The interest in selecting an appropriate cloud data center is exponentially increasing due to the popularity and continuous growth of the cloud computing sector.Cloud data center selection challenges are compounded by...The interest in selecting an appropriate cloud data center is exponentially increasing due to the popularity and continuous growth of the cloud computing sector.Cloud data center selection challenges are compounded by ever-increasing users’requests and the number of data centers required to execute these requests.Cloud service broker policy defines cloud data center’s selection,which is a case of an NP-hard problem that needs a precise solution for an efficient and superior solution.Differential evolution algorithm is a metaheuristic algorithm characterized by its speed and robustness,and it is well suited for selecting an appropriate cloud data center.This paper presents a modified differential evolution algorithm-based cloud service broker policy for the most appropriate data center selection in the cloud computing environment.The differential evolution algorithm is modified using the proposed new mutation technique ensuring enhanced performance and providing an appropriate selection of data centers.The proposed policy’s superiority in selecting the most suitable data center is evaluated using the CloudAnalyst simulator.The results are compared with the state-of-arts cloud service broker policies.展开更多
Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches.However,the current approaches have challenges...Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches.However,the current approaches have challenges in detecting intrusions,which may affect the performance of the overall detection system as well as network performance.For the time being,one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology.Blockchain technology moves in the direction of persistent revolution and change.It is a chain of blocks that covers information and maintains trust between individuals no matter how far apart they are.Recently,blockchain was integrated into intrusion detection systems to enhance their overall performance.Blockchain has also been adopted in health-care,supply chain management,and the Internet of Things.Blockchain uses robust cryptography with private and public keys,and it has numerous properties that have leveraged security’s performance over peer-to-peer networks without the need for a third party.To explore and highlight the importance of integrating blockchain with intrusion detection systems,this paper provides a comprehensive background of intrusion detection systems and blockchain technology.Furthermore,a comprehensive review of emerging intrusion detection systems based on blockchain technology is presented.Finally,this paper suggests important future research directions and trending topics in intrusion detection systems based on blockchain technology.展开更多
基金This work was supported by Universiti Sains Malaysia under external grant(Grant Number 304/PNAV/650958/U154).
文摘The interest in selecting an appropriate cloud data center is exponentially increasing due to the popularity and continuous growth of the cloud computing sector.Cloud data center selection challenges are compounded by ever-increasing users’requests and the number of data centers required to execute these requests.Cloud service broker policy defines cloud data center’s selection,which is a case of an NP-hard problem that needs a precise solution for an efficient and superior solution.Differential evolution algorithm is a metaheuristic algorithm characterized by its speed and robustness,and it is well suited for selecting an appropriate cloud data center.This paper presents a modified differential evolution algorithm-based cloud service broker policy for the most appropriate data center selection in the cloud computing environment.The differential evolution algorithm is modified using the proposed new mutation technique ensuring enhanced performance and providing an appropriate selection of data centers.The proposed policy’s superiority in selecting the most suitable data center is evaluated using the CloudAnalyst simulator.The results are compared with the state-of-arts cloud service broker policies.
基金This work was supported by Universiti Sains Malaysia under external grant(Grant number 304/PNAV/650958/U154).
文摘Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches.However,the current approaches have challenges in detecting intrusions,which may affect the performance of the overall detection system as well as network performance.For the time being,one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology.Blockchain technology moves in the direction of persistent revolution and change.It is a chain of blocks that covers information and maintains trust between individuals no matter how far apart they are.Recently,blockchain was integrated into intrusion detection systems to enhance their overall performance.Blockchain has also been adopted in health-care,supply chain management,and the Internet of Things.Blockchain uses robust cryptography with private and public keys,and it has numerous properties that have leveraged security’s performance over peer-to-peer networks without the need for a third party.To explore and highlight the importance of integrating blockchain with intrusion detection systems,this paper provides a comprehensive background of intrusion detection systems and blockchain technology.Furthermore,a comprehensive review of emerging intrusion detection systems based on blockchain technology is presented.Finally,this paper suggests important future research directions and trending topics in intrusion detection systems based on blockchain technology.