A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Dhindsa, Kanwalvir Singh
- Hybrid Scheduling Algorithm for Efficient Load Balancing In Cloud Computing
Authors
1 CSE & IT Deptt., BBSB Engineering College, Fatehgarh Sahib, Punjab, IN
2 CSE & IT Deptt., BBSB Engineering College, Fatehgarh Sahib, Punja, IN
Source
International Journal of Advanced Networking and Applications, Vol 8, No 5 (2017), Pagination: 3181-3187Abstract
In cloud computing environment, various users send requests for the transmission of data for different demands. The access to different number of users increase load on the cloud servers. Due to this, the cloud server does not provide best efficiency. To provide best efficiency, load has to be balanced. The highlight of this work is the division of different jobs into tasks. The job dependency checking is done on the basis of directed acyclic graph. The dependency checking the make span has to be created on the basis of first come first serve and priority based scheduling algorithms. In this paper, each scheduling algorithm has been implemented sequentially and the hybrid algorithm (round robin and priority based) has also been compared with other scheduling algorithms.
Keywords
Closest Data Center, Optimized Response Time, Dynamic Load, Round-Robin Scheduling, Priority Based Scheduling.References
- K. Kishor, V. Thapar, “An efficient service broker policy for Cloud computing environment”, International Journal of Computer Science Trends and Technology (IJCST) - Vol. 2, Issue 4, July-Aug 2014.
- Qiang Li, Qinfen Hao, Limin Xiao, “Adaptive management of virtualized resources in cloud
- T.C. Chieu, A. Mohindra, A.A. Karve, A. Segal, “Dynamic Scaling of Web Applications in a Virtualized Cloud Computing Environment,” in IEEE International Conference on e-Business Engineering, pp. 281-286, Dec. 2009.
- L. Jiyin, Q. Meikang, J.W. Niu, Y. Chen, and Ming, Adaptive Resource Allocation for Preeemptable Jobs in Cloud Systems, IEEE International Conference on Intelligent Systems Design and Applications, pp. 31-36, 2010.
- B. Wickremasinghe, N. Rodrigo Calheiros, and R. Buyya, Cloud Analyst: A CloudSim-based Visual Modeller for Analyzing Cloud Computing Environments and Applications, IEEE, January 2011.
- Milan E. Soklic “Simulation of Load balancing algorithms” ACM-SIGCSE Bulletin, Vol.34, Issue 4, December 2002.
- Jaspreet Kaur, “Comparison of Load balancing algorithms in a Cloud”, International Journal of Engineering Research and Applications”, Vol. 2, Issue 3, May-June 2012.
- Zhang Bo, Gao Ji, Ai Jieqing, “Cloud Loading Balance algorithm”, Information Science and Engineering, Second International Conference, Vol.2, No.5, 4-6 Dec. 2010.
- Z. Xiao, W. Song, and Q. Chen, “Dynamic resource allocation using virtual machines for cloud computing environment,” IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 6, pp. 1107-1117, 2013.
- Di Caro, G. Dorigo, M. Mobile, “Agents for adaptive routing” in Proceedings of the Thirty-First Hawaii International Conference on System Sciences, Kohala Coast, HI, USA, Vol.7, pp. 74–83, January 1998.
- Bo, Z., Ji, G., Jieqing, A., “Cloud Loading Balance algorithm”, Proceedings of the 2010 2nd International Conference on Information Science and Engineering, Hangzhou, China, pp. 5001–5004, December 2010.
- Wu Lee, Chan, Huang, “Dynamic load balancing mechanism based on cloud storage”, Computing, Communications and Applications Conference, Hong Kong, China, pp. 102–106, January 2012.
- A. Bhadani, Chaudhary, “Performance evaluation of web servers using central load balancing policy over virtual machines on cloud”, Third Annual ACM Bangalore Conference, Bangalore, India, pp. 16-19, January 2010.
- K. Nishant, P. Sharma, V.Krishna, C. Gupta, K.P. Singh, N. Nitin, R. Rastogi, “Lord Balancing of Nodes in Cloud Using Ant Colony Optimization”, 2012 UK Sim 14th International Conference on Computer Modelling and Simulation, Cambridge, UK, pp.3-8, March 2012.
- A.P. Deshmukh, Prof. K.Pamu, “Applying Load Balancing: A Dynamic Approach”, (IJARCSSE), Vol.2, Issue 6, June 2012.
