CINXE.COM
Search results for: distributed denial of service
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: distributed denial of service</title> <meta name="description" content="Search results for: distributed denial of service"> <meta name="keywords" content="distributed denial of service"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="distributed denial of service" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="distributed denial of service"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 5533</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: distributed denial of service</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5533</span> DOS and DDOS Attacks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amin%20Hamrahi">Amin Hamrahi</a>, <a href="https://publications.waset.org/abstracts/search?q=Niloofar%20Moghaddam"> Niloofar Moghaddam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Denial of Service is for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Denial of Service (DoS) attacks have become a major threat to current computer networks. Many recent DoS attacks were launched via a large number of distributed attacking hosts in the Internet. These attacks are called distributed denial of service (DDoS) attacks. To have a better understanding on DoS attacks, this article provides an overview on existing DoS and DDoS attacks and major defense technologies in the Internet. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=denial%20of%20service" title="denial of service">denial of service</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20denial%20of%20service" title=" distributed denial of service"> distributed denial of service</a>, <a href="https://publications.waset.org/abstracts/search?q=traffic" title=" traffic"> traffic</a>, <a href="https://publications.waset.org/abstracts/search?q=flooding" title=" flooding"> flooding</a> </p> <a href="https://publications.waset.org/abstracts/6782/dos-and-ddos-attacks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6782.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">392</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5532</span> Vulnerable Paths Assessment for Distributed Denial of Service Attacks in a Cloud Computing Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Manas%20Tripathi">Manas Tripathi</a>, <a href="https://publications.waset.org/abstracts/search?q=Arunabha%20Mukhopadhyay"> Arunabha Mukhopadhyay</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In Cloud computing environment, cloud servers, sometimes may crash after receiving huge amount of request and cloud services may stop which can create huge loss to users of that cloud services. This situation is called Denial of Service (DoS) attack. In Distributed Denial of Service (DDoS) attack, an attacker targets multiple network paths by compromising various vulnerable systems (zombies) and floods the victim with huge amount of request through these zombies. There are many solutions to mitigate this challenge but most of the methods allows the attack traffic to arrive at Cloud Service Provider (CSP) and then only takes actions against mitigation. Here in this paper we are rather focusing on preventive mechanism to deal with these attacks. We analyze network topology and find most vulnerable paths beforehand without waiting for the traffic to arrive at CSP. We have used Dijkstra's and Yen’s algorithm. Finally, risk assessment of these paths can be done by multiplying the probabilities of attack for these paths with the potential loss. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title="cloud computing">cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=DDoS" title=" DDoS"> DDoS</a>, <a href="https://publications.waset.org/abstracts/search?q=Dijkstra" title=" Dijkstra"> Dijkstra</a>, <a href="https://publications.waset.org/abstracts/search?q=Yen%E2%80%99s%20k-shortest%20path" title=" Yen’s k-shortest path"> Yen’s k-shortest path</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20security" title=" network security"> network security</a> </p> <a href="https://publications.waset.org/abstracts/39915/vulnerable-paths-assessment-for-distributed-denial-of-service-attacks-in-a-cloud-computing-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39915.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">278</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5531</span> A Study of Issues and Mitigations on Distributed Denial of Service and Medical Internet of Things Devices</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Robin%20Singh">Robin Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Jing-Chiou%20Liou"> Jing-Chiou Liou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Internet of Things (IoT) devices are being used heavily as part of our everyday routines. Through improved communication and automated procedures, its popularity has assisted users in raising the quality of work. These devices are used in healthcare in order to better collect the patient’s data for their treatment. They are generally considered safe and secure. However, there is some possibility that some loopholes do exist which manufacturers do need to identify before some hacker takes advantage of them. For this study, we focused on two medical IoT devices which are pacemakers and hearing aids. The aim of this paper is to identify if there is any likelihood of these medical devices being hijacked and used as a botnet in Distributed Denial-Of Service attacks. Moreover, some mitigation strategies are being proposed to better secure <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=DDoS" title=" DDoS"> DDoS</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=medical%20devices" title=" medical devices"> medical devices</a> </p> <a href="https://publications.waset.org/abstracts/162394/a-study-of-issues-and-mitigations-on-distributed-denial-of-service-and-medical-internet-of-things-devices" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162394.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">86</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5530</span> SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Neda%20Seyyedi">Neda Seyyedi</a>, <a href="https://publications.waset.org/abstracts/search?q=Reza%20Berangi"> Reza Berangi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=VOIP%20networks" title="VOIP networks">VOIP networks</a>, <a href="https://publications.waset.org/abstracts/search?q=flooding%20attacks" title=" flooding attacks"> flooding attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=entropy" title=" entropy"> entropy</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20networks" title=" computer networks"> computer networks</a> </p> <a href="https://publications.waset.org/abstracts/28214/sip-flooding-attacks-detection-and-prevention-using-shannon-renyi-and-tsallis-entropy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28214.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">405</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5529</span> Towards a Security Model against Denial of Service Attacks for SIP Traffic</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arellano%20Karina">Arellano Karina</a>, <a href="https://publications.waset.org/abstracts/search?q=Diego%20Avila-Pes%C3%A1ntez"> Diego Avila-Pesántez</a>, <a href="https://publications.waset.org/abstracts/search?q=Leticia%20Vaca-C%C3%A1rdenas"> Leticia Vaca-Cárdenas</a>, <a href="https://publications.waset.org/abstracts/search?q=Alberto%20Arellano"> Alberto Arellano</a>, <a href="https://publications.waset.org/abstracts/search?q=Carmen%20Mantilla"> Carmen Mantilla</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Denial-of-Service%20SIP%20attacks" title="Denial-of-Service SIP attacks">Denial-of-Service SIP attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=MS-DoS-SIP" title=" MS-DoS-SIP"> MS-DoS-SIP</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20model" title=" security model"> security model</a>, <a href="https://publications.waset.org/abstracts/search?q=VoIP-SIP%20vulnerabilities" title=" VoIP-SIP vulnerabilities"> VoIP-SIP vulnerabilities</a> </p> <a href="https://publications.waset.org/abstracts/85955/towards-a-security-model-against-denial-of-service-attacks-for-sip-traffic" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/85955.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">203</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5528</span> Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Borhan%20Marzougui">Borhan Marzougui</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=IoT" title="IoT">IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=DDoS" title=" DDoS"> DDoS</a>, <a href="https://publications.waset.org/abstracts/search?q=attacks" title=" attacks"> attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=botnet" title=" botnet"> botnet</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=agents" title=" agents"> agents</a> </p> <a href="https://publications.waset.org/abstracts/90876/cooperative-agents-to-prevent-and-mitigate-distributed-denial-of-service-attacks-of-internet-of-things-devices-in-transportation-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90876.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">143</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5527</span> Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Farheen%20Tabassum">Farheen Tabassum</a>, <a href="https://publications.waset.org/abstracts/search?q=Shoab%20Ahmed%20Khan"> Shoab Ahmed Khan </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Distributed%20Denial-of-Service%20%28DDoS%29" title="Distributed Denial-of-Service (DDoS)">Distributed Denial-of-Service (DDoS)</a>, <a href="https://publications.waset.org/abstracts/search?q=Collaborative%20Intrusion%20Detection%20System%20%28CIDS%29" title=" Collaborative Intrusion Detection System (CIDS)"> Collaborative Intrusion Detection System (CIDS)</a>, <a href="https://publications.waset.org/abstracts/search?q=Slowloris" title=" Slowloris"> Slowloris</a>, <a href="https://publications.waset.org/abstracts/search?q=OSSIM%20%28Open%20Source%20Security%20Information%20Management%20tool%29" title=" OSSIM (Open Source Security Information Management tool)"> OSSIM (Open Source Security Information Management tool)</a>, <a href="https://publications.waset.org/abstracts/search?q=OSSEC%20HIDS" title=" OSSEC HIDS"> OSSEC HIDS</a> </p> <a href="https://publications.waset.org/abstracts/23855/real-time-detection-of-application-layer-ddos-attack-using-log-based-collaborative-intrusion-detection-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23855.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">354</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5526</span> Boko Haram Insurgence and Denial of War Crime against Civilians in the Northeast, Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aleburu%20Rufus%20Edeki">Aleburu Rufus Edeki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The activities of Boko Haram terrorist group have become worrisome in Nigeria. Boko Haram killed innocent civilians, destroyed schools, churches, military barracks, police stations, and other government establishments. The federal government of Nigerian Military engaged in counter-insurgency to curtail the activities of Boko Haram militant. The engagement of the military led to mass killing across the Northeast region. The reported cases of mass-killing led to petition written to the International Criminal Court by the civil society organization as a result of denial by the military authorities of their involvement. The investigation carried out by the International Criminal Court awash by denial of military involvement in war crimes. As a result of this denial, the ICC called for further investigation of war crimes by the military. This study was carried out among fifty-eight participants. In-depth interviews were conducted among the following participants: civilians 41; human rights commission 5 and civil society 12. This study revealed that professional ethics is associated with denial of military involvement in mass killing in the region. This study also revealed that denial is associated with personality. It was also found that social attributes such as trauma, shame, ostracism, criticism, and punishment are found with denial. It is therefore concluded in this study that protection is needed for war actors, so that situation of denial is minimal in post-conflict truth findings. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Boko%20Haram" title="Boko Haram">Boko Haram</a>, <a href="https://publications.waset.org/abstracts/search?q=crime" title=" crime"> crime</a>, <a href="https://publications.waset.org/abstracts/search?q=insurgence" title=" insurgence"> insurgence</a>, <a href="https://publications.waset.org/abstracts/search?q=war" title=" war"> war</a> </p> <a href="https://publications.waset.org/abstracts/111698/boko-haram-insurgence-and-denial-of-war-crime-against-civilians-in-the-northeast-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/111698.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">137</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5525</span> Mitigating Denial of Service Attacks in Information Centric Networking</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bander%20Alzahrani">Bander Alzahrani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Information-centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) is one of the promising candidates for a future Internet, has recently been under the spotlight by the research community to investigate the possibility of redesigning the current Internet architecture to solve many issues such as routing scalability, security, and quality of services issues.. The Bloom filter-based forwarding is a source-routing approach that is used in the PSIRP architecture. This mechanism is vulnerable to brute force attacks which may lead to denial-of-service (DoS) attacks. In this work, we present a new forwarding approach that keeps the advantages of Bloom filter-based forwarding while mitigates attacks on the forwarding mechanism. In practice, we introduce a special type of forwarding nodes called Edge-FW to be placed at the edge of the network. The role of these node is to add an extra security layer by validating and inspecting packets at the edge of the network against brute-force attacks and check whether the packet contains a legitimate forwarding identifier (FId) or not. We leverage Certificateless Aggregate Signature (CLAS) scheme with a small size of 64-bit which is used to sign the FId. Hence, this signature becomes bound to a specific FId. Therefore, malicious nodes that inject packets with random FIds will be easily detected and dropped at the Edge-FW node when the signature verification fails. Our preliminary security analysis suggests that with the proposed approach, the forwarding plane is able to resist attacks such as DoS with very high probability. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bloom%20filter" title="bloom filter">bloom filter</a>, <a href="https://publications.waset.org/abstracts/search?q=certificateless%20aggregate%20signature" title=" certificateless aggregate signature"> certificateless aggregate signature</a>, <a href="https://publications.waset.org/abstracts/search?q=denial-of-service" title=" denial-of-service"> denial-of-service</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20centric%20network" title=" information centric network"> information centric network</a> </p> <a href="https://publications.waset.org/abstracts/70786/mitigating-denial-of-service-attacks-in-information-centric-networking" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/70786.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">198</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5524</span> Battling the Final Stages of Genocide in Bosnia and Herzegovina: Denial and Triumphalism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ehlimana%20Memisevic">Ehlimana Memisevic</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Genocide denial is considered the final stage of genocide, which in the words of Gregory H. Stanton, represents "one of the most certain indicators of future genocides”. Genocide denial in Bosnia and Herzegovina started in 1992, almost simultaneously with the genocide itself. Over the course of the three decades, different forms of genocide and war crimes denial have been developed by state officials, politicians, journalists, and civilians, both in Republika Srpska – the Serb-dominated entity within Bosnia and Herzegovina – and Serbia. Moreover, genocide and war crimes are not only denied but also glorified and celebrated, which was described as "triumphalism" by the Australian-Bosnian scholar Hariz Halilovich who suggested it be added as the 11th phase of Gregory Stanton's "10 stages of genocide." Since 2007, there have been a number of attempts to criminalize genocide denial at the state level in Bosnia and Herzegovina. However, all of them were unsuccessful due to the opposition of representatives of Republika Srpska. On July 23, 2021, the High Representative in Bosnia and Herzegovina, Valentin Inzko, used his power as the final authority in overseeing the civil implementation of the Dayton Peace Accords to impose amendments to Bosnia and Herzegovina's criminal code to ban the denial and glorification of genocide, crimes against humanity and war crimes. However, immediately after the OHR's decision was announced, Milorad Dodik, a Serb member of Bosnia's tripartite presidency, held a press conference, publicly denied the genocide, and announced that this law would never be accepted in Republika Srpska. Denial remains explicit and public and is promulgated through official channels in Bosnia and Herzegovina. This paper will analyze the forms of genocide and other war crimes denial and glorification in the period after the amendments to the Criminal Code of Bosnia and Herzegovina were introduced, which include incrimination of public condoning, denial, gross trivialization or justification of a crime of genocide, crimes against humanity or a war crime established by a final adjudication of the international and domestic courts. We aim to determine the effect of the imposed law and the impact of the denial committed by high-ranking public officials on the denial and celebration of genocide and war crimes committed by ordinary citizens. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=genocide" title="genocide">genocide</a>, <a href="https://publications.waset.org/abstracts/search?q=denial" title=" denial"> denial</a>, <a href="https://publications.waset.org/abstracts/search?q=triumphalism" title=" triumphalism"> triumphalism</a>, <a href="https://publications.waset.org/abstracts/search?q=incrimination" title=" incrimination"> incrimination</a> </p> <a href="https://publications.waset.org/abstracts/168447/battling-the-final-stages-of-genocide-in-bosnia-and-herzegovina-denial-and-triumphalism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168447.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">75</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5523</span> A Survey of Domain Name System Tunneling Attacks: Detection and Prevention</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lawrence%20Williams">Lawrence Williams</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As the mechanism which converts domains to internet protocol (IP) addresses, Domain Name System (DNS) is an essential part of internet usage. It was not designed securely and can be subject to attacks. DNS attacks have become more frequent and sophisticated and the need for detecting and preventing them becomes more important for the modern network. DNS tunnelling attacks are one type of attack that are primarily used for distributed denial-of-service (DDoS) attacks and data exfiltration. Discussion of different techniques to detect and prevent DNS tunneling attacks is done. The methods, models, experiments, and data for each technique are discussed. A proposal about feasibility is made. Future research on these topics is proposed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DNS" title="DNS">DNS</a>, <a href="https://publications.waset.org/abstracts/search?q=tunneling" title=" tunneling"> tunneling</a>, <a href="https://publications.waset.org/abstracts/search?q=exfiltration" title=" exfiltration"> exfiltration</a>, <a href="https://publications.waset.org/abstracts/search?q=botnet" title=" botnet"> botnet</a> </p> <a href="https://publications.waset.org/abstracts/159239/a-survey-of-domain-name-system-tunneling-attacks-detection-and-prevention" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159239.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">75</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5522</span> Power System Cyber Security Risk in the Era of Digital Transformation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rafat%20Rob">Rafat Rob</a>, <a href="https://publications.waset.org/abstracts/search?q=Khaled%20Alotaibi"> Khaled Alotaibi</a>, <a href="https://publications.waset.org/abstracts/search?q=Dana%20Nour"> Dana Nour</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdullah%20Albadrani"> Abdullah Albadrani</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdulmohsen%20Mulhim"> Abdulmohsen Mulhim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=supply%20chain" title="supply chain">supply chain</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=maturity%20model" title=" maturity model"> maturity model</a>, <a href="https://publications.waset.org/abstracts/search?q=risk" title=" risk"> risk</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20grid" title=" smart grid"> smart grid</a> </p> <a href="https://publications.waset.org/abstracts/160790/power-system-cyber-security-risk-in-the-era-of-digital-transformation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160790.