System logs record detailed information about system operation and areimportant for analyzing the system's operational status and performance. Rapidand accurate detection of system anomalies is of great significan...
详细信息
System logs record detailed information about system operation and areimportant for analyzing the system's operational status and performance. Rapidand accurate detection of system anomalies is of great significance to ensure system stability. However, large-scale distributed systems are becoming more andmore complex, and the number of system logs gradually increases, which bringschallenges to analyze system logs. Some recent studies show that logs can beunstable due to the evolution of log statements and noise introduced by log collection and parsing. Moreover, deep learning-based detection methods take a longtime to train models. Therefore, to reduce the computational cost and avoid loginstability we propose a new Word2Vec-based log unsupervised anomaly detection method (LogUAD). LogUAD does not require a log parsing step and takesoriginal log messages as input to avoid the noise. LogUAD uses Word2Vec togenerate word vectors and generates weighted log sequence feature vectors withTF-IDF to handle the evolution of log statements. At last, a computationally effi-cient unsupervised clustering is exploited to detect the anomaly. We conductedextensive experiments on the public dataset from Blue Gene/L (BGL). Experimental results show that the F1-score of LogUAD can be improved by 67.25%compared to LogCluster.
The term "cloud computing" refers to a vast network of linked, virtually hosted, and easily updatable computer resources. That are capable of consisting of a number of different apps and offering a number of...
详细信息
ISBN:
(纸本)9789819776023
The term "cloud computing" refers to a vast network of linked, virtually hosted, and easily updatable computer resources. That are capable of consisting of a number of different apps and offering a number of different services to customers, and that have the potential to do so. Customers are required to pay for the cost of using the Services in accordance with the company's "pay-for-use only" policy. However, there are certain firms, such as Google Inc, that provide customers with particular free storage space even though the services provided by the company are limited, specifically with regard to the public cloud. A third-party service provider frequently owns and maintains the infrastructure required to run cloud computing services. But because more and more data and files pertaining to individuals and businesses are being stored in the cloud, worries have started to grow about how safe it actually is. Among these are the protection of software for virtualization and distributed computing, the safety of application software, the administration of identities, and the authentication and restriction of access. Nevertheless, efficient user authentication is the most essential need of cloud computing, as it limits unauthorized usage of a cloud server. Cloud computing has become increasingly popular in recent years. In this research, we present a new authentication method between users and online computing systems that is based on the suggested secure hash algorithm (SHA-3) and makes use of the lightweight Sosemanuk method. We created this technique. That system is going to be known as the SoSha3 system. The design that has been proposed for the system deals with data in three different sizes: 128, 256, and 512 bits. In order to make these authentication systems suitable for cloud computing at high rates, some modifications were made to them. The three-dimensional chaotic system, also known as the Lorenz system, will be combined with the authentication architecture tha
Mobile edge cloud (MEC) has emerged as a critical technology for enabling low-latency and real-time mobile device applications. However, an efficient resource allocation framework for improving the user experience in ...
详细信息
In this paper, we study the intricate realm of digital twin synchronization and deployment in multi-access edge computing (MEC) networks, with the aim of optimizing and balancing the two performance metrics Age of Inf...
详细信息
Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unn...
详细信息
Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unnecessary operational cost and enhance manufacturing and other industrial-relatedprocesses to attain more profits. However, such IoT based smart industriesneed internet connectivity and interoperability which makes them susceptibleto numerous cyber-attacks due to the scarcity of computational resourcesof IoT devices and communication over insecure wireless channels. Therefore, this necessitates the design of an efficient security mechanism for IIoTenvironment. In this paper, we propose a hyperelliptic curve cryptography(HECC) based IIoT Certificateless Signcryption (IIoT-CS) scheme, with theaim of improving security while lowering computational and communicationoverhead in IIoT environment. HECC with 80-bit smaller key and parameterssizes offers similar security as elliptic curve cryptography (ECC) with 160-bitlong key and parameters sizes. We assessed the IIoT-CS scheme security byapplying formal and informal security evaluation techniques. We used Realor Random (RoR) model and the widely used automated validation of internet security protocols and applications (AVISPA) simulation tool for formalsecurity analysis and proved that the IIoT-CS scheme provides resistance tovarious attacks. Our proposed IIoT-CS scheme is relatively less expensivecompared to the current state-of-the-art in terms of computational cost andcommunication overhead. Furthermore, the IIoT-CS scheme is 31.25% and 51.31% more efficient in computational cost and communication overhead,respectively, compared to the most recent protocol.
There are quintillions of data on deoxyribonucleic acid(DNA)and protein in publicly accessible data banks,and that number is expanding at an exponential *** scientific fields,such as bioinformatics and drug discovery,...
详细信息
There are quintillions of data on deoxyribonucleic acid(DNA)and protein in publicly accessible data banks,and that number is expanding at an exponential *** scientific fields,such as bioinformatics and drug discovery,rely on such data;nevertheless,gathering and extracting data from these resources is a tough *** data should go through several processes,including mining,data processing,analysis,and *** study proposes software that extracts data from big data repositories automatically and with the particular ability to repeat data extraction phases as many times as needed without human *** software simulates the extraction of data from web-based(point-and-click)resources or graphical user interfaces that cannot be accessed using command-line *** software was evaluated by creating a novel database of 34 parameters for 1360 physicochemical properties of antimicrobial peptides(AMP)sequences(46240 hits)from various MARVIN software panels,which can be later utilized to develop novel ***,for machine learning research,the program was validated by extracting 10,000 protein tertiary structures from the Protein Data *** a result,data collection from the web will become faster and less expensive,with no need for manual data *** software is critical as a first step to preparing large datasets for subsequent stages of analysis,such as those using machine and deep-learning applications.
The expansion of the internet of things (IoT) and Big Data are two factors that have contributed to the rise in popularity of smart cities. The ability to anticipate the quality of the air in an area with precision an...
详细信息
The computer has seen significant evolution in recent years, with applications in variety of disciplines like Machine Learning, Deep Learning etc. Machine Translation (MT) technology has advanced significantly as a su...
详细信息
Software development companies commonly use Global Software Development (GSD) in their industry. A competent Scrum team supports the success of the GSD project. This research aims to identify the game components in th...
详细信息
This research uses a new proposed multi-objective optimization algorithm that utilizes an untested combined chaotic map to integrate Customized Mutated PSO (CM-PSO) with a Modified Genetic Algorithm (MGA) to design an...
详细信息
暂无评论