[PDF][PDF] ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV).

A Tabiban, H Zhao, Y Jarraya, M Pourzandi, M Zhang… - NDSS, 2022 - researchgate.net
Network functions virtualization (NFV) enables agile deployment of network services on top
of clouds. However, as NFV involves multiple levels of abstraction representing the same …

Application of learning algorithms in smart home IoT system security

J Mao, Q Lin, J Bian - Mathematical foundations of computing, 2018 - aimsciences.org
With the rapid development of Internet of Things (IoT) technologies, smart home systems are
getting more and more popular in our daily life. Besides providing convenient functionality …

An approach to cloud execution failure diagnosis based on exception logs in openstack

Y Yuan, W Shi, B Liang, B Qin - 2019 IEEE 12th International …, 2019 - ieeexplore.ieee.org
Cloud is getting ubiquitous and scales up rapidly. It is critical to effectively detect and
efficiently repair system anomalies for a robust cloud. Many efforts have been made to …

Prospec: Proactive security policy enforcement for containers

H Kermabon-Bobinnec, M Gholipourchoubeh… - Proceedings of the …, 2022 - dl.acm.org
By providing lightweight and portable support for cloud native applications, container
environments have gained significant momentum lately. A container orchestrator such as …

Kunerva: Automated network policy discