提高机器学习、网格计算和网络物理连接互联网络有效性的网络技术分析与网络安全评估

B. Dhanalakshmi, Chaitanya Singh, S. Surya, Atharav Hedage, Shikha Kuchhal, Korakod Tongkachok
{"title":"提高机器学习、网格计算和网络物理连接互联网络有效性的网络技术分析与网络安全评估","authors":"B. Dhanalakshmi, Chaitanya Singh, S. Surya, Atharav Hedage, Shikha Kuchhal, Korakod Tongkachok","doi":"10.1109/iciptm54933.2022.9753885","DOIUrl":null,"url":null,"abstract":"The fast improvement of the Internet has incredibly worked with individuals spreading information worldwide, prompting the Internet turning into a pivotal apparatus in many fields like science, trade, schooling, etc. With the Internet common in such countless parts of day to day existence, network security has become basic and requests consistent consideration. For this situation, an IDS's motivation is to recognize between real organization associations and possibly hurtful ones. The recommended method in this examination centers around an interruption identification and avoidance system that comprises of Cloudlet Controller (CC), Trust Authority (TA), and Virtual Machine Manager to recognize questionable practices in a cloud climate. Cloud clients are migrated to different regions in the climate, as indicated by our proposed approach. Whenever information bundles from different clients are gathered, network traffic happens. To resolve this issue, we assembled the Cloudlet Controller, which gets bundles from different clients through switch. CC gets parcels until they arrive at their edge level; if the cloudlet is over-burden, the bundles are shipped off inactive cloudlets. In this philosophy, network traffic is decreased, and it is significantly helpful in identifying interruptions in a straightforward way. In this review, a cross breed arrangement based interruption location and counteraction framework on the cloud is worked to distinguish gatecrasher exercises in the framework. A cross breed characterization based interruption location framework is created with a few cloudlets, a cloudlet regulator, a confided in power, and a virtual machine supervisor to distinguish interloper assaults in the framework, as well as a deterrent instrument to safeguard bundles from gatecrashers.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"148 1","pages":"1-7"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Analysis of Network Technologies and Cyber security Assessment for Enhancing Machine Learning, Grid Computing and Cyber-Physical Connectivity Internetwork Effectiveness\",\"authors\":\"B. Dhanalakshmi, Chaitanya Singh, S. Surya, Atharav Hedage, Shikha Kuchhal, Korakod Tongkachok\",\"doi\":\"10.1109/iciptm54933.2022.9753885\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The fast improvement of the Internet has incredibly worked with individuals spreading information worldwide, prompting the Internet turning into a pivotal apparatus in many fields like science, trade, schooling, etc. With the Internet common in such countless parts of day to day existence, network security has become basic and requests consistent consideration. For this situation, an IDS's motivation is to recognize between real organization associations and possibly hurtful ones. The recommended method in this examination centers around an interruption identification and avoidance system that comprises of Cloudlet Controller (CC), Trust Authority (TA), and Virtual Machine Manager to recognize questionable practices in a cloud climate. Cloud clients are migrated to different regions in the climate, as indicated by our proposed approach. Whenever information bundles from different clients are gathered, network traffic happens. To resolve this issue, we assembled the Cloudlet Controller, which gets bundles from different clients through switch. CC gets parcels until they arrive at their edge level; if the cloudlet is over-burden, the bundles are shipped off inactive cloudlets. In this philosophy, network traffic is decreased, and it is significantly helpful in identifying interruptions in a straightforward way. In this review, a cross breed arrangement based interruption location and counteraction framework on the cloud is worked to distinguish gatecrasher exercises in the framework. A cross breed characterization based interruption location framework is created with a few cloudlets, a cloudlet regulator, a confided in power, and a virtual machine supervisor to distinguish interloper assaults in the framework, as well as a deterrent instrument to safeguard bundles from gatecrashers.\",\"PeriodicalId\":6810,\"journal\":{\"name\":\"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"volume\":\"148 1\",\"pages\":\"1-7\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iciptm54933.2022.9753885\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iciptm54933.2022.9753885","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

互联网的快速发展与个人在世界范围内传播信息有着不可思议的作用,促使互联网成为科学、贸易、教育等许多领域的关键设备。随着互联网在日常生活中如此多的地方普遍存在,网络安全已经成为基本的,需要始终考虑。对于这种情况,IDS的动机是识别真实的组织关联和可能有害的组织关联。本考试中推荐的方法以中断识别和避免系统为中心,该系统由Cloudlet Controller (CC)、Trust Authority (TA)和Virtual Machine Manager组成,用于识别云环境中的可疑实践。正如我们建议的方法所示,云客户端迁移到气候中的不同区域。每当收集来自不同客户机的信息包时,就会发生网络流量。为了解决这个问题,我们组装了Cloudlet Controller,它通过交换机从不同的客户端获取包。CC接收包裹,直到它们到达它们的边缘;如果cloudlet负担过重,那么包将被发送到非活动的cloudlet。在这种理念中,网络流量减少了,并且以一种直接的方式识别中断非常有帮助。在这篇综述中,基于云上的中断位置和对抗框架的交叉品种安排工作,以区分框架中的闯入者练习。一个基于交叉品种特征的中断定位框架由几个云、一个云调节器、一个信任电源和一个虚拟机监控器创建,以区分框架中的闯入者攻击,以及一个威慑工具来保护包免受闯入者的攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Analysis of Network Technologies and Cyber security Assessment for Enhancing Machine Learning, Grid Computing and Cyber-Physical Connectivity Internetwork Effectiveness
The fast improvement of the Internet has incredibly worked with individuals spreading information worldwide, prompting the Internet turning into a pivotal apparatus in many fields like science, trade, schooling, etc. With the Internet common in such countless parts of day to day existence, network security has become basic and requests consistent consideration. For this situation, an IDS's motivation is to recognize between real organization associations and possibly hurtful ones. The recommended method in this examination centers around an interruption identification and avoidance system that comprises of Cloudlet Controller (CC), Trust Authority (TA), and Virtual Machine Manager to recognize questionable practices in a cloud climate. Cloud clients are migrated to different regions in the climate, as indicated by our proposed approach. Whenever information bundles from different clients are gathered, network traffic happens. To resolve this issue, we assembled the Cloudlet Controller, which gets bundles from different clients through switch. CC gets parcels until they arrive at their edge level; if the cloudlet is over-burden, the bundles are shipped off inactive cloudlets. In this philosophy, network traffic is decreased, and it is significantly helpful in identifying interruptions in a straightforward way. In this review, a cross breed arrangement based interruption location and counteraction framework on the cloud is worked to distinguish gatecrasher exercises in the framework. A cross breed characterization based interruption location framework is created with a few cloudlets, a cloudlet regulator, a confided in power, and a virtual machine supervisor to distinguish interloper assaults in the framework, as well as a deterrent instrument to safeguard bundles from gatecrashers.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信