The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network Function Virtualization is an emerging paradigm to allow the creation, at software level, of complex network services by composing simpler ones. However, this paradigm shift exposes network services to faults and bottlenecks in the complex software virtualization infrastructure they rely on. Thus, NFV services require effective anomaly detection systems to detect the occurrence of network...
Reliable management of modern cloud computing infrastructures is unrealizable without monitoring and analysis of a huge number of system indicators (metrics) as time series data stored in big databases. Efficient storage and processing of collected historical data from all "objects" of those infrastructures are technology challenges for this Big Data application. We propose a data compression...
Monitoring is a common requirement in everyday modern life, from anti-virus scanners on personal computers to securing large multinational systems' health and status. Such monitoring is a fundamental process which must be undertaken where resources are offered as a service as in the cloud, to make sure that the service has been delivered to meet all contractual obligations. However, with a dynamic...
This paper introduces an approach that handleswith the trustworthy cloud service selection issue in Cloudcomputing environments. Despite the fact that most of theexisting trust systems consider several QoS attributes for trustcomputing, none of them did consider the correlation that mayexist among these attributes. However, we demonstrate in thispaper that the integration of correlation between QoS...
We present a novel Cyber Security analytics framework. Wedemonstrate a comprehensive cyber security monitoring system toconstruct cyber security correlated events with feature selection toanticipate behaviour based on various sensors.
In this paper, we present an approach for automated profiling of cloud-based distributed applications. The failure dependencies within or between application nodes can be methodically elucidated by dynamically applying a series of unitary perturbations on the underlying computing resources. Each such perturbation in a node acts as a stimulus which propagates to performance meters of dependent nodes...
In this paper, we present EMaaS, for Event Management as a Service, a multi-tenant cloud service to outsource the management of monitoring events in the cloud. Furthermore, we provide a secure multi-party computation (SMC) protocol for complex monitoring event processing. The protocol is integrated to EMaaS and uses some properties of encryption schemes. Finally, we evaluate the protocol security,...
Data leakage has become a problem of epidemic proportions with very serious consequences for businesses and their customers. Experts warn that it is very difficult for organisations to avoid infiltration and that they should be prepared for such events. Proactive detection of ongoing attacks is therefore critically important. In this paper we describe the design and implementation of Peeper, a policy...
Information security management is a complicated task in cloud environment. Cloud service layers and multi-tenant architecture have created a complicated environment for developing and managing a monitoring and incident response environment in organizations. The main goal of this paper is to receive and analyze events from OpenStack environment. Events and system logs are received from OpenStack environment...
The large-scale dynamic cloud computing environment has raised great challenges for fault diagnosis in Web applications: First, fluctuating workloads cause traditional application models to change over time; second, modeling the behaviors of complex applications usually requires domain knowledge which is difficult to obtain; third, managing large-scale applications manually is impractical for operators...
Monitoring ultrascale systems such as Clouds requires collecting enormous amount of data by periodically reading metric values from a system. Current approaches tend to select a static frequency for sampling monitoring data. On one hand, over-sampling the data by collecting it at high frequencies results in data redundancy during steady runs of the system. On the other hand, under-sampling with low...
Numerous enterprises are migrating their applications onto cloud platforms to gain benefit from cloud computing technology. These applications are composed of several service components with complicated dependency structures, especially for network applications which commonly take serial collaboration of service components. We call a group of VMs belonging to the same application a VM family. Finding...
Certification of cloud services aims at increasing the trust of customers towards cloud services and providing comparability between cloud services. Applying the concept of certification to cloud services requires systems which continuously detect ongoing changes of the service and assess their impact on customer requirements. In this paper, we propose eight language classes for cloud service certification...
The large-scale dynamic cloud computing environment has raised great challenges for fault diagnosis in Web applications. First, fluctuating workloads cause traditional application models to change over time. Moreover, modeling the behaviors of complex applications always requires domain knowledge which is difficult to obtain. Finally, managing large-scale applications manually is impractical for operators...
In this paper, we conduct a detailed study characterizing the performance of multi-tier web applications on commercial cloud platforms and evaluate the potential of techniques to improve the resilience of such applications to performance fluctuations in the cloud. In contrast to prior works that have studied the performance of individual cloud services or that of compute-intensive scientific applications...
Nowadays, more and more applications are moving to cloud computing. How to deploy these applications optimally is a great challenge. Many cloud applications, such as scientific applications, are large-scale distributed systems that are deployed on a lot of distributed cloud nodes, and there are a lot of communications between these nodes. Therefore, taking the communication latency between cloud nodes...
Monitoring application performance over IT infrastructure is common practise for cloud providers, and is the foundation for ensuring the health of systems and quality of service for users. However, with the architecture of cloud computing allowing the allocation and provision of resources to be set at several layers, the scope for potential performance issues is increased and as a result increases...
This paper presents a cross-layer self-healing approach for Cloud computing environments, based on the Complex Event Processing method. It analyzes monitored events to detect performance-related problems and performs action to fix them without human intervention. Our proposal makes use of novel analysis rules, derived from a comprehensive study of the relationships between monitored metrics across...
The adaptation of a cloud infrastructure is an ongoing process. Cloud adaptation aims to provide the cloud infrastructure with the necessary computational resources to meet the agreed SLAs and, simultaneously, optimize the resources usage. In a cloud, the consumers are typically limited to the SLAs defined in advance with the cloud service provider. This creates a strong dependence in the cloud provider,...
Current advanced cloud infrastructure management solutions allow scheduling actions for dynamically changing the number of running virtual machines (VMs). This approach, however, does not guarantee that the scheduled number of VMs will properly handle the actual user generated workload, especially if the user utilization patterns will change. We propose using a dynamically generated scaling model...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.