- Load Balancing in Cloud Computing Environment:A Comparative Study of Service Models and Scheduling Algorithms
Authors
1 CSE & IT Deptt., BBSB Engineering College, Fatehgarh Sahib, Punjab, IN
Source
International Journal of Advanced Networking and Applications, Vol 8, No 6 (2017), Pagination: 3246-3252Abstract
Load balancing is a computer networking method to distribute workload across multiple computers or a computer cluster, network links, central processing units, disk drives, or other resources, to achieve optimal resource utilization, maximize throughput, minimize response time, and avoid overload. Using multiple components with load balancing, instead of a single component, may increase reliability through redundancy. The load balancing service is usually provided by dedicated software or hardware, such as a multilayer switch or a Domain Name System server. In this paper, the existing static algorithms used for simple cloud load balancing have been identified and also a hybrid algorithm for developments in the future is suggested.Keywords
Round-Robin Scheduling, Data Center, Priority Based Scheduling, Cloud Computing, Load Balancing.References
- K. Kishor, V. Thapar, “An efficient service broker policy for Cloud computing environment”, International Journal of Computer Science Trends and Technology (IJCST), Vol. 2, Issue 4, July-Aug 2014.
- Pinal Salot, “A Survey of Various scheduling algorithms in cloud computing environment”, ISSN: 2319 - 1163, Vol.2, Issue 2, pp. 131-135, June 2014.
- Z. Xiao, W. Song, and Q. Chen, “Dynamic resource allocation using virtual machines for cloud computing environment,” IEEE Transactions on Parallel and Distributed Systems, Vol. 24, No. 6, pp. 1107–1117, 2013.
- L. D. Babu and P. V. Krishna, “Honey bee behavior inspired load balancing of tasks in cloud computing environments,” Applied Soft Computing Journal, Vol. 13, No. 5, pp. 2292–2303, 2013.
- Y. Zhang, “Dynamic load-balanced multicast based on the Eucalyptus open-source cloud-computing system”, pp. 456 – 460, IEEE, 2011.
- R. Basker, V. R. Uthariaraj, and D. C. Devi, “An enhanced scheduling in weighted round robin for the cloud infrastructure services,” International Journal of Recent Advance in Engineering & Technology, Vol. 2, No. 3, pp. 81–86, 2014.
- Y. Wen, “Load balancing job assignment for clusterbased cloud computing”, pp. 199 – 204, IEEE, 2014.
- Z. Fan, “Simulated-Annealing Load Balancing for Resource Allocation in Cloud Environments”, IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 1-6, Taipei, 2013.
- N. Tziritas, “Application-Aware Workload Consolidation to Minimize Both Energy Consumption and Network Load in Cloud Environments”, IEEE International Conference on Parallel Processing, pp.-449457, Washington D.C., USA, October 2013.
- J. Guo, “An instances placement algorithm based on disk I/O load for big data in private cloud”, IEEE International Conference on Wavelet Active Media Technology and Information Processing, pp. 287-290, 2012.
- J. O. Garcia, “Collaborative Agents for Distributed Load Management in Cloud Data Centres Using Live Migration of Virtual Machines”, IEEE International Conference on Services Computing, pp. 916-929, 2015.
- W. K. Hseih, “Load balancing virtual machines deployment mechanism in SDN open cloud platform”, IEEE International Conference on International Conference on Advanced Communication Technology, pp. 329-335, 2015.
- R. I. Dinita, “Hardware loads and power consumption in cloud computing environments”, IEEE International Conference on International Conference on industrial Technology, pp. 1291-1296, 2013.
- A. Goyal Bharti, “A Study of Load Balancing in Cloud Computing using Soft Computing Techniques”, International Journal of Computer Applications (0975 – 8887) Vol. 92, No.9, April 2014.
- N. Kaur, T.S. Aulakh, R.S. Cheema, “Comparison of Workflow Scheduling Algorithms in Cloud Computing”, International Journal of Advanced Computer Science and Applications, Vol. 2, No. 10, 2011.
- M.S. Rana, S. Kumar, N. Jaisankar, “Comparison of Probabilistic Optimization Algorithms for Resource Scheduling in Cloud Computing Environment” International Journal of Engineering and Technology, pp. 153-163, Vol. 3, No.6, July 2016.
- C. Kalpana, U. Karthick Kumar, R. Gogulan, “Max - Min Particle Swarm Optimization Algorithm with Load Balancing for Distributed Task Scheduling on the Grid Environment”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 3, No. 1, May 2012.
