By leveraging virtual machine (VM) technology which provides performance and fault isolation, cloud resources can be provisioned on demand in a fine grained, multiplexed manner rather than in monolithic pieces. By integrating volunteer computing into cloud architectures, we envision a gigantic self-organizing cloud (SOC) being formed to reap the huge potential of untapped commodity computing […]
Wireless Sensor Networks Implementation In Trust Aware Routing Framework
To protect WSNs from the harmful attacks exploiting the replay of routing information, we have designed and implemented a robust trust-aware routing framework, TARF, to secure routing solutions in wireless sensor networks. The design of TARF centers on trustworthiness and energy efficiency. EnergyWatcher is responsible for recording the energy cost for each known neighbor, based […]
SPOT – Compromised machine detection
In this paper, we focus on the detection of the compromised machines in a network that are used for sending spam messages, which are commonly referred to as spam zombies. We develop the SPOT detection system to assist system administrators in automatically identifying the compromised machines in their networks. SPOT is designed based on a […]
Community anomaly detection system
Collaborative information systems (CISs) allow groups of users to communicate and cooperate over common tasks. CIS are increasingly relied upon to manage sensitive information. In this paper, we introduce a framework to detect anomalous insiders from the access logs of a CIS by leveraging the relational nature of system users as well as the meta-information […]
Compromised machine detection using Spam Zombie System
Abstract Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as spamming and spreading malware, DDoS, and identity theft. We focus on the detection of the compromised machines in a network that are used for sending spam messages, which are commonly referred […]