Search For:

Displaying 1-10 out of 10 total
A Queueing Model to Achieve Proper Elasticity for Cloud Cluster Jobs
Found in: 2013 IEEE 6th International Conference on Cloud Computing (CLOUD)
By Khaled Salah
Issue Date:June 2013
pp. 755-761
Achieving proper elasticity for cloud jobs is a challenging research problem and far from being solved. In this paper, we focus on how to achieve proper elasticity for highly parallelized jobs which run on cloud clusters. In particular, we present an analy...
Using Cloud Computing to Implement a Security Overlay Network
Found in: IEEE Security & Privacy
By Khaled Salah,Jose M. Alcaraz Calero,Sherali Zeadally,Sameera Al-Mulla,Mohammed Alzaabi
Issue Date:January 2013
pp. 44-53
This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service ...
Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP Addresses
Found in: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Fahd Al-Haidari,Mohammed H. Sqalli,Khaled Salah
Issue Date:June 2012
pp. 1167-1174
Cloud computing has become one of the fastest growing segments in IT industry. A cloud introduces resource-rich computing platforms, where adopters are charged based on the usage of the cloud's resources, known as "pay-as-you-use" or utility comp...
EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing
Found in: Utility and Cloud Computing, IEEE Internatonal Conference on
By Mohammed H. Sqalli,Fahd Al-Haidari,Khaled Salah
Issue Date:December 2011
pp. 49-56
Cloud computing is currently one of the most hyped information technology fields and it has become one of the fastest growing segments of IT. Cloud computing allows us to scale our servers in magnitude and availability in order to provide services to a gre...
Identifying Scanning Activities in Honeynet Data Using Data Mining
Found in: Computational Intelligence, Communication Systems and Networks, International Conference on
By Mohammed H. Sqalli,Shoieb Arshad,Mohammad Khalaf,Khaled Salah
Issue Date:July 2011
pp. 178-183
Businesses attract different types of attacks mostly due to the financial benefits associated with gaining unauthorized access. As a first step to launching attacks, attackers scan production networks looking for open services and vulnerable software. Thes...
Periodic Route Optimization for Handed-Off Connections in Wireless ATM Networks
Found in: Local Computer Networks, Annual IEEE Conference on
By Khaled Salah, Elias Drakopoulos, Tzilla Elrad
Issue Date:October 1999
pp. 80
In Wireless ATM networks, user connections need to be rerouted during handoff as mobile users move among base stations. The rerouting of connections must be done quickly with minimal disruption to traffic. In addition, the resulting routes must be optimal....
A Two-Phase Inter-Switch Handoff Scheme for Wireless ATM Networks
Found in: Computer Communications and Networks, International Conference on
By Khaled Salah, Elias Drakopoulos
Issue Date:October 1998
pp. 708
Supporting mobility in Wireless ATM networks poses a number of technical issues. An important issue is the ability to reroute on-going virtual connections during handoff as mobile users move among base stations. We propose a two-phase inter-switch handoff ...
An Analytical Model for Evaluating Interrupt-Driven System Performance of Gigabit Ethernet Hosts with Finite Buffer
Found in: Computers and Communications, IEEE Symposium on
By Khaled Salah
Issue Date:June 2005
pp. 983-988
A novel analytical model based on Markov processes is developed to study the impact of interrupt overhead on operating system performance of network hosts such as PC-based routers, servers, and end hosts when subjected to Gigabit network traffic. Under hea...
Harnessing the cloud for teaching cybersecurity
Found in: Proceedings of the 45th ACM technical symposium on Computer science education (SIGCSE '14)
By Khaled Salah
Issue Date:March 2014
pp. 529-534
Cloud computing has become an attractive paradigm for many organizations in government, industry as well as academia. In academia, the cloud can offer instructors and students (whether local or at a distance) on-demand, dedicated, isolated, unlimited, and ...
Resiliency of open-source firewalls against remote discovery of last-matching rules
Found in: Proceedings of the 2nd international conference on Security of information and networks (SIN '09)
By Karim Sattar, Khaled Salah, Mohammed Sqalli, Prasad Calyam, Zubair Baig
Issue Date:October 2009
pp. 186-192
In today's networks, firewalls act as the first line of defense against unwanted and malicious traffics. Firewalls themselves can become targets of DoS attacks, thus jeopardizing their primary operation to filter traffic. Typically, packets are checked aga...