- Android Malware Detection in Official and Third Party Application Stores
Authors
1 I.K Gujral Punjab Technical University, Punjab, IN
2 Baba Banda Singh Bahadur Engg College, Fatehgarh Sahib, Punjab, IN
Source
International Journal of Advanced Networking and Applications, Vol 9, No 4 (2018), Pagination: 3506-3509Abstract
Android is one of the most popular operating system for mobile devices and tablets. The growing number of Android users and open source nature of this platform has also attracted attackers to target Android devices. This paper presents the static and dynamic analysis of the Android applications in order to detect malware. In this work, we have performed permission based and behavioural based filtering of Android applications with the help of malware analysis tools. Our results revel that 80% of the applications request for dangerous permissions. 13% applications consist of malicious activities. Most of the applications are interested in the device data like contact lists, IMEI, IMSI, SMS etc. These results clearly indicate the need for better security measures for Android apps.Keywords
Android Malware, Static Analysis, Dynamic Analysis, Permissions, Applications.References
- A. P. Felt, K. Greenwood, and D. Wagner, The effectiveness of install-time permission systems for thirdparty applications, Technical report, University of California at Berkeley, UCB/EECS-2010-143, Dec 2010.
- D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji, A methodology for empirical analysis of permission-based security models and its application to android, Proc. 17th ACM conference on Computer and communications security, ACM, New York, 2010, 73–84.
- A.P. Felt , E. Chin., S. Hanna, D. Song , D. Wagner, Android permissions demystified, Proc. 8th ACM conference on Computer and communications security, New York, USA. 2011b. 627-638.
- Y. Zhou and X. Jiang, Dissecting android malware: Characterization and evolution, Proc. IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 2012, 95–109.
- A. P. Felt, M. Finifter, E. Chin, D. Wagner, A Survey of Mobile Malware in the Wild, Proc. 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '11), ACM, New York, USA, 2011, 3-14
- Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets. Proceedings of the 19th Network and Distributed System Security Symposium, San Diego, CA, 317-326.
- M. Grace, Y. Zhou, Q. Zhang, S. Zou and X. Jiang , Riskranker: scalable and accurate zero-day android malware detection, Proc. International Conference on Mobile Systems, Applications, and Services, London, UK, 2012, 281–294.
- X. Wei, L. Gomez, I. Neamtiu, and M. Faloutsos, Malicious android applications in the enterprise: What do they do and how do we fix it?1, Proc. IEEE 28th International Conference on Data Engineering Workshops (ICDEW), 251–254, 2012.
- S. Holavanalli, D. Manuel, V. Nanjundaswamy, B. Rosenberg, F. Shen, S. Y. Ko, and L. Ziarek, Flow permissions for android, Proc. 28th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2013, 652–657,2013.
- Y. Zhang, M. Yang, B. Xu, Z. Yang, G. Gu, P. Ning, X. S. Wang, and B. Zang, Vetting undesirable behaviors in android apps with permission use analysis, Proc. 2013 ACM SIGSAC Conference on Computer & Communications Security, 611–622, 2013.
- P. Faruki, V. Ganmoor, V. Laxmi, M. S. Gaur, and A. Bharmal, Androsimilar: Robust statistical feature signature for android malware detection, Proc. International Conference on Security of Information and Networks (SIN’13), Aksaray, Turkey. ACM, 2013, 152– 159
- B. Rashidi, C. Fung, and T. Vu, Recdroid: A resource access permission control portal and recommendation service for smartphone users, Proc. 2014 ACM MobiCom Workshop on Security and Privacy in Mobile Environments (SPME’14), Maui, Hawaii, USA, 2014, 13– 18.
- A. R. Beresford, A. Rice, N. Skehin, and R. Sohan, Mockdroid: Trading privacy for application functionality on smartphones, Proc. 12th Workshop on Mobile Computing Systems and Applications (HotMobile’11), Phoenix, Arizona, USA. ACM, 2011, 49–54.
- I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, Crowdroid: Behavior-based malware detection system for android, Proc. 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM’11), Chicago, Illinois, USA, 2011, 15–26.
