The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network function virtualization (NFV) has drawn much attention in recent years, where some network functions that used to be deployed on specific hardware have become virtualized instances on general servers to achieve more scalability and flexibility. In a data center, service function chaining (SFC) makes a workflow traverse different network functions in a specific order to provide different levels...
In precise real-time systems, scheduling algorithms without considerable complexity are more effective to be applied. Virtual release advancing [3] for shorter response times is a technique that is valuable for the Earliest Deadline First (EDF) scheduling, but not adaptive to precise systems due to its high time complexity. A new scheduling algorithm, called enhanced virtual release advancing, that...
Low-rate Denial of Service (LDoS) attack is one of great threats to computing platform and big data center. LDoS attacks are difficult to be found because its average attack rate is low enough to evade traditional DoS-based countermeasures. In this paper, the propagation back (BP) model of neural network is used to establish the nonlinear model of network traffic, and a method of LDoS attacks detection...
A novel algorithm named Missing-Rate-Oriented Selective (MROS) algorithm - including: Most-Similar (M-S) algorithm and Attribute-Selective Imputation (ASI) approach-is proposed to achieve effective Mean Identification Rate (MIR) with minimal imputation effort for multi-classification systems in a complex and High Missing Rate (HMR) dataset. This dataset was developed from real server power supply...
The sharing of components of a cloud-hosted application and the underlying cloud resources between tenants have the potential to reduce resource consumption and running cost per tenant. However, this sharing may allow the behaviour of one component to affect the performance, resource consumption and access privileges of other components, for example, if the application fails to scale-up when the workload...
An asymmetric secret sharing scheme (A-SSS) can set the number of servers at less than k, because it makes up to k-1 shares from one key of the owner of the secret. Therefore, the secret is not revealed even if all the servers are attacked. However, when the owner's key is stolen and attacked, shares may be leaked. Therefore, in this paper we propose a proactive secret sharing scheme suitable for...
Messages traversing a network commonly experience waiting times due to sharing the forwarding resources. During those times, the crossed systems must provide sufficient buffer space for queueing messages. Network Calculus (NC) is a mathematical methodology for bounding flow delays and system buffer requirements. The accuracy of these performance bounds depends mainly on two factors: the principles...
Signaling related attacks, such as the signaling storms, threaten the stability of mobile networks and are a frequent cause of multiple service degradations and even several network outages. This paper proposes a performance evaluation approach to the problem using techniques from probability theory, in general Markov Chains and queueing networks. It proposes a model of a mobile network under signaling...
The process of building remote or virtual laboratories to be deployed via Internet usually involves communication between different software tools. Very often, there is a separation between the software which interfaces with the model or real system, and the software responsible of providing the student with an interactive and visual representation of the data provided by the engineering system. Abstracting...
This paper addresses the problem of Data Centers (DC) energy efficiency by proposing a complex consolidation technique which aims at optimizing the DC operation such that both the IT equipment power consumption and cooling system power consumption is minimized. The paper presents a thermo-electrical DC model that defines the relation between the server utilization due to VM deployment, the server...
Data Center (DC) servers consume a huge amount of energy. However, a part of this energy (cooling and information technology devices) can be saved by shutting down racks containing idle servers. This can be achieved by rerouting workloads from partially loaded racks, and thus allowing additional racks to switch into idle mode. Workload rerouting requires additional wired links or by optical wireless...
The messages can be exchanged in a fair manner if after the protocol, both exchanging parties can simultaneously obtain their desired messages or none of them can get useful information. Since the network communication is time consuming, the major approach for this issue is to develop a off-line trusted third party (off-line TTP) which gets involved into the exchange procedure only if at least one...
The codes for analysis and design of subway station circulation facilities neglect the important factors such as passenger flow randomness, state-dependent service time of circulation facilities, and passengers blocking when demand exceeds capacity. This paper proposes a new Discrete-Event Simulation (DES) method using Phase-Type distribution to analyze the performance of circulation facilities of...
The increasing trend in IT users and their needs for computational power in cloud data centers leads to noticeable growth in physical servers. It is a challenging issue which causes the dramatic burden of power consumption and the number of Physical machines. Virtualization is remarkable method for reducing the number of physical servers with appropriate processing performance and utilization. But,...
This study addresses the problem of joint optimization of both inventory and production processes for stochastic customer orders in the dynamic setting. Customer orders arrive at the inventory department dynamically, and each order contains multiple product types with random workloads. Necessary materials need to be drawn from inventory and later be utilized in the production department. A customer...
In this paper, we present Productive Puzzles, a novel puzzle mechanism for defending against Distributed Denial of Service (DDoS) attacks. Productive puzzles aim to use tasks from real applications and services — as opposed to repetitive cryptographic computations that only serve the security purpose — as the work to be completed by the client, therefore making meaningful use of the client resources...
In this paper, we present Productive Puzzles, a novel puzzle mechanism for defending against Distributed Denial of Service (DDoS) attacks. Productive puzzles aim to use tasks from real applications and services — as opposed to repetitive cryptographic computations that only serve the security purpose — as the work to be completed by the client, therefore making meaningful use of the client resources...
Cloud fault tolerance allows the cloud an ability to keep performing its functions correctly even if faults are occurring in the system. This becomes an important property that enables a complete system to continue functioning in the event of one or more faults for high availability of virtual machines or in life critical systems. A fault-tolerant design may allow the system to possibly function at...
In a distributed environment, one of the major concerns is authentication of remote users. In this sector, legitimate users are more powerful attackers. The remote systems working with password and smart card ensures authorised access. Smart card based remote user authentication schemes have been adopted due to their low computation cost and portability. In 2012, Wen and Li proposed an improved dynamic...
This paper discusses effect of bounded rationality on the systemic risks vs. economic performance tradeoff in large-scale networks operating under economic pressures. Existence of systemic risks in economically incentivized networked systems is demonstrated by recent numerous systemic failures in various critical large-scale networked infrastructures. Using ‘Complex System’ perspective, we consider...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.