The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Server consolidation using virtual machines (VMs) makes it difficult to execute processes as the administrators intend. A process scheduler in each VM is not aware of the other VM and schedules only processes in one VM independently. To solve this problem, process scheduling across VMs is necessary. However, such system-wide scheduling is vulnerable to denial-of-service (DoS) attacks from a compromised...
Malicious web pages that launch client-side attacks on web browsers have became a severe threat in today's Internet. High-interaction client honeypots are security devices that detect these malicious web pages on a network. However, high-interaction client honeypots are not good enough for detecting malicious web pages, especially for web pages carrying rootkit which is used to hide the presence of...
Clouds are complex systems subject to an increasing number of anomalies and threats. In this paper we briefly revisit the issues related to Windows guest cloud service resilience and later provide some preliminary results on the resilience of Windows cloud guests via virtualization. In particular, we propose an architecture, Cloud Resilience for Windows (CReW). CReW can transparently monitor guest...
A number of studies have examined anomaly detection systems based on training of system call sequences in the normal execution of applications. However, many of these anomaly detection systems have low detection accuracy when the training is not sufficient. This occurs because the normal behavior data obtained through training on one machine cannot be used for detection on another machine. In this...
In this paper, a novel lightweight anomaly and fault detection infrastructure called anomaly detection by resource monitoring (Ayaka) is presented for information appliances. Ayaka provides a general monitoring method for detecting anomalies using only resource usage information on systems independent of its domain, target application, and programming languages. Ayaka modifies the kernel to detect...
In this paper, Anomaly Detection by Resource Monitoring (Ayaka), a novel lightweight anomaly and fault detection infrastructure, is presented for Information Appliances. Ayaka provides a general monitoring method for detecting anomalies using only resource usage information on systems independent of its domain, target application and programming languages. Ayaka modifies the kernel to detect faults...
Cluster system can be considered as a solution when high performance system is deployed because cluster system can provide the high performance, mass storage, scalability and so on with relative low cost in comparison with super computer system. For the trusted service against various malicious attacks, the trusted operational environment is very critical in order to guarantee that their services...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.