- Z. Aung, and W. Zaw, Permission-based Android malware detection, International Journal of Scientific & Technology Research, 2(3), 2013
- S. Ryo, D. Chiba, and S. Goto, Detecting Android Malware by Analyzing Manifest Files, Proc. Asia-Pacific Advanced Network , 2013, 23-31
- S. Rani, and K. Dhindsa, Behavioural Characterization of Android Malware to Detect Similar Malware, International Journal of Research in Electronics and Computer Engineering, 5(4), 2017, pp. 509-514
- A. Kapratwar, Static and Dynamic Analysis of Android Malware, Proc. 1st International Workshop on FORmal methods for Security Engineering In conjunction with the 3rd International Conference on Information Systems Security and Privacy, Porto, Portugal, 2017
- F. Yuhui, and X. Ning, The Analysis of Android Malware Behaviors, International Journal of Security and Its Applications, 9(3), 2015, 335-346
- Efficient Task Scheduling using Load Balancing in Cloud Computing
Authors
1 Department of CSE, Baba Banda Singh Bahadur Engineering College, Fatehgarh Sahib, Punjab, IN
Source
International Journal of Advanced Networking and Applications, Vol 10, No 3 (2018), Pagination: 3888-3892Abstract
Workflow scheduling is a challenging field in computing in which tasks are scheduled according to the user requirement and it becomes costly due to the quality of service demand by the user. Cloud environment has been deployed for this work so as to reduce the overall cost. To maintain & utilize resources in the cloud computing scheduling mechanism is needed. Many algorithms and protocols are used to manage the parallel jobs and resources which are used to enhance the performance of the CPU in the cloud environment. Particles swarm Optimization (PSO) and Grey Wolf Optimization (GWO) are used for effective scheduling. This work is based on the optimization of Total execution time and total execution cost. The results of the proposed approach are found to be effective in compare to existing methods. The particle swarm optimization is initialized by using Pareto distribution. TET and TEC illustrated the minimized cost and time by using the GWO to converge the decision of virtual machine. Thus the work concludes that GWO performs better in compare to existing BAT algorithm.Keywords
Particles Swarm Optimization (PSO), Grey Wolf Optimization (GWO), Virtual Machine, BAT Algorithm.References
- Callagha, S., Deelman, E., Gunter , D., Juve, G., Maechling, P., Brooks , C., Vahi, K., Milner, K., RobertGraves, EdwardField, Okaya, D. and Jorda,T., Scaling up workflow-based applications, Journal of Computer and System Sciences, 76( 6), 2010, 428-446.
- Alkhanak, C., Nabiel ,E. And Peck L., A hyperheuristic cost optimisation approach for Scientific Workflow Scheduling in cloud computing, Future Generation Computer Systems, pp. 5-11, 2018.
- Anubhav, C., Gupta, I., Singh,V. and Jana P., A GSA based hybrid algorithm for bi-objective workflow scheduling in cloud computing, Future Generation Computer Systems , 83(5) , 2018, 14-26.
- Vinothina, V. and Sridaran, R., An Approach for Workflow Scheduling in Cloud Using ACO, Big Data Analytics, Springer, Singapore, 2018, 525-531.
- Zhang, Q., Cheng, L. and Boutaba, R., Cloud computing: state-of-the-art and research challenges, Journal of internet services and applications, 1(1), 2010, 7-18.
- Christian, P., Pandey, S. and Buyya, R., High-performance cloud computing: A view of scientific applications, 10th International Symposium on. IEEE, 2009, 452- 460.
- Zhao, Y., Fei, X., Raicu, I. and Lu, S., Opportunities and challenges in running scientific workflows on the cloud In Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), International Conference on IEEE, 2011, 455-462 .
- Vockler, Sonke, J., Juve, G., Deelman, E., Rynge, M. and Berriman, B., Experiences using cloud computing for a scientific workflow application, In Proceedings of the 2nd international workshop on Scientific cloud computing, 2011, 15-24.
- Ostermann, S., Iosup,A., Yigitbasi, N., Prodan, R., Fahringer,T. and Epema D., A performance analysis of EC2 cloud computing services for scientific computing, In International Conference on Cloud Computing, Springer, Berlin, Heidelberg, 2009, 115-131.
- Deelman, E., Singh, G., Livny M., Berriman, B., and Good , J., The cost of doing science on the cloud: the montage example, In High Performance Computing, Networking, Storage and Analysis, International Conference for Ieee , 2008, 1-12.
- Liu, L., Zhang, M., Buyya, R. and Fan, Q., Deadline‐constrained coevolutionary genetic algorithm for scientific workflow scheduling in cloud computing, Concurrency and Computation: Practice and Experience , 29( 5), 2017, 3111-3119.
- Jyoti, G. and Bhathal,G., Research Paper on Genetic Based Workflow Scheduling Algorithm in Cloud Computing, International Journal of Advanced Research in Computer Science , 8(5) , 2017, 2111-2116.
- Kaur, P. and Mehta, S., Resource provisioning and work flow scheduling in clouds using augmented Shuffled Frog Leaping Algorithm, Journal of Parallel and Distributed Computing , 101 , 2017, 41-50.
- Boloni, L. and Turgut, D., Value of information based scheduling of cloud computing resources, Future Generation Computer Systems , 71 , 2017, 212-220.