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">114</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5521</span> Denial among Women Living with Cancer: An Exploratory Study to Understand the Consequences of Cancer and the Denial Mechanism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Judith%20Partouche-Sebban">Judith Partouche-Sebban</a>, <a href="https://publications.waset.org/abstracts/search?q=Saeedeh%20Rezaee%20Vessal"> Saeedeh Rezaee Vessal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Because of the rising number of new cases of cancer, especially among women, it is more than essential to better understand how women experience cancer in order to bring them adapted to support and care and enhance their well-being and patient experience. Cancer stands for a traumatic experience in which the diagnosis, its medical treatments, and the related side effects lead to deep physical and psychological changes that may arouse considerable stress and anxiety. In order to reduce these negative emotions, women tend to use various defense mechanisms, among which denial has been defined as the most frequent mechanism used by breast cancer patients. This study aims to better understand the consequences of the experience of cancer and their link with the adoption of a denial strategy. The empirical research was done among female cancer survivors in France. Since the topic of this study is relatively unexplored, a qualitative methodology and open-ended interviews were employed. In total, 25 semi-directive interviews were conducted with a female with different cancers, different stages of treatment, and different ages. A systematic inductive method was performed to analyze data. The content analysis enabled to highlight three different denial-related behaviors among women with cancer, which serve a self-protective function. First, women who expressed high levels of anxiety confessed they tended to completely deny the existence of their cancer immediately after the diagnosis of their illness. These women mainly exhibit many fears and a deep distrust toward the medical context and professionals. This coping mechanism is defined by the patient as being unconscious. Second, other women deliberately decided to deny partial information about their cancer, whether this information is related to the stages of the illness, the emotional consequences, or the behavioral consequences of the illness. These women use this strategy as a way to avoid the reality of the illness and its impact on the different aspects of their life as if cancer does not exist. Third, some women tend to reinterpret and give meaning to their cancer as a way to reduce its impact on their life. To this end, they may use magical thinking or positive reframing, or reinterpretation. Because denial may lead to delays in medical treatments, this topic deserves a deep investigation, especially in the context of oncology. As denial is defined as a specific defense mechanism, this study contributes to the existing literature in service marketing which focuses on emotions and emotional regulation in healthcare services which is a crucial issue. Moreover, this study has several managerial implications for healthcare professionals who interact with patients in order to implement better care and support for the patients. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cancer" title="cancer">cancer</a>, <a href="https://publications.waset.org/abstracts/search?q=coping%20mechanisms" title=" coping mechanisms"> coping mechanisms</a>, <a href="https://publications.waset.org/abstracts/search?q=denial" title=" denial"> denial</a>, <a href="https://publications.waset.org/abstracts/search?q=healthcare%20services" title=" healthcare services"> healthcare services</a> </p> <a href="https://publications.waset.org/abstracts/155653/denial-among-women-living-with-cancer-an-exploratory-study-to-understand-the-consequences-of-cancer-and-the-denial-mechanism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/155653.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">85</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5520</span> An Enhanced Digital Forensic Model for Internet of Things Forensic</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tina%20Wu">Tina Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=Andrew%20Martin"> Andrew Martin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The expansion of the Internet of Things (IoT) brings a new level of threat. Attacks on IoT are already being used by criminals to form botnets, launch Distributed Denial of Service (DDoS) and distribute malware. This opens a whole new digital forensic arena to develop forensic methodologies in order to have the capability to investigate IoT related crimes. However, existing proposed IoT forensic models are still premature requiring further improvement and validation, many lack details on the acquisition and analysis phase. This paper proposes an enhanced theoretical IoT digital forensic model focused on identifying and acquiring the main sources of evidence in a methodical way. In addition, this paper presents a theoretical acquisition framework of the different stages required in order to be capable of acquiring evidence from IoT devices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=acquisition" title="acquisition">acquisition</a>, <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things" title=" Internet of Things"> Internet of Things</a>, <a href="https://publications.waset.org/abstracts/search?q=model" title=" model"> model</a>, <a href="https://publications.waset.org/abstracts/search?q=zoning" title=" zoning"> zoning</a> </p> <a href="https://publications.waset.org/abstracts/76982/an-enhanced-digital-forensic-model-for-internet-of-things-forensic" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/76982.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">271</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5519</span> An Experimental Testbed Using Virtual Containers for Distributed Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Parth%20Patel">Parth Patel</a>, <a href="https://publications.waset.org/abstracts/search?q=Ying%20Zhu"> Ying Zhu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Distributed systems have become ubiquitous, and they continue their growth through a range of services. With advances in resource virtualization technology such as Virtual Machines (VM) and software containers, developers no longer require high-end servers to test and develop distributed software. Even in commercial production, virtualization has streamlined the process of rapid deployment and service management. This paper introduces a distributed systems testbed that utilizes virtualization to enable distributed systems development on commodity computers. The testbed can be used to develop new services, implement theoretical distributed systems concepts for understanding, and experiment with virtual network topologies. We show its versatility through two case studies that utilize the testbed for implementing a theoretical algorithm and developing our own methodology to find high-risk edges. The results of using the testbed for these use cases have proven the effectiveness and versatility of this testbed across a range of scenarios. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distributed%20systems" title="distributed systems">distributed systems</a>, <a href="https://publications.waset.org/abstracts/search?q=experimental%20testbed" title=" experimental testbed"> experimental testbed</a>, <a href="https://publications.waset.org/abstracts/search?q=peer-to-peer%20networks" title=" peer-to-peer networks"> peer-to-peer networks</a>, <a href="https://publications.waset.org/abstracts/search?q=virtual%20container%20technology" title=" virtual container technology"> virtual container technology</a> </p> <a href="https://publications.waset.org/abstracts/133579/an-experimental-testbed-using-virtual-containers-for-distributed-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/133579.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">146</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5518</span> Advanced Simulation and Enhancement for Distributed and Energy Efficient Scheduling for IEEE802.11s Wireless Enhanced Distributed Channel Access Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fisayo%20G.%20Ojo">Fisayo G. Ojo</a>, <a href="https://publications.waset.org/abstracts/search?q=Shamala%20K.