Abstract. In the past years technological advances such as the increas-ing bandwidth in network infrastructures and new software developments such as message and agent-based systems gave rise to the field of cloud technologies, which have evolved from abstract concepts to concrete so-lutions, ranging from flexible, platform-independent systems to highly specialized software solutions. In this paper we introduce and evaluate two anomaly detection methods to achieve a higher level of security in a specific cloud solution for interactive media, the Media Cloud from Alcatel-Lucent [9]. The Media Cloud focuses on real-time processing of interactive media applications, allowing for optimal resource planning using highly specific functional compon...
The world of information and communication technology is experiencing changes that, regardless of so...
This paper presents a model to observation the Cloud computing for any anomalous activity. Hadoop it...
Attacks based on the application layer of the cloud storage system have been dramatically increasing...
Cloud environments compose unique operational characteristics and intrinsic capabilities such as ser...
Abstract. Cloud computing is now on the verge of being embraced as a serious usage-model. However, w...
In recent years, microservices have gained popularity due to their benefits such as increased mainta...
International audienceThe dependability of cloud computing services is a major concern of cloud prov...
Cloud is one of the emerging technologies in the field of computer science and is extremely popular ...
Abstract—Software detection of anomalies is a vital element of operations in data centers and servic...
Cloud Collaboration Systems (CCS) offer efficient coordination among users to work on shared tasks i...
In very general terms, this internship report consist in analysing data from several experiments on ...
Part 2: Malware DetectionInternational audienceComputer worms are very active and new sophisticated ...
The world of the Internet and networking is exposed to many cyber-attacks and threats. Over the year...
Anomaly detection has been attracting interest from both the industry and the research community for...
Cybercriminals exploit vulnerabilities in web applications by leveraging different attacks to gain u...
The world of information and communication technology is experiencing changes that, regardless of so...
This paper presents a model to observation the Cloud computing for any anomalous activity. Hadoop it...
Attacks based on the application layer of the cloud storage system have been dramatically increasing...
Cloud environments compose unique operational characteristics and intrinsic capabilities such as ser...
Abstract. Cloud computing is now on the verge of being embraced as a serious usage-model. However, w...
In recent years, microservices have gained popularity due to their benefits such as increased mainta...
International audienceThe dependability of cloud computing services is a major concern of cloud prov...
Cloud is one of the emerging technologies in the field of computer science and is extremely popular ...
Abstract—Software detection of anomalies is a vital element of operations in data centers and servic...
Cloud Collaboration Systems (CCS) offer efficient coordination among users to work on shared tasks i...
In very general terms, this internship report consist in analysing data from several experiments on ...
Part 2: Malware DetectionInternational audienceComputer worms are very active and new sophisticated ...
The world of the Internet and networking is exposed to many cyber-attacks and threats. Over the year...
Anomaly detection has been attracting interest from both the industry and the research community for...
Cybercriminals exploit vulnerabilities in web applications by leveraging different attacks to gain u...
The world of information and communication technology is experiencing changes that, regardless of so...
This paper presents a model to observation the Cloud computing for any anomalous activity. Hadoop it...
Attacks based on the application layer of the cloud storage system have been dramatically increasing...