期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Amazon Web Services(AWS)云平台可靠性技术研究 被引量:5
1
作者 刘义颖 《电脑知识与技术》 2014年第11X期8030-8031,8033,共3页
目前软件应用广泛,对软件可靠性要求越来越高。近几年云计算技术的研究逐渐增多,对于云平台的可靠性技术也有了新的要求。Amazon Web Services(AWS)提供了一整套云计算服务,用户能够构建复杂、可扩展的应用程序。AWS在最小成本情况下,... 目前软件应用广泛,对软件可靠性要求越来越高。近几年云计算技术的研究逐渐增多,对于云平台的可靠性技术也有了新的要求。Amazon Web Services(AWS)提供了一整套云计算服务,用户能够构建复杂、可扩展的应用程序。AWS在最小成本情况下,为用户提供了一套构建容错的软件系统平台。在技术和性能等多方面的优势,被业界广泛认可和接受。该文主要研究Amazon Web Services云平台中的核心组件是如何提供可靠性技术的,分别对核心组件Amazon EC2,Amazon Simple Storage(S3),Elastic Storage Block(EBS),Elastic Load Balancing,Auto Scaling进行研究分析,为以后云计算平台的搭建和可靠性技术的研究提供依据。 展开更多
关键词 amazon web services(AWS) 可靠性技术 灵活性 伸缩性
下载PDF
Check Point凭借Amazon Web Service携安全解决方案进军云计算安全市场
2
《信息通信技术》 2012年第1期13-13,共1页
2012年1月,Check Point软件技术有限公司(Nasdaq:CHKP)宣布,现在客户可通过Amazon Web Service获得Check Point的安全网关。企业通过它可以在云上实现高安全性,或采用Check Point防火墙、入侵防护、应用控制(Application Control)、URL... 2012年1月,Check Point软件技术有限公司(Nasdaq:CHKP)宣布,现在客户可通过Amazon Web Service获得Check Point的安全网关。企业通过它可以在云上实现高安全性,或采用Check Point防火墙、入侵防护、应用控制(Application Control)、URL过滤等刀片来获得全面保护。 展开更多
关键词 云计算安全 安全解决方案 amazon web service Check Point
下载PDF
Self-Tuning Parameters for Decision Tree Algorithm Based on Big Data Analytics
3
作者 Manar Mohamed Hafez Essam Eldin F.Elfakharany +1 位作者 Amr A.Abohany Mostafa Thabet 《Computers, Materials & Continua》 SCIE EI 2023年第4期943-958,共16页
Big data is usually unstructured, and many applications require theanalysis in real-time. Decision tree (DT) algorithm is widely used to analyzebig data. Selecting the optimal depth of DT is time-consuming process as ... Big data is usually unstructured, and many applications require theanalysis in real-time. Decision tree (DT) algorithm is widely used to analyzebig data. Selecting the optimal depth of DT is time-consuming process as itrequires many iterations. In this paper, we have designed a modified versionof a (DT). The tree aims to achieve optimal depth by self-tuning runningparameters and improving the accuracy. The efficiency of the modified (DT)was verified using two datasets (airport and fire datasets). The airport datasethas 500000 instances and the fire dataset has 600000 instances. A comparisonhas been made between the modified (DT) and standard (DT) with resultsshowing that the modified performs better. This comparison was conductedon multi-node on Apache Spark tool using Amazon web services. Resultingin accuracy with an increase of 6.85% for the first dataset and 8.85% for theairport dataset. In conclusion, the modified DT showed better accuracy inhandling different-sized datasets compared to standard DT algorithm. 展开更多
关键词 Big data classification decision tree amazon web services
下载PDF
A Proposed Architecture for Local-Host and AWS with Multiagent System
4
作者 Jaspreet Chawla Anil Kr Ahlawat 《Intelligent Automation & Soft Computing》 SCIE 2023年第6期2787-2802,共16页
Cloud computing has become one of the leading technologies in the world today.The benefits of cloud computing affect end users directly.There are several cloud computing frameworks,and each has ways of monitoring and ... Cloud computing has become one of the leading technologies in the world today.The benefits of cloud computing affect end users directly.There are several cloud computing frameworks,and each has ways of monitoring and providing resources.Cloud computing eliminates customer requirements such as expensive system configuration and massive infrastructure while improving dependability and scalability.From the user’s perspective,cloud computing makes it easy to upload multiagents and operate on different web services.In this paper,the authors used a restful web service and an agent system to discuss,deployments,and analysis of load performance parameters like memory use,cen-tral processing unit(CPU)utilization,network latency,etc.,both on localhost and an Amazon Web Service Elastic Cloud Computing(AWS-EC2)server.The Java Agent Development Environment(JADE)tool has been used to propose an archi-tecture and conduct a comparative study on both local and remote servers.JADE is an open-source tool for maintaining applications on AWS infrastructure.The focus of the study should be to reduce the complexity and time of load perfor-mance parameters by using an agent system on a cloud server instead of establish-ing a massive infrastructure on a local system,even for a small application. 展开更多
关键词 amazon web service JADE local host rest web service
下载PDF
Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers 被引量:1
5
作者 Sai Kiran Mukkavilli Sachin Shetty Liang Hong 《Journal of Information Security》 2016年第3期172-184,共13页