%20Subramaniam"> Shamala K. Subramaniam</a>, <a href="https://publications.waset.org/abstracts/search?q=Zuriati%20Ahmad%20Zukarnain"> Zuriati Ahmad Zukarnain</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As technology is advancing and wireless applications are becoming dependable sources, while the physical layer of the applications are been embedded into tiny layer, so the more the problem on energy efficiency and consumption. This paper reviews works done in recent years in wireless applications and distributed computing, we discovered that applications are becoming dependable, and resource allocation sharing with other applications in distributed computing. Applications embedded in distributed system are suffering from power stability and efficiency. In the reviews, we also prove that discrete event simulation has been left behind untouched and not been adapted into distributed system as a simulation technique in scheduling of each event that took place in the development of distributed computing applications. We shed more lights on some researcher proposed techniques and results in our reviews to prove the unsatisfactory results, and to show that more work still have to be done on issues of energy efficiency in wireless applications, and congestion in distributed computing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=discrete%20event%20simulation%20%28DES%29" title="discrete event simulation (DES)">discrete event simulation (DES)</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20computing" title=" distributed computing"> distributed computing</a>, <a href="https://publications.waset.org/abstracts/search?q=energy%20efficiency%20%28EE%29" title=" energy efficiency (EE)"> energy efficiency (EE)</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things%20%28IOT%29" title=" internet of things (IOT)"> internet of things (IOT)</a>, <a href="https://publications.waset.org/abstracts/search?q=quality%20of%20service%20%28QOS%29" title=" quality of service (QOS)"> quality of service (QOS)</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20equipment%20%28UE%29" title=" user equipment (UE)"> user equipment (UE)</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20mesh%20network%20%28WMN%29" title=" wireless mesh network (WMN)"> wireless mesh network (WMN)</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20sensor%20network%20%28wsn%29" title=" wireless sensor network (wsn)"> wireless sensor network (wsn)</a>, <a href="https://publications.waset.org/abstracts/search?q=worldwide%20interoperability%20for%20microwave%20access%20x%20%28WiMAX%29" title=" worldwide interoperability for microwave access x (WiMAX)"> worldwide interoperability for microwave access x (WiMAX)</a> </p> <a href="https://publications.waset.org/abstracts/98991/advanced-simulation-and-enhancement-for-distributed-and-energy-efficient-scheduling-for-ieee80211s-wireless-enhanced-distributed-channel-access-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/98991.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">192</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5517</span> The Primitive Code-Level Design Patterns for Distributed Programming</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bing%20Li">Bing Li</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The primitive code-level design patterns (PDP) are the rudimentary programming elements to develop any distributed systems in the generic distributed programming environment, GreatFree. The PDP works with the primitive distributed application programming interfaces (PDA), the distributed modeling, and the distributed concurrency for scaling-up. They not only hide developers from underlying technical details but also support sufficient adaptability to a variety of distributed computing environments. Programming with them, the simplest distributed system, the lightweight messaging two-node client/server (TNCS) system, is constructed rapidly with straightforward and repeatable behaviors, copy-paste-replace (CPR). As any distributed systems are made up of the simplest ones, those PDAs, as well as the PDP, are generic for distributed programming. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=primitive%20APIs" title="primitive APIs">primitive APIs</a>, <a href="https://publications.waset.org/abstracts/search?q=primitive%20code-level%20design%20patterns" title=" primitive code-level design patterns"> primitive code-level design patterns</a>, <a href="https://publications.waset.org/abstracts/search?q=generic%20distributed%20programming" title=" generic distributed programming"> generic distributed programming</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20systems" title=" distributed systems"> distributed systems</a>, <a href="https://publications.waset.org/abstracts/search?q=highly%20patterned%20development%20environment" title=" highly patterned development environment"> highly patterned development environment</a>, <a href="https://publications.waset.org/abstracts/search?q=messaging" title=" messaging"> messaging</a> </p> <a href="https://publications.waset.org/abstracts/135687/the-primitive-code-level-design-patterns-for-distributed-programming" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/135687.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">191</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5516</span> Evaluation of E-Government Service Quality</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nguyen%20Manh%20Hien">Nguyen Manh Hien</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Service quality is the highest requirement from users, especially for the service in electronic government. During the past decades, it has become a major area of academic investigation. Considering this issue, there are many researches that evaluated the dimensions and e-service contexts. This study also identified the dimensions of service quality but focused on a new conceptual and provides a new methodological in developing measurement scales of e-service quality such as information quality, service quality and organization quality. Finally, the study will suggest a key factor to evaluate e-government service quality better. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=dimensionality" title="dimensionality">dimensionality</a>, <a href="https://publications.waset.org/abstracts/search?q=e-government" title=" e-government"> e-government</a>, <a href="https://publications.waset.org/abstracts/search?q=e-service" title=" e-service"> e-service</a>, <a href="https://publications.waset.org/abstracts/search?q=e-service%20quality" title=" e-service quality"> e-service quality</a> </p> <a href="https://publications.waset.org/abstracts/2685/evaluation-of-e-government-service-quality" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2685.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">541</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5515</span> A Design for Application of Mobile Agent Technology to MicroService Architecture</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Masayuki%20Higashino">Masayuki Higashino</a>, <a href="https://publications.waset.org/abstracts/search?q=Toshiya%20Kawato"> Toshiya Kawato</a>, <a href="https://publications.waset.org/abstracts/search?q=Takao%20Kawamura"> Takao Kawamura</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A monolithic service is based on the N-tier architecture in many cases. In order to divide a monolithic service into microservices, it is necessary to redefine a model as a new microservice by extracting and merging existing models across layers. Refactoring a monolithic service into microservices requires advanced technical capabilities, and it is a difficult way. This paper proposes a design and concept to ease the migration of a monolithic service to microservices using the mobile agent technology. Our proposed approach, mobile agents-based design and concept, enables to ease dividing and merging services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20agent" title="mobile agent">mobile agent</a>, <a href="https://publications.waset.org/abstracts/search?q=microservice" title=" microservice"> microservice</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20service" title=" web service"> web service</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20system" title=" distributed system"> distributed system</a> </p> <a href="https://publications.waset.org/abstracts/87238/a-design-for-application-of-mobile-agent-technology-to-microservice-architecture" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/87238.