34 research outputs found

    Multi-Agent System Approach for Trustworthy Cloud Service Discovery

    Get PDF
    Accessing the advantages of cloud computing requires that a prospective user has proper access to trustworthy cloud services. It is a strenuous and laborious task to find resources and services in a heterogeneous network such as cloud environment. The cloud computing paradigm being a form of distributed system with a complex collection of computing resources from different domains with different regulatory policies but having a lot of values could enhance the mode of computing. However, a monolithic approach to cloud service discovery cannot help the necessities of cloud environment efficiently. This study put forward a distributive approach for finding sincere cloud services with the use of Multi-Agents System for ensuring intelligent cloud service discovery from trusted providers. Experiments were carried out in the study using CloudAnalyst and the results indicated that extending the frontiers MAS approach into cloud service discovery by way of integrating trust into the process improves the quality of service in respect of response time and scalability. A further comparative analysis of the Multi-Agents System approach for cloud service discovery to monolithic approach showed that Multi-Agents System approach is highly efficient, and highly flexible for trustworthy cloud service discovery

    Lightweight Agents, Intelligent Mobile Agent and RPC Schemes: A Comparative Analysis

    Get PDF
    This paper presents the performance comparison of Lightweight Agents, Single Mobile Intelligent Agents and Remote Procedure Call which are tools for implementing communication in a distributed computing environment. Routing algorithms for each scheme is modeled based on TSP. The performance comparison among the three schemes is based on bandwidth overhead with retransmission, system throughput and system latency. The mathematical model for each performance metric is presented, from which mathematical model is derived for each scheme for comparison. The simulation results show that the LWAs has better performance than the other two schemes in terms of small bandwidth retransmission overhead, high system throughput and low system latency. The Bernoulli random variable is used to model the failure rate of the simulated network which is assumed to have probability of success p = 85% and the probability of failure q = 15%. The network availability is realized by multiplicative pseudorandom number generator during the simulation. The results of simulation are presented

    A Prey-Predator Defence Mechanism For Ad Hoc On-Demand Distance Vector Routing Protocol

    Get PDF
    This study proposes a nature-based system survivability model. The model was simulated, and its performance was evaluated for the mobile ad hoc wireless networks. The survivability model was used to enable mobile wireless distributed systems to keep on delivering packets during their stated missions in a timely manner in the presence of attacks. A prey-predator communal defence algorithm was developed and fused with the Ad hoc On-demand Distance Vector (AODV) protocol. The mathematical equations for the proposed model were formulated using the Lotka-Volterra theory of ecology. The model deployed a security mechanism for intrusion detection in three vulnerable sections of the AODV protocol. The model simulation was performed using MATLAB for the mathematical model evaluation and using OMNET++ for protocol performance testing. The MATLAB simulation results, which used empirical and field data, have established that the adapted Lotka-Volterra-based equations adequately represent network defense using the communal algorithm. Using the number of active nodes as a measure of throughput after attack (with a maximum throughput of 250 units), the proposed model had a throughput of 230 units while under attack and the intrusion was nullified within 2 seconds. The OMNET++ results for protocol simulation that use throughput, delivery ratio, network delay, and load as performance metrics with the OMNET++ embedded datasets showed good performance of the model, which was better than the existing conventional survivability systems. The comparison of the proposed model with the existing model is also presented. The study concludes that the proposed communal defence model was effective in protecting the entire routing layer (layer 2) of the AODV protocol when exposed to diverse forms of intrusion attacks

    A PREDICTIVE USER BEHAVIOUR ANALYTIC MODEL FOR INSIDER THREATS IN CYBERSPACE

    Get PDF
    Insider threat in cyberspace is a recurring problem since the user activities in a cyber network are often unpredictable. Most existing solutions are not flexible and adaptable to detect sudden change in userā€™s behaviour in streaming data, which led to a high false alarm rates and low detection rates. In this study, a model that is capable of adapting to the changing pattern in structured cyberspace data streams in order to detect malicious insider activities in cyberspace was proposed. The Computer Emergency Response Team (CERT) dataset was used as the data source in this study. Extracted features from the dataset were normalized using Min-Max normalization. Standard scaler techniques and mutual information gain technique were used to determine the best features for classification. A hybrid detection model was formulated using the synergism of Convolutional Neural Network (CNN) and Gated Recurrent Unit (GRU) models. Model simulation was performed using python programming language. Performance evaluation was carried out by assessing and comparing the performance of the proposed model with a selected existing model using accuracy, precision and sensitivity as performance metrics. The result of the simulation showed that the developed model has an increase of 1.48% of detection accuracy, 4.21% of precision and 1.25% sensitivity over the existing model. This indicated that the developed hybrid approach was able to learn from sequences of user actions in a time and frequency domain and improves the detection rate of insider threats in cyberspace

    Performance Evaluation of User-Behaviour Techniques of Web Spam Detection Models

    Get PDF
    Web spam detection is a critical issue in todayā€™s rapidly growing usage of the Internet and the World Wide Web. The upsurge of web spam has significantly deteriorated the Quality of Services (QoS) of the World Wide Web. The degeneration of the quality of search engine results has given rise to researches on the detection of spam pages efficiently and accurately. Existing user-behaviour oriented web spam detection models employed the content-based, link-based and other features of webpages for classification of web spams. These user-behaviour techniques either implemented singly or combined has achieved good detection performance. However, the effectiveness of these features in identifying Web spams correctly needs to be determined. In this study, predictive web spam detection models that employed all related user-behaviour features of webpages were developed and evaluated. The content, link, and obvious-based features datasets were collected from an online repository. Relevant features were extracted using an improved Filter-based method. Six user-behaviour related features extracted from the datasets were used to combine the datasets to generate all possible subset of feature space required, such that 7 new datasets were generated for the study. Multi-Layer Perceptron (MLP) approach was adopted as a classifier for each of the identified features. Python Machine Learning Library was used to simulate the models using percentage splits of 60/40%, 70/30% and 80/20% ratio for training/testing dataset and the performances were evaluated using accuracy, True Positive (TP) rate, False Positive (FP) rate and precision as metrics. The result showed that for the majority of the datasets the formulated models have shown an increase in efficiency after feature selection. The MLP classifier was able to achieve the best result of 66.0% accuracy when the link-based dataset was used with feature selection. The study concluded that link-based features of a user is sufficient and effective for the detection of web spams. Keywords: Webspam, Content-based, Link-based, features, user-behaviour, evaluation DOI: 10.7176/NCS/10-07 Publication date:December 31st 201

    An Enhanced Cluster-Based Routing Model for Energy-Efficient Wireless Sensor Networks

    Get PDF
    Energy efficiency is a crucial consideration in wireless sensor networks since the sensor nodes are resource-constrained, and this limited resource, if not optimally utilized, may disrupt the entire network's operations. The network must ensure that the limited energy resources are used as effectively as possible to allow for longer-term operation. The study designed and simulated an improved Genetic Algorithm-Based Energy-Efficient Routing (GABEER) algorithm to combat the issue of energy depletion in wireless sensor networks. The GABEER algorithm was designed using the Free Space Path Loss Model to determine each node's location in the sensor field according to its proximity to the base station (sink) and the First-Order Radio Energy Model to measure the energy depletion of each node to obtain the residual energy. The GABEER algorithm was coded in the C++ programming language, and the wireless sensor network was simulated using Network Simulator 3 (NS-3). The outcomes of the simulation revealed that the GABEER algorithm has the capability of increasing the performance of sensor network operations with respect to lifetime and stability period
    corecore