Anomaly based approaches in network intrusion detection suffer from evaluation, comparison and deployment which originate from the scarcity of adequate publicly available network trace datasets. Also, publicly availab... Anomaly based approaches in network intrusion detection suffer from evaluation, comparison and deployment which originate from the scarcity of adequate publicly available network trace datasets. Also, publicly available datasets are either outdated or generated in a controlled environment. Due to the ubiquity of cloud computing environments in commercial and government internet services, there is a need to assess the impacts of network attacks in cloud data centers. To the best of our knowledge, there is no publicly available dataset which captures the normal and anomalous network traces in the interactions between cloud users and cloud data centers. In this paper, we present an experimental platform designed to represent a practical interaction between cloud users and cloud services and collect network traces resulting from this interaction to conduct anomaly detection. We use Amazon web services (AWS) platform for conducting our experiments. 展开更多
关键词 amazon web services Anomaly Detection Cloud Computing Datasets Intrusion Detection Network Traces
下载PDF
Smart Object Detection and Home Appliances Control System in Smart Cities
6
作者 Sulaiman Khan Shah Nazir Habib Ullah Khan 《Computers, Materials & Continua》 SCIE EI 2021年第4期895-915,共21页
During the last decade the emergence of Internet of Things(IoT)based applications inspired the world by providing state of the art solutions to many common problems.From traffic management systems to urban cities plan... During the last decade the emergence of Internet of Things(IoT)based applications inspired the world by providing state of the art solutions to many common problems.From traffic management systems to urban cities planning and development,IoT based home monitoring systems,and many other smart applications.Regardless of these facilities,most of these IoT based solutions are data driven and results in small accuracy values for smaller datasets.In order to address this problem,this paper presents deep learning based hybrid approach for the development of an IoT-based intelligent home security and appliance control system in the smart cities.This hybrid model consists of;convolution neural network and binary long short term model for the object detection to ensure safety of the homes while IoT based hardware components like;Raspberry Pi,Amazon Web services cloud,and GSM modems for remotely accessing and controlling of the home appliances.An android application is developed and deployed on Amazon Web Services(AWS)cloud for the remote monitoring of home appliances.A GSM device and Message queuing telemetry transport(MQTT)are integrated for communicating with the connected IoT devices to ensure the online and offline communication.For object detection purposes a camera is connected to Raspberry Pi using the proposed hybrid neural network model.The applicability of the proposed model is tested by calculating results for the object at varying distance from the camera and for different intensity levels of the light.Besides many applications the proposed model promises for providing optimum results for the small amount of data and results in high recognition rates of 95.34%compared to the conventional recognition model(k nearest neighbours)recognition rate of 76%. 展开更多
关键词 Hybrid deep learning model IOT smart cities home appliances control system and amazon web services
下载PDF
Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System 被引量:8
7
作者 Zhen Chen Fuye Han +2 位作者 Junwei Cao Xin Jiang Shuo Chen 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第1期40-50,共11页
Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bot... Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bots that generate huge volumes of spam or launch Distributed Denial of Service (DDoS) attacks on victim hosts. New emerging botnet attacks degrade the status of Internet security further. To address these problems, a practical collaborative network security management system is proposed with an effective collaborative Unified Threat Management (UTM) and traffic probers. A distributed security overlay network with a centralized security center leverages a peer-to-peer communication protocol used in the UTMs collaborative module and connects them virtually to exchange network events and security rules. Security functions for the UTM are retrofitted to share security rules. In this paper, we propose a design and implementation of a cloud-based security center for network security forensic analysis. We propose using cloud storage to keep collected traffic data and then processing it with cloud computing platforms to find the malicious attacks. As a practical example, phishing attack forensic analysis is presented and the required computing and storage resources are evaluated based on real trace data. The cloud- based security center can instruct each collaborative UTM and prober to collect events and raw traffic, send them back for deep analysis, and generate new security rules. These new security rules are enforced by collaborative UTM and the feedback events of such rules are returned to the security center. By this type of close-loop control, the collaborative network security management system can identify and address new distributed attacks more quickly and effectively. 展开更多
关键词 cloud computing overlay network collaborative network security system computer forensics anti-botnet ANTI-PHISHING hadoop file system eucalyptus amazon web service
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部