期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Trusted Heartbeat Framework for Cloud Computing 被引量:1
1
作者 Dipen Contractor dhiren patel Shreya patel 《Journal of Information Security》 2016年第3期103-111,共9页
In cloud computing environment, as the infrastructure not owned by users, it is desirable that its security and integrity must be protected and verified time to time. In Hadoop based scalable computing setup, malfunct... In cloud computing environment, as the infrastructure not owned by users, it is desirable that its security and integrity must be protected and verified time to time. In Hadoop based scalable computing setup, malfunctioning nodes generate wrong output during the run time. To detect such nodes, we create collaborative network between worker node (i.e. data node of Hadoop) and Master node (i.e. name node of Hadoop) with the help of trusted heartbeat framework (THF). We propose procedures to register node and to alter status of node based on reputation provided by other co-worker nodes. 展开更多
关键词 Trusted Heartbeat Cloud Computing Hadoop Framework REPUTATION Attestation
下载PDF
Evaluation of Modified Vector Space Representation Using ADFA-LD and ADFA-WD Datasets 被引量:3
2
作者 Bhavesh Borisaniya dhiren patel 《Journal of Information Security》 2015年第3期250-264,共15页
Predicting anomalous behaviour of a running process using system call trace is a common practice among security community and it is still an active research area. It is a typical pattern recognition problem and can be... Predicting anomalous behaviour of a running process using system call trace is a common practice among security community and it is still an active research area. It is a typical pattern recognition problem and can be dealt with machine learning algorithms. Standard system call datasets were employed to train these algorithms. However, advancements in operating systems made these datasets outdated and un-relevant. Australian Defence Force Academy Linux Dataset (ADFA-LD) and Australian Defence Force Academy Windows Dataset (ADFA-WD) are new generation system calls datasets that contain labelled system call traces for modern exploits and attacks on various applications. In this paper, we evaluate performance of Modified Vector Space Representation technique on ADFA-LD and ADFA-WD datasets using various classification algorithms. Our experimental results show that our method performs well and it helps accurately distinguishing process behaviour through system calls. 展开更多
关键词 System Call Trace VECTOR SPACE Model MODIFIED VECTOR SPACE REPRESENTATION ADFA-LD ADFA-WD
下载PDF
A Quantitative Analysis of Collision Resolution Protocol for Wireless Sensor Network
3
作者 Reema patel dhiren patel 《Journal of Software Engineering and Applications》 2015年第8期361-371,共11页
In this paper, we present formal analysis of 2CS-WSN collision resolution protocol for wireless sensor networks using probabilistic model checking. The 2CS-WSN protocol is designed to be used during the contention pha... In this paper, we present formal analysis of 2CS-WSN collision resolution protocol for wireless sensor networks using probabilistic model checking. The 2CS-WSN protocol is designed to be used during the contention phase of IEEE 802.15.4. In previous work on 2CS-WSN analysis, authors formalized protocol description at abstract level by defining counters to represent number of nodes in specific local state. On abstract model, the properties specifying individual node behavior cannot be analyzed. We formalize collision resolution protocol as a Markov Decision Process to express each node behavior and perform quantitative analysis using probabilistic model checker PRISM. The identical nodes induce symmetry in the reachable state space which leads to redundant search over equivalent areas of the state space during model checking. We use “ExplicitPRISMSymm” on-the-fly symmetry reduction approach to prevent the state space explosion and thus accommodate large number of nodes for analysis. 展开更多
关键词 Wireless Sensor Network COLLISION Resolution PROTOCOL PROBABILISTIC Model CHECKING SYMMETRY Reduction
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部