دانلود و نمایش مقالات مرتبط با stateful::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - stateful

تعداد مقالات یافته شده: 3
ردیف عنوان نوع
1 Computation partitioning for mobile cloud computing in a big data environment
پارتیشن بندی محاسبات برای محاسبات ابری سیار در یک محیط داده های بزرگ-2017
The growth of mobile cloud computing (MCC) is challenged by the need to adapt to the resources and environment that are available to mobile clients while addressing the dynamic changes in network bandwidth. Big data can be handled via MCC. In this paper, we propose a model of computation partitioning for stateful data in the dynamic environment that will improve performance. First, we constructed a model of stateful data streaming and investigated the method of computation partitioning in a dynamic environment. We developed a definition of direction and calculation of the segmentation scheme, including single frame data flow, task scheduling and executing efficiency. We also defined the problem for a multi-frame data flow calculation segmentation decision that is optimized for dynamic conditions and provided an analysis. Second, we proposed a computation partitioning method for single frame data flow. We determined the data parameters of the application model, the computation partitioning scheme, and the task and work order data stream model. We followed the scheduling method to provide the optimal calculation for data frame execution time after computation partitioning and the best computation partitioning method. Third, we explored a calculation segmentation method for single frame data flow based on multi-frame data using multi-frame data optimization adjustment and prediction of future changes in network bandwidth. We were able to demonstrate that the calculation method for multi-frame data in a changing network bandwidth environment is more efficient than the calculation method with the limitation of calculations for single frame data. Finally, our research verified the effectiveness of single frame data in the application of the data stream and analyzed the performance of the method to optimize the adjustment of multi-frame data. We used a mobile cloud computing platform prototype system for face recognition to verify the effectiveness of the method.
Index Terms: Big data | computation partitioning | data stream | dynamic environment | mobile cloud computing | stateful
مقاله انگلیسی
2 Challenges of and solution to the control load of stateful firewall in software defined networks
چالش ها و راه حل هایی برای کنترل بار فایروال دولتی در شبکه های تعریف شده توسط نرم افزار-2017
Computer Standards & Interfaces 54 (2017) 293–304 Contents lists available at ScienceDirect Computer Standards & Interfaces journal homepage: www.elsevier.com/locate/csi A R T I C L E I N F O Keywords: Software defined networking SDN security stateful firewall DoS attack A B S T R A C T Whereas SDN (Software Defined Networks) provides the opportunity for the flexibility of network configuration, the introduction of controller systems raisesnew issues about developing firewall system design, such as controller attack, rule setup, and communication overhead for control messages. Especially, the delay and overload for dynamic control of stateful firewall are serious bottlenecks. This paper examines the current challenges and their origins, and presents a comprehensive solution to the key operational steps: topology-based selective filtering rules for setup and maintenance stage, three-layer rule structure for in-switch flow tables, and controller attack protection based on adaptive host connection tracking with multiple hashing queues named Flow Tracker algorithm. The experiment results using multiple OVS switches and virtual hosts in GENI test bed demonstrate FlowTracker succeeds in monitoring all network connections and completely profiling host normal routine with acceptable latency increment (170 ms). Moreover, by utilizing multiple request queues, the proposed DoS attack detection algorithm reduce the response time to DoS 5 to 20 times less than using a single queue.
Keywords:Software defined networking | SDN security | stateful firewall | DoS attack
مقاله انگلیسی
3 A potential weakness in RFID-based internet-of-things Internet-of-things systems
ضعف بالقوه در اینترنت اشیاء مبتنی بر RFID سیستم های اینترنت اشیاء-2015
Article history:Available online 11 November 2014Keywords:RFIDInternet of things Authentication Compromised readerIn recent years, a large body of research has been devoted to the security and privacy of RFID that is expected to become a critical component of IoT (Internet of Things). Most of these studies have been conducted under the assumption that an RFID system consists of the following elements: RFID tags, a reader and a back-end server. However, in IoT scenario it is supposed that a high density of RFID readers will be deployed and networked to the system over the Internet. Hence, a multi-reader RFID environment circumstance, where readers may be mobile handsets like mobile phones, should be involved in the security analysis of RFID based IoT systems. In this paper, we point out that RFID authentication protocols in the IoT need new security mechanisms that consider untrustworthy RFID entities, compromised readers or insecure communication channel between the readers and the back-end servers. Thus, traditional RFID security schemes designed for closed-loop systems cannot fulfill security and privacy demands, if they are directly adapted to the IoT environment. To emphasize this discrimination, we demonstrate that a secure protocol in a closed-loop RFID system may jeopardize the security of the system in this new RFID concept. Furthermore, we address this fault by investigating the security of a recent IoT RFID authentication protocol, named as AKE-MRFID. We exploit security flaws that have gone unnoticed in the design and present three attacks: de-synchronization, replay and reader impersonation attacks. To defend against the aforementioned attacks, we amend the protocol with a stateful variant so that it holds the claimed security properties.© 2014 Elsevier B.V. All rights reserved.
Keywords: RFID | Internet of things | Authentication | Compromised reader
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 3307 :::::::: بازدید دیروز: 3097 :::::::: بازدید کل: 37574 :::::::: افراد آنلاین: 36