Go to:
Logótipo
Comuta visibilidade da coluna esquerda
Você está em: Start > Publications > View > Triple-Similarity Mechanism for alarm management in the cloud
Publication

Publications

Triple-Similarity Mechanism for alarm management in the cloud

Title
Triple-Similarity Mechanism for alarm management in the cloud
Type
Article in International Scientific Journal
Year
2018
Authors
Dalmazo, BL
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
João P. Vilela
(Author)
Other
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page View ORCID page
Curado, M
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. View Authenticus page Without ORCID
Journal
Title: COMPUTERS & SECURITYImported from Authenticus Search for Journal Publications
Vol. 78
Pages: 33-42
ISSN: 0167-4048
Other information
Authenticus ID: P-00P-S81
Abstract (EN): Its distributed nature and ubiquitous service make the cloud subject to several vulnerabilities. One of the main tools used for reporting suspicious activity in the network's traffic is the Intrusion Detection System. However, two significant problems arise: the huge volume of control messages between the virtual machines and the servers; and the associated transfer costs. In this work, we propose a Triple-Similarity Mechanism (T-SyM) for grouping similar alarms that may correspond to the same attack (or attempt) in order to reduce the number of messages and, consequently, the total amount of information. In addition, we propose an algorithm for calculating the severity level of the alarms. T-SyM works on the basis of 3 steps: individual similarity (Euclidian distance), clustering relevant features (k-means algorithm) and generating the output (the Tanimoto coefficient). An evaluation of the most common attacks is performed using real traces from an IDS. Our mechanism was able to decrease the number of alarms by up to 90% and reduce the total amount of data by more than 80%.
Language: English
Type (Professor's evaluation): Scientific
No. of pages: 10
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same authors

Performance Analysis of Network Traffic Predictors in the Cloud (2017)
Article in International Scientific Journal
Dalmazo, BL; João P. Vilela; Curado, M
Online traffic prediction in the cloud (2016)
Article in International Scientific Journal
Dalmazo, BL; João P. Vilela; Curado, M
Predicting Traffic in the Cloud: A Statistical Approach (2013)
Article in International Conference Proceedings Book
Dalmazo, BL; João P. Vilela; Curado, M
Online Traffic Prediction in the Cloud: A Dynamic Window Approach (2014)
Article in International Conference Proceedings Book
Dalmazo, BL; João P. Vilela; Curado, M
Expedite Feature Extraction for Enhanced Cloud Anomaly Detection (2016)
Article in International Conference Proceedings Book
Dalmazo, BL; João P. Vilela; Simoes, P; Curado, M

Of the same journal

Systems and methods for SPIT detection in VoIP: Survey and future directions (2018)
Article in International Scientific Journal
Azad, MA; Ricardo Morla; Salah, K
IoT security certifications: Challenges and potential approaches (2022)
Article in International Scientific Journal
Cirne, A; Sousa, PR; Resende, JS; antunes, l
Hardening cryptographic operations through the use of secure enclaves (2021)
Article in International Scientific Journal
Brandao, A; Resende, JS; Martins, R
Deterministic or probabilistic?- A survey on Byzantine fault tolerant state machine replication (2023)
Article in International Scientific Journal
Freitas, T; Soares, J; Manuel E Correia; Martins, R
Caller-REP: Detecting unwanted calls with caller social strength (2013)
Article in International Scientific Journal
Azad, MA; Ricardo Morla

See all (6)

Recommend this page Top
Copyright 1996-2025 © Faculdade de Direito da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-07-19 at 18:42:58 | Privacy Policy | Personal Data Protection Policy | Whistleblowing