Learn More
Cloud Computing is a technology which is susceptible to a continuous development, because of its strong advantages of accessing data from any place in the world over the Internet without concerning about the infrastructure used and the problems involved by the installation and maintenance processes. The purpose of this article is to provide an overview of(More)
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks appear to be main threats for cloud computing. The protection of cloud services against DoS and DDoS attacks is realized using Intrusion Detection Systems (IDSs).This paper aims to evaluate the experimental results of our proposed quantitative solution. The experiments are performed in(More)
For real-time applications, task scheduling is a problem of paramount importance. Several scheduling algorithms were proposed in the literature, starting from static scheduling or cyclic executives which provide very deterministic yet inflexible behaviour, to the so called best-effort scheduling , which facilitates maximum run-time flexibility but allows(More)
The problem of deriving association rules from data was first formulated in [9] and is called the “market-basket problem”. This paper presents an efficient version of APRIORI algorithm for mining multi-level association rules in large databases to solve market-basket problem. Our algorithm, named DEPTH FIRST MULTI-LEVEL APRIORI (DFMLA), uses(More)
Cloud computing has become one of the most demanding services over the internet. It has gained remarkable fame for past few years. But it is under the severe threats of internet security. One of the severe threats is Distributed Denial of Service (DDoS). DDoS occurs when a huge amount of packets are sent to a server from various computers. Botnet is one of(More)
In fact the mission for a danger control system consists of several phases. The system configuration, operational requirements for individual components, success criteria and stress on the components, can change from phase to phase. Furthermore, the duration of any phase can use deterministic or random models. All these changes and possibilities affect the(More)
Grid is a hardware and software infrastructure which allows the sharing of flexible, secure and coordinated resources among dynamic collections of individuals, organizations and resources. The resources that are utilized in a Grid network are complex. There could be computing resources (PDA, PCs, workstations, servers, and clusters), storage resources(More)