- Flow-Based Attack Detection and Defense Scheme against DDoS Attacks in Cluster Based Ad Hoc Networks
Authors
1 Dept. of RIC, I.K. Gujral Punjab Technical University, Kapurthala, Punjab, IN
2 Dept. of CSE, Baba Banda Singh Bahadur Engineering College, Fatehgarh Sahib, Punjab, IN
3 Dept. of Computer Application, Guru Nanak Khalsa College, Yamuna Nagar, Haryana, IN
Source
International Journal of Advanced Networking and Applications, Vol 10, No 4 (2019), Pagination: 3905-3910Abstract
DDoS attacks in MANETs needs to be handled as early as possible so as to avoid them to reach the victim node. DDoS attacks are difficult to detect due to their features like varying attack intensity, large amount of packets etc. so it becomes necessary to distinguish and filter attack traffic in source or intermediate clusters. Here the cluster heads will uses flow based monitoring schemes to identify the suspicious behaviours of incoming traffic in each clusters. Cluster head constructs flows from the incoming traffic and computes normalized entropy for specific time windows. The normalized entropy is compared against threshold entropy to identify the presence of suspicious flows. Later packet rate of suspicious flow is calculated and compared against packet rate entropy to identify the suspicious flows. Later the suspicious flow information is shared with neighbouring cluster heads to further confirm the presence of DDoS attack or not. If DDoS attack is confirmed the packets related to suspicious flows will be discarded. The efficiency and accuracy of proposed attack detection algorithm is evaluated using some performance metrics.Keywords
Clustering, Distributed Denial of Service (DDoS) Attacks, Defense, Flow, MANETs.References
- S. Corson and J. Macker, Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, RFC 2501, 1999. Available at https://www.ietf.org/rfc/rfc2501.txt.
- J. Mirkovic, G. Prier, and P. Reiher, Attacking DDoS at the source, Proc. of ICNP 2002, Paris, France, 2002, 312-321.
- C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, and R. Govindan. Cossack: Coordinated suppression of simultaneous attacks. Proc. DARPA Information Survivability Conference and Exposition, Washington, DC, USA, 2003, 94-96.
- W. Ren, D.Y Yeung, H. Jin, M. Yang, Pulsing RoQ DDoS Attack and Defense Scheme in Mobile Ad Hoc Networks, International Journal of Network Security, 4(2), 2007, 227-234.
- P. Yi, Z. Dai, S. Zhang, Y. Zhong, A New Routing Attack in Mobile Ad Hoc Networks, International Journal of Information Technology, 11(2), 2005, 8394.
- R. Khan, A.K. Vatsa, Detection and Control of DDoS Attacks over Reputation and Score Based MANET, Journal of Emerging Trends in Computing and Information Sciences, 2(11), 2011, 646-655.
- S.A. Arunmozhi, Y. Venkataramani, DDoS Attack and Defense Scheme in Wireless Ad hoc Networks, International Journal of Network Security & Its Applications, 3(3), 2011, 182-187.
- X. Jin, Y. Zhang, Y. Pan, Y. Zhou, ZSBT: A novel algorithm for tracing DoS attackers in MANETs. EURASIP Journal on Wireless Communications and Networking, 2006, 2006:096157, 1-9.
- I. Kim and K. Kim, A resource-efficient IP traceback technique for mobile ad-hoc networks based on timetagged bloom filter, Proc. of Third International Conference on Convergence and Hybrid Information Technology, 2008, 2, 549- 554.
- K. Singh, K. Dhindsa, and B. Bhushan, ThresholdBased Distributed DDoS Attack Detection Mechanism in ISP Networks, Turkish Journal of Electrical Engineering & Computer Sciences, 26(4), 2018, 1796-1811.
- C.E. Shannon, A Mathematical Theory of Communication, Bell System Technical Journal, 27, 1948, 379-423 & 623-656.
- T.M. Cover, and J.A. Thomas, Elements of Information Theory, Second Edition, John Wiley & Sons, 2006.
- A. Varga, The OMNeT++ Discrete Event Simulation System, Proceedings of the European Simulation Multi-conference, Prague, Czech Republic, 2001.
- M. G, and K. TNR, Packet Transfer Rate & Robust Throughput for Mobile Adhoc Network, Int. J. Advanced Networking and Applications, 8(6), 2017, 3242-3245.
- A. Taha, R. Alsaqour, M. Uddin, M. Abdelhaq, and T. Saba, Energy Efficient Multipath Routing Protocol for Mobile Ad-Hoc Network Using the Fitness Function, IEEE Access, 5, 2017, 10369-10381.