An efficient adaptive failure detection mechanism for cloud platform based on volterra series

2014 ◽  
Vol 11 (4) ◽  
pp. 1-12 ◽  
Author(s):  
Lin Rongheng ◽  
Wu Budan ◽  
Yang Fangchun ◽  
Zhao Yao ◽  
Hou Jinxuan

The distributed computing is the buzz in recent past, cloud computing stands first in this category. This is since, the users can adapt anything related to data storage, magnificent computing facilities on a system with less infrastructure from anywhere at any time. On other dimension such public and private cloud computing strategies would also attracts the foul players to perform intrusion practices. This is since, the comfortability that the cloud platform providing to end users intends them to adapt these services in regard to save or compute the sensitive data. The scope of vulnerability to breach the data or services over cloud computing is more frequent and easier, which is since, these services relies on internet protocol. In this regard, the research in intrusion detection defense mechanisms is having prominent scope. This manuscript, projecting a novel intrusion detection mechanism called "calibration factors-based intrusion detection (CFID)" for cloud computing networks. The experimental study portrayed the significant scope of the proposal CFID to detect the intrusion activities listed as remoteto-Local, Port Scanning, and Virtual-Machine-Trapping.


2006 ◽  
Vol 5 (5) ◽  
pp. 1180-1186 ◽  
Author(s):  
H.-N. Hung ◽  
Y.-B. Lin ◽  
N.-F. Peng ◽  
S.-I. Sou

Author(s):  
Faisal Shahzad ◽  
Moritz Kreutzer ◽  
Thomas Zeiser ◽  
Rui Machado ◽  
Andreas Pieper ◽  
...  

Today’s high performance computing systems are made possible by multiple increases in hardware parallelity. This results in the decrease of mean time to failures of the systems with each newer generation, which is an alarming trend. Therefore, it is not surprising that a lot of research is going on in the area of fault tolerance and fault mitigation. Applications should survive a failure and/or be able to recover with minimal cost. We have used Global Address Space Programming Interface (GASPI), which is a relatively new communication library based on the PGAS model. It fulfills the basic requirement of a fault tolerant communication library, i.e. the failure of a process does not cause the remaining processes to fail. This work is focused on extending the fault tolerance features of GASPI in the form of a supporting health-check library that applications can benefit from. These features include failure detection, its information propagation, recovery management, communication recovery, etc. To reinforce its utility, we have also developed a fault tolerant neighbor node-level checkpoint/restart library. Instead of introducing algorithm-based fault tolerance in its true sense, we demonstrate how (using these supplementary fault tolerance functions) one can build applications to allow integrate a low cost fault detection/recovery mechanism and, if necessary, recover the application on the fly. We showcase the usage of these tools by implementing them in three different applications. Two of the applications fall in the category of linear sparse solvers, whereas the third application is based on a fluid flow solver. We also analyze the overheads involved in failure-free cases as well as various failure cases. Our fault detection mechanism causes no overhead in failure-free cases, whereas in case of failure(s), the failure detection and recovery cost is of reasonably acceptable order and shows good scalability.


IoT applications are becoming widespread in monitoring and managing critical infrastructure. Many attacks have been demonstrated in the state-of-the-art on IoT resources. These attacks make use of vulnerabilities present in various connected systems and the Internet of Things (IoT). The state-of-the-art presents many approaches to detect and mitigate such attacks on IoT resources. The early attack detection mechanism is essential to prevent damage to the IoT system and human. This paper presents an algorithm for early detection of attacks on IoT resources through use of predictive descriptor tables. Effectiveness of the proposed algorithm is evaluated through experimental setup built using Google cloud platform. Experimental results show that the proposed algorithm is efficient in the detection of attacks in real-time.


Sign in / Sign up

Export Citation Format

Share Document