation of refrigerators would know more about our diet then our current dieticians. This would help in creating a "system of systems". Consideringacurrent scenario where the number of digital security threats and attacks are increasing day by day, the notion of IOT would be incomplete if we ignore its security aspects. In this paper, we would be exploring the various security aspects of IOT such as security ofremote frequency identifiers(RFID), wireless sensors etc. We have proposedataxonomyof the security aspects of IOT. We have also explained the basic concepts and motivation behind the evolution of IOT, its architecture, and applications.
暂无评论