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">164</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5514</span> An Earth Mover’s Distance Algorithm Based DDoS Detection Mechanism in SDN</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yang%20Zhou">Yang Zhou</a>, <a href="https://publications.waset.org/abstracts/search?q=Kangfeng%20Zheng"> Kangfeng Zheng</a>, <a href="https://publications.waset.org/abstracts/search?q=Wei%20Ni"> Wei Ni</a>, <a href="https://publications.waset.org/abstracts/search?q=Ren%20Ping%20Liu"> Ren Ping Liu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Software-defined networking (SDN) provides a solution for scalable network framework with decoupled control and data plane. However, this architecture also induces a particular distributed denial-of-service (DDoS) attack that can affect or even overwhelm the SDN network. DDoS attack detection problem has to date been mostly researched as entropy comparison problem. However, this problem lacks the utilization of SDN, and the results are not accurate. In this paper, we propose a DDoS attack detection method, which interprets DDoS detection as a signature matching problem and is formulated as Earth Mover’s Distance (EMD) model. Considering the feasibility and accuracy, we further propose to define the cost function of EMD to be a generalized Kullback-Leibler divergence. Simulation results show that our proposed method can detect DDoS attacks by comparing EMD values with the ones computed in the case without attacks. Moreover, our method can significantly increase the true positive rate of detection. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DDoS%20detection" title="DDoS detection">DDoS detection</a>, <a href="https://publications.waset.org/abstracts/search?q=EMD" title=" EMD"> EMD</a>, <a href="https://publications.waset.org/abstracts/search?q=relative%20entropy" title=" relative entropy"> relative entropy</a>, <a href="https://publications.waset.org/abstracts/search?q=SDN" title=" SDN"> SDN</a> </p> <a href="https://publications.waset.org/abstracts/90528/an-earth-movers-distance-algorithm-based-ddos-detection-mechanism-in-sdn" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90528.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">338</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5513</span> A Survey on Concurrency Control Methods in Distributed Database</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Seyed%20Mohsen%20Jameii">Seyed Mohsen Jameii</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the last years, remarkable improvements have been made in the ability of distributed database systems performance. A distributed database is composed of some sites which are connected to each other through network connections. In this system, if good harmonization is not made between different transactions, it may result in database incoherence. Nowadays, because of the complexity of many sites and their connection methods, it is difficult to extend different models in distributed database serially. The principle goal of concurrency control in distributed database is to ensure not interfering in accessibility of common database by different sites. Different concurrency control algorithms have been suggested to use in distributed database systems. In this paper, some available methods have been introduced and compared for concurrency control in distributed database. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=distributed%20database" title="distributed database">distributed database</a>, <a href="https://publications.waset.org/abstracts/search?q=two%20phase%20locking%20protocol" title=" two phase locking protocol"> two phase locking protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=transaction" title=" transaction"> transaction</a>, <a href="https://publications.waset.org/abstracts/search?q=concurrency" title=" concurrency"> concurrency</a> </p> <a href="https://publications.waset.org/abstracts/69917/a-survey-on-concurrency-control-methods-in-distributed-database" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/69917.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">352</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5512</span> Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Adamu%20Abdullahi">Adamu Abdullahi</a>, <a href="https://publications.waset.org/abstracts/search?q=On%20Francisca"> On Francisca</a>, <a href="https://publications.waset.org/abstracts/search?q=Saidu%20Isah%20Rambo"> Saidu Isah Rambo</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20N.%20Obunadike"> G. N. Obunadike</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20T.%20Chinyio"> D. T. Chinyio</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=algorithm" title="algorithm">algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=CoAP" title=" CoAP"> CoAP</a>, <a href="https://publications.waset.org/abstracts/search?q=DoS" title=" DoS"> DoS</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a> </p> <a href="https://publications.waset.org/abstracts/166910/internet-of-things-networks-denial-of-service-detection-in-constrained-application-protocol-using-machine-learning-algorithm" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/166910.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">80</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5511</span> Cloud Computing Architecture Based on SOA</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Negin%20Mohammadrezaee%20Larki">Negin Mohammadrezaee Larki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud Computing is a popular solution that has been used in recent years to cooperate and collaborate among distributed applications over networks. Moving successfully into cloud computing requires an architecture that will support the new cloud capabilities. Many business leaders and analysts agree that moving to cloud requires having a solid, service-oriented architecture to provide the infrastructure needed for successful cloud implementation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Service%20Oriented%20Architecture%20%28SOA%29" title="Service Oriented Architecture (SOA)">Service Oriented Architecture (SOA)</a>, <a href="https://publications.waset.org/abstracts/search?q=Service%20Oriented%20Cloud%20Computing%20Architecture%20%28SOCCA%29" title=" Service Oriented Cloud Computing Architecture (SOCCA)"> Service Oriented Cloud Computing Architecture (SOCCA)</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title=" cloud computing"> cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing%20architecture" title=" cloud computing architecture "> cloud computing architecture </a> </p> <a href="https://publications.waset.org/abstracts/24894/cloud-computing-architecture-based-on-soa" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24894.