The exponential expansion of computer networks and the internet makes it clear that there is a chance of being attacked and harmed. In the meantime, one of the most crucial defensive measures against the more complex ...
详细信息
ISBN:
(数字)9798331532215
ISBN:
(纸本)9798331532222
The exponential expansion of computer networks and the internet makes it clear that there is a chance of being attacked and harmed. In the meantime, one of the most crucial defensive measures against the more complex and frequent network attacks is the intrusion detection and prevention systems (IDSs and IPSs). Due to insufficient datasets, anomaly-based research in intrusion detection systems is plagued by imprecise deployment, analysis, and evaluation. The researchers analyzed a variety of datasets, including DARPA98, KDD99, ISC2012, and ADFA13, to assess how well their suggested intrusion detection and intrusion prevention techniques performed. There are several issues: lack of adequate attack coverage, unrepresentative payloads, and anonymised packet information, insufficient traffic volume and diversity, or a deficiency in feature set and metadata. This study is focused on CICIDS-2017 which is the recently updated IDS dataset that meets real-world requirements and is accessible publicly. In addition to benign network flows anddistributed denial of service (DDoS) attacks, it contains seven common attack network flows as well. To provide the optimal combination of features for the identification of the attack category, it also assesses the efficacy of several machine learning (ML) algorithms and network traffic feature sets. Even though various ML techniques like Linear Regression, Random Forests, and Decision Tree can be used, and performed very well, Hybrid Algorithm is designed to get better analysis on dataset.
Modern 5G networks offer a network-sliced infrastructure where each network slice contains a dedicated 5G core software service layer. The 5G core software services in each slice shares common core network resources t...
详细信息
ISBN:
(数字)9798331508050
ISBN:
(纸本)9798331508067
Modern 5G networks offer a network-sliced infrastructure where each network slice contains a dedicated 5G core software service layer. The 5G core software services in each slice shares common core network resources to meet specific customer needs. A primary challenge in 5G network slicing involves resource sharing and efficient network slice orchestration. Container-based methodologies, including tools like Docker and Kubernetes, have become popular for orchestrating 5G network slice services and managing configurations in microservices-based cloud-native service deployment. However, despite their utility, these tools present significant challenges. Their complexity often necessitates dedicated DevOps teams for effective management, while configuration management can prove arduous, and end-to-end supply chain oversight is lacking. To address these challenges, this paper introduces “Llama-Recipe,” a cloud-native 5G-core service deployment and orchestration platform integrating Generative AI, SBOM, PBOM and NFT. 5G-core service configurations across different network slices are represented as “HOCON (Human-Optimized Config Object Notation)” config objects adhering to the GitOps paradigm. Leveraging custom-trained Meta's Llama2 LLM, Llama-Recipe generates the Kubernetes manifests for network-sliced 5G-core services based on the defined HOCON configurations. The generated Kubernetes manifests of the 5G-core services are deployed in designated Kubernetes clusters utilizing GitOps tools (e.g., ArgoCD), ensuring seamless and automated deployment processes. Additionally, Llama-Recipe introduced a novel mechanism to handle end-to-end supply chain verification of 5G-core software services using Software-Bill of Materials (SBOM) and Pipeline-Bill of Materials (PBOM). SBOMs track all the dependencies and PBOMs facilitate the comprehensive tracking of end-to-end supply chain data for 5G-core software services, enhancing transparency and security. These PBOMs are also generated
Many global organizations are generating large volumes of highly distributed data that must be shared for querying by the organization's participants, which can be put together by a grid infrastructure. Scheduling...
详细信息
ISBN:
(纸本)9781424442331
Many global organizations are generating large volumes of highly distributed data that must be shared for querying by the organization's participants, which can be put together by a grid infrastructure. Scheduling query execution in these environment is an important issue. Centralized and Hierarchical scheduling architectures are between the most commonly used scheduling architectures in distributed databases and grid computing, respectively Each architectural model has its own advantages and disadvantages. In this paper we evaluate the usage of both models in querying highly distributed data. We consider several scheduling policies and experimentally compare scheduling models and policies in terms of throughput and SLO-fulfillment. The obtained results indicate that layered on-demand scheduling may lead to good results in both throughput and SLO-oriented environments.
The notion of invariant consistency was proposed that allowed the programmers to specify inter-process ordering requirements. Data consistency protocols provided a consistent view of the shared memory in the presence ...
详细信息
ISBN:
(纸本)0769515851
The notion of invariant consistency was proposed that allowed the programmers to specify inter-process ordering requirements. Data consistency protocols provided a consistent view of the shared memory in the presence of multiple copies, implemented in message passing systems. The combination of invariant consistency and sequential consistency, known as InvSC consistency was studied, and a systematic way to modify the Lazy Cache algorithm for implementing InvSC consistency was proposed.
