Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Cloud computing

Computer Sciences

2021

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

A Novel Data Placement Strategy To Reduce Data Traffic During Run-Time, Sridevi Sridhar, Rhymend Uthariaraj Vaidyanathan Jan 2021

A Novel Data Placement Strategy To Reduce Data Traffic During Run-Time, Sridevi Sridhar, Rhymend Uthariaraj Vaidyanathan

Turkish Journal of Electrical Engineering and Computer Sciences

High impact scientific applications processed in distributed data centers often involve big data. To avoid the intolerable delays due to huge data movements across data centers during processing, the concept of moving tasks to data was introduced in the last decade. Even after the realization of this concept termed as data locality, the expected quality of service was not achieved. Later, data colocality was introduced where data groupings were identified and then data chunks were placed wisely. However, the aspect of the expected data traffic during run time is generally not considered while placing data. To identify the expected data …


Distributed Denial Of Service Attack Detection In Cloud Computing Using Hybridextreme Learning Machine, Gopal Singh Kushwah, Virender Ranga Jan 2021

Distributed Denial Of Service Attack Detection In Cloud Computing Using Hybridextreme Learning Machine, Gopal Singh Kushwah, Virender Ranga

Turkish Journal of Electrical Engineering and Computer Sciences

One of the major security challenges in cloud computing is distributed denial of service (DDoS) attacks. In these attacks, multiple nodes are used to attack the cloud by sending huge traffic. This results in the unavailability of cloud services to legitimate users. In this research paper, a hybrid machine learning-based technique has been proposed to detect these attacks. The proposed technique is implemented by combining the extreme learning machine (ELM) model and the blackhole optimization algorithm. Various experiments have been performed with the help of four benchmark datasets namely, NSL KDD, ISCX IDS 2012, CICIDS2017, and CICDDoS2019, to evaluate the …