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">388</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5510</span> Adoption of Lean Thinking and Service Improvement for Care Home Service</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chuang-Chun%20Chiou">Chuang-Chun Chiou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ageing population is a global trend; therefore the need of care service has been increasing dramatically. There are three basic forms of service delivered to the elderly: institution, community, and home. Particularly, the institutional service can be seen as an extension of medical service. The nursing home or so-called care home which is equipped with professional staff and facilities can provide a variety of service including rehabilitation service, short-term care, and long term care. Similar to hospital and other health care service, care home service do need to provide quality and cost-effective service to satisfy the dwellers. The main purpose of this paper is to show how lean thinking and service innovation can be applied to care home operation. The issues and key factors of implementing lean practice are discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=lean" title="lean">lean</a>, <a href="https://publications.waset.org/abstracts/search?q=service%20improvement" title=" service improvement"> service improvement</a>, <a href="https://publications.waset.org/abstracts/search?q=SERVQUAL" title=" SERVQUAL"> SERVQUAL</a>, <a href="https://publications.waset.org/abstracts/search?q=care%20home%20service" title=" care home service"> care home service</a> </p> <a href="https://publications.waset.org/abstracts/7248/adoption-of-lean-thinking-and-service-improvement-for-care-home-service" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7248.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">606</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5509</span> Design of Cloud Service Brokerage System Intermediating Integrated Services in Multiple Cloud Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dongjae%20Kang">Dongjae Kang</a>, <a href="https://publications.waset.org/abstracts/search?q=Sokho%20Son"> Sokho Son</a>, <a href="https://publications.waset.org/abstracts/search?q=Jinmee%20Kim"> Jinmee Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud service brokering is a new service paradigm that provides interoperability and portability of application across multiple Cloud providers. In this paper, we designed cloud service brokerage system, any broker, supporting integrated service provisioning and SLA based service life cycle management. For the system design, we introduce the system concept and whole architecture, details of main components and use cases of primary operations in the system. These features ease the Cloud service provider and customer’s concern and support new Cloud service open market to increase cloud service profit and prompt Cloud service echo system in cloud computing related area. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20service%20brokerage" title="cloud service brokerage">cloud service brokerage</a>, <a href="https://publications.waset.org/abstracts/search?q=multiple%20Clouds" title=" multiple Clouds"> multiple Clouds</a>, <a href="https://publications.waset.org/abstracts/search?q=Integrated%20service%20provisioning" title=" Integrated service provisioning"> Integrated service provisioning</a>, <a href="https://publications.waset.org/abstracts/search?q=SLA" title=" SLA"> SLA</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20service" title=" network service"> network service</a> </p> <a href="https://publications.waset.org/abstracts/17018/design-of-cloud-service-brokerage-system-intermediating-integrated-services-in-multiple-cloud-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17018.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">488</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5508</span> Tracing Back the Bot Master </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sneha%20Leslie">Sneha Leslie</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bonet" title="bonet">bonet</a>, <a href="https://publications.waset.org/abstracts/search?q=DDoS%20attack" title=" DDoS attack"> DDoS attack</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20security" title=" network security"> network security</a>, <a href="https://publications.waset.org/abstracts/search?q=detection%20system" title=" detection system"> detection system</a>, <a href="https://publications.waset.org/abstracts/search?q=metasploit%20framework" title=" metasploit framework"> metasploit framework</a> </p> <a href="https://publications.waset.org/abstracts/19912/tracing-back-the-bot-master" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19912.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">254</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5507</span> Throughput of Point Coordination Function (PCF)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Faisel%20Eltuhami%20Alzaalik">Faisel Eltuhami Alzaalik</a>, <a href="https://publications.waset.org/abstracts/search?q=Omar%20Imhemed%20Alramli"> Omar Imhemed Alramli</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Mohamed%20Elaieb"> Ahmed Mohamed Elaieb</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The IEEE 802.11 defines two modes of MAC, distributed coordination function (DCF) and point coordination function (PCF) mode. The first sub-layer of the MAC is the distributed coordination function (DCF). A contention algorithm is used via DCF to provide access to all traffic. The point coordination function (PCF) is the second sub-layer used to provide contention-free service. PCF is upper DCF and it uses features of DCF to establish guarantee access of its users. Some papers and researches that have been published in this technology were reviewed in this paper, as well as talking briefly about the distributed coordination function (DCF) technology. The simulation of the PCF function have been applied by using a simulation program called network simulator (NS2) and have been found out the throughput of a transmitter system by using this function. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DCF" title="DCF">DCF</a>, <a href="https://publications.waset.org/abstracts/search?q=PCF" title=" PCF"> PCF</a>, <a href="https://publications.waset.org/abstracts/search?q=throughput" title=" throughput"> throughput</a>, <a href="https://publications.waset.org/abstracts/search?q=NS2" title=" NS2"> NS2</a> </p> <a href="https://publications.waset.org/abstracts/2456/throughput-of-point-coordination-function-pcf" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2456.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">577</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5506</span> A Two Server Poisson Queue Operating under FCFS Discipline with an ‘m’ Policy </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=R.