Recent times have seen a strong increase in the size, scope and number of information processing tasks computers are commonly used to perform. Grids are one form of distributedcomputing that, generally, aim for HTC (...
详细信息
ISBN:
(纸本)9781424442331
Recent times have seen a strong increase in the size, scope and number of information processing tasks computers are commonly used to perform. Grids are one form of distributedcomputing that, generally, aim for HTC (High Throughput computing). Grids can also be constructed to perform HPC (High Performance computing) at a relatively low cost when compared to clusters. There currently exists open source middleware for building grids. But when such grids consist of Windows machines it is difficult to use members of the grid efficiently. This research concerns the construction of a cheap grid of Windows machines. In this paper we describe a Windows grid that uses multiple core processors which are becoming increasingly popular.
Ubiquitous computing has gained ground over the last five years. It focuses on devices being able to connect to the net at any time from any place. It includes the modern term distributedcomputing, which means access...
详细信息
ISBN:
(纸本)9781424442331
Ubiquitous computing has gained ground over the last five years. It focuses on devices being able to connect to the net at any time from any place. It includes the modern term distributedcomputing, which means accessing resources from any place. Several behaviours in modern distributedcomputing can be observed. For instance, a process in one place can send an object to other places;a process can request an object from a remote provider;a process can be moved from one place to another and then continue its execution;a message might travel through many intermediaries before its destination. Too many participants in one action might cause computational complications. It is better if the system structure can be at proved before the action really takes place. Therefore, Script is a modelling language designed for "simulating" and "verifying" distributedcomputing, grid computing and ubiquitous computing. Although Script is currently a modelling language, it will be provided with a transformation tool to move a Script-based model into a real environment. This tool is under development.
We focus on an important problem it? the space of ubiquitous computing, namely, programming support for the distributed heterogeneous computing elements that make up this environment. We address the interactive, dynam...
详细信息
ISBN:
(纸本)0769515851
We focus on an important problem it? the space of ubiquitous computing, namely, programming support for the distributed heterogeneous computing elements that make up this environment. We address the interactive, dynamic, and stream-oriented nature of this application class and develop appropriate computational abstractions in the D-Stampede distributed programming system. The key features of D-Stampede include indexing data streams temporally, correlating different data streams temporally, performing automatic distributed garbage collection of unnecessary stream data, supporting high performance by exploiting hardware parallelism where available, supporting platform and language heterogeneity, and dealing with application level dynamism. We discuss the features of D-Stampede, the programming ease it affords, and its performance.
Ubiquitous computing is poised to revolutionize the way we compute and interact with each other. However, unless privacy concerns are taken into account early in the design process, we will end up creating a very effe...
详细信息
ISBN:
(纸本)0769515851
Ubiquitous computing is poised to revolutionize the way we compute and interact with each other. However, unless privacy concerns are taken into account early in the design process, we will end up creating a very effective distributed surveillance system, which would be a dream come trite for electronic stalkers and "big brothers." We present a protocol, which preserves the privacy of users and keeps their communication anonymous. In effect, we create a "mist" that conceals users from the system and other users. Yet, users will still be able to enjoy seamless interaction with services and other entities that wander within the ubiquitous computing environment.
Mechanisms that ensure mutual access, replication and resilience to failures in large distributed systems can be based on quorum consensus. Effectiveness and scalability of the method selected are crucial. The aim of ...
详细信息
ISBN:
(纸本)0769515851
Mechanisms that ensure mutual access, replication and resilience to failures in large distributed systems can be based on quorum consensus. Effectiveness and scalability of the method selected are crucial. The aim of this paper is to present a message/time cost analysis of a distributed algorithm based on the tree quorum, which needs no global information, and has message complexity independent of the load. Results obtained for the different identifications of the requests (a requester's identification, timestamp, and group priority) illustrate the flexibility of the method. The algorithm supports priority, the feature important for current middleware technologies.
Data replication in distributed databases has been investigated extensively with the hope that it will improve performance, reliability, and availability. However, the growth of the Internet has shown its that current...
详细信息
ISBN:
(纸本)0769515851
Data replication in distributed databases has been investigated extensively with the hope that it will improve performance, reliability, and availability. However, the growth of the Internet has shown its that current replica management do not work well when the replicas are connected by an unreliable network, subject to congestion and dynamic topology changes. In this paper we present a replica update protocol that handles an adaptive partial replication scheme on such a network.
暂无评论