Software Defined Network (SDN) has become the true trend of the IT service model offering a cost-effective and scalable processing solution. Although central control is the major asset of the SDN, it is also a single ...
详细信息
Software Defined Network (SDN) has become the true trend of the IT service model offering a cost-effective and scalable processing solution. Although central control is the major asset of the SDN, it is also a single point of failure if it is made inaccessible by a distributed denial of service (DDoS) attack. Despite the number of existing traditional detection solutions, DDoS attacks continue to increase in frequency, volume and severity. this paper provides an analysis of the problem by examining the impact on security, particularly for distributed denial of service (DDoS) attacks that is still a threat to SDN software-defined networks and suggests the proposal and implementation of a DDoS attack detection algorithm. Based on an architecture that integrates highly programmable network monitoring and a flexible control structure to enable fast and specific attack detection. To cope withthe new architecture, we propose an attack detection system based on a statistical model that can address the problem of flooding attack and bandwidth attack. the simulation results show that our architecture can effectively address the security challenges posed by the new network paradigm and our attack detection system can effectively signal various attacks using realworld network traffic. (C) 2019the Authors. Published by Elsevier B. V.
A water quality prediction system (WQPS) and method for determining water quality of a water source include one or more sensors located at said water source present at one or more geographical locations, the sensors c...
详细信息
ISBN:
(数字)9781728189086
ISBN:
(纸本)9781728189093
A water quality prediction system (WQPS) and method for determining water quality of a water source include one or more sensors located at said water source present at one or more geographical locations, the sensors configured to obtain parameters associated with a said water source and transmit obtained parameters to at least one computing device of a fog networking; and the at least one computing device configured to process said obtained parameters to determine the water quality of water source located at geographical locations, and transmit determined water quality on a display of a user device that triggered determination the water quality of said water source, wherein said one or more geographical locations are different physical locations associated with a water.
the proceedings contain 6 papers. the topics discussed include: FaultSight: a fault analysis tool for HPC researchers;self-stabilizing connected components;enforcing crash consistency of scienti9;Ÿc app...
ISBN:
(纸本)9781728160139
the proceedings contain 6 papers. the topics discussed include: FaultSight: a fault analysis tool for HPC researchers;self-stabilizing connected components;enforcing crash consistency of scientiï¬üc applications in non-volatile main memory systems;evaluating compiler IR-level selective instruction duplication with realistic hardware errors;node-failure-resistant preconditioned conjugate gradient method without replacement nodes;and asynchronous receiver-driven replay for local rollback of MPI applications.
the growth of the mobile, portable devices and the server-to-server communication through cloud computing increase the network traffic. the dependence of the ubiquitous healthcare service delivery on the network conne...
详细信息
the proceedings contain 38 papers. the topics discussed include: statistical analysis in the research of human factor in software engineering;deep learning in brain computer interfaces;automatic identification of ski...
ISBN:
(纸本)9781450371933
the proceedings contain 38 papers. the topics discussed include: statistical analysis in the research of human factor in software engineering;deep learning in brain computer interfaces;automatic identification of skills’ dependency;development of base ontology for a digital library of the Bulgarian museums’ collections;e-commerce distributed chatbot system;trends review of the contemporary security problems in the cyberspace;analysis of keystream produced by generalized shrinking multiplexing generator controlled by ternary m-sequence;applied computing for portfolio optimization in Bulgarian stock exchange;and a framework for predicting community behavior in evolving social networks.
Routing in SDNs exploits the controller9;s global view and computes paths either using a single-source shortest path algorithm (e.g., Dijkstra, Bellman-Ford) or an all-pairs shortest path (APSP) algorithm (e.g., Fl...
详细信息
ISBN:
(数字)9781728194868
ISBN:
(纸本)9781728194875
Routing in SDNs exploits the controller's global view and computes paths either using a single-source shortest path algorithm (e.g., Dijkstra, Bellman-Ford) or an all-pairs shortest path (APSP) algorithm (e.g., Floyd-Warshall). Existing APSP routing algorithms for SDNs have substantial performance limitations in handling changes in the routes due to link deletion (failure) and link insertion (recovery). In this paper, we present POX-PLUS, a new SDN controller based on the popular POX controller. POX-PLUS includes a new routing module called DR-APSP (Dynamic Routing based on All Pairs Shortest Paths) that computes and efficiently maintains shortest paths between nodes in the SDN.
In this paper, we propose a lightweight mutual authentication and inter-cloud redeemable payment protocol which allows IoT devices to subscribe withtheir home cloud service providers for roaming coverage. More precis...
详细信息
ISBN:
(数字)9781728194868
ISBN:
(纸本)9781728194875
In this paper, we propose a lightweight mutual authentication and inter-cloud redeemable payment protocol which allows IoT devices to subscribe withtheir home cloud service providers for roaming coverage. More precisely, such devices acquire authenticated payment tokens in order to benefit from the computation offloading services from edge nodes deployed by foreign cloud service providers. Hence, IoT devices are continuously serviced even when outside of their home cloud providers coverage. the protocol makes use of tree of secrets, hash chains, and Merkle trees. It requires sharing a Merkle tree root and a 128-bit secret key for constructing the tree of secrets among cloud admins. Our protocol provides mutual authentication, confidentiality, and easy charge redemption from the home server. For N subscribed IoT devices, the storage at the hosting clouds is limited to 2 ×(Ns +1)×16 bytes and 32×LogN bytes for the IoT device, where Ns is the maximum number of devices served by the IoT gateway per payment redemption period.
the Cloud computing refers to manipulating, configuring and accessing the applications as utilities over the internet. It involves online data computation, storation, infrastructure and application, and hence it is hi...
详细信息
ISBN:
(数字)9781728189086
ISBN:
(纸本)9781728189093
the Cloud computing refers to manipulating, configuring and accessing the applications as utilities over the internet. It involves online data computation, storation, infrastructure and application, and hence it is highly essential to make a smart decision, when and how computing, storage and network resources be distributed and allocated to users to utilize, manage and consume them. In this paper first architecture of cloud computing, characteristics of service models and services provided by CSPs are discussed, than after analyzed growth rate and market share of top five CSPs in cloud service models, i.e Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS).
Cloud services are now well established, thanks to some providers9; pioneering work that currently offer on-premise the advantage of the predictability, continuity, and quality of service delivered by virtualizatio...
详细信息
ISBN:
(数字)9781728194868
ISBN:
(纸本)9781728194875
Cloud services are now well established, thanks to some providers' pioneering work that currently offer on-premise the advantage of the predictability, continuity, and quality of service delivered by virtualization technologies. In this context, SDN (Software Defined networking) aims to provide tenant-controlled management of forwarding and different abstractions of the underlying network infrastructure to the applications. the scheduling and placement of network functions in the cloud is a challenging task. One reason is that it also requires tedious provisioning and configuration steps. Even if we consider in this paper only the placement of network functions and not their configurations, we are faced withthe general problem of defining, in an 'optimal' way, the placement of network functions to be executed so that some criteria are preserved. In this paper, we formulate an approach to schedule network functions according to their dependencies.
Bridging the gap between market-oriented operational scheduling and grid-oriented control of distributed energy resources entails the formulation of a nonlinear optimization problem solvable with metaheuristic methods...
详细信息
ISBN:
(数字)9781728184531
ISBN:
(纸本)9781728184548
Bridging the gap between market-oriented operational scheduling and grid-oriented control of distributed energy resources entails the formulation of a nonlinear optimization problem solvable with metaheuristic methods. Despite the generally advantageous computing time of metaheuristics compared to complex nonlinear problems, metaheuristic methods require a time-consuming parametrization of each new instance of the underlying optimization problem. Considering the time constraints of control strategies for distributed energy resources, the time-consuming parametrization poses a significant challenge. this paper introduces dynamic parametrization approaches based on machine learning, which can increase the performance of the parametrization process.
暂无评论