%20Sivasamy">R. Sivasamy</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20Paulraj"> G. Paulraj</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Kalaimani"> S. Kalaimani</a>, <a href="https://publications.waset.org/abstracts/search?q=N.Thillaigovindan"> N.Thillaigovindan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> For profitable businesses, queues are double-edged swords and hence the pain of long wait times in a queue often frustrates customers. This paper suggests a technical way of reducing the pain of lines through a Poisson M/M1, M2/2 queueing system operated by two heterogeneous servers with an objective of minimising the mean sojourn time of customers served under the queue discipline ‘First Come First Served with an ‘m’ policy, i.e. FCFS-m policy’. Arrivals to the system form a Poisson process of rate λ and are served by two exponential servers. The service times of successive customers at server ‘j’ are independent and identically distributed (i.i.d.) random variables and each of it is exponentially distributed with rate parameter μj (j=1, 2). The primary condition for implementing the queue discipline ‘FCFS-m policy’ on these service rates μj (j=1, 2) is that either (m+1) µ2 > µ1> m µ2 or (m+1) µ1 > µ2> m µ1 must be satisfied. Further waiting customers prefer the server-1 whenever it becomes available for service, and the server-2 should be installed if and only if the queue length exceeds the value ‘m’ as a threshold. Steady-state results on queue length and waiting time distributions have been obtained. A simple way of tracing the optimal service rate μ*2 of the server-2 is illustrated in a specific numerical exercise to equalize the average queue length cost with that of the service cost. Assuming that the server-1 has to dynamically adjust the service rates as μ1 during the system size is strictly less than T=(m+2) while μ2=0, and as μ1 +μ2 where μ2>0 if the system size is more than or equal to T, corresponding steady state results of M/M1+M2/1 queues have been deduced from those of M/M1,M2/2 queues. To conclude this investigation has a viable application, results of M/M1+M2/1 queues have been used in processing of those waiting messages into a single computer node and to measure the power consumption by the node. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=two%20heterogeneous%20servers" title="two heterogeneous servers">two heterogeneous servers</a>, <a href="https://publications.waset.org/abstracts/search?q=M%2FM1" title=" M/M1"> M/M1</a>, <a href="https://publications.waset.org/abstracts/search?q=M2%2F2%20queue" title="M2/2 queue">M2/2 queue</a>, <a href="https://publications.waset.org/abstracts/search?q=service%20cost%20and%20queue%20length%20cost" title=" service cost and queue length cost"> service cost and queue length cost</a>, <a href="https://publications.waset.org/abstracts/search?q=M%2FM1%2BM2%2F1%20queue" title=" M/M1+M2/1 queue"> M/M1+M2/1 queue</a> </p> <a href="https://publications.waset.org/abstracts/42944/a-two-server-poisson-queue-operating-under-fcfs-discipline-with-an-m-policy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42944.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">362</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5505</span> Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amjad%20Khan">Amjad Khan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=black%20hole%20attack" title="black hole attack">black hole attack</a>, <a href="https://publications.waset.org/abstracts/search?q=grey%20hole%20attack" title=" grey hole attack"> grey hole attack</a>, <a href="https://publications.waset.org/abstracts/search?q=intransient%20traffic%20tempering" title=" intransient traffic tempering"> intransient traffic tempering</a>, <a href="https://publications.waset.org/abstracts/search?q=networking" title=" networking"> networking</a> </p> <a href="https://publications.waset.org/abstracts/14672/minimization-of-denial-of-services-attacks-in-vehicular-adhoc-networking-by-applying-different-constraints" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14672.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">284</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5504</span> Architecture for QoS Based Service Selection Using Local Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gopinath%20Ganapathy">Gopinath Ganapathy</a>, <a href="https://publications.waset.org/abstracts/search?q=Chellammal%20Surianarayanan"> Chellammal Surianarayanan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Services are growing rapidly and generally they are aggregated into a composite service to accomplish complex business processes. There may be several services that offer the same required function of a particular task in a composite service. Hence a choice has to be made for selecting suitable services from alternative functionally similar services. Quality of Service (QoS)plays as a discriminating factor in selecting which component services should be selected to satisfy the quality requirements of a user during service composition. There are two categories of approaches for QoS based service selection, namely global and local approaches. Global approaches are known to be Non-Polynomial (NP) hard in time and offer poor scalability in large scale composition. As an alternative to global methods, local selection methods which reduce the search space by breaking up the large/complex problem of selecting services for the workflow into independent sub problems of selecting services for individual tasks are coming up. In this paper, distributed architecture for selecting services based on QoS using local selection is presented with an overview of local selection methodology. The architecture describes the core components, namely, selection manager and QoS manager needed to implement the local approach and their functions. Selection manager consists of two components namely constraint decomposer which decomposes the given global or workflow level constraints in local or task level constraints and service selector which selects appropriate service for each task with maximum utility, satisfying the corresponding local constraints. QoS manager manages the QoS information at two levels namely, service class level and individual service level. The architecture serves as an implementation model for local selection. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=architecture%20of%20service%20selection" title="architecture of service selection">architecture of service selection</a>, <a href="https://publications.waset.org/abstracts/search?q=local%20method%20for%20service%20selection" title=" local method for service selection"> local method for service selection</a>, <a href="https://publications.waset.org/abstracts/search?q=QoS%20based%20service%20selection" title=" QoS based service selection"> QoS based service selection</a>, <a href="https://publications.waset.org/abstracts/search?q=approaches%20for%20QoS%20based%20service%20selection" title=" approaches for QoS based service selection"> approaches for QoS based service selection</a> </p> <a href="https://publications.waset.org/abstracts/23484/architecture-for-qos-based-service-selection-using-local-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23484.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">426</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=distributed%20denial%20of%20service&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=distributed%20denial%20of%20service&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=distributed%20denial%20of%20service&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=distributed%20denial%20of%20service&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=distributed%20denial%20of%20service&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=distributed%20denial%20of%20service&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=distributed%20denial%20of%20service&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=distributed%20denial%20of%20service&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=distributed%20denial%20of%20service&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=distributed%20denial%20of%20service&page=184">184</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=distributed%20denial%20of%20service&page=185">185</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=distributed%20denial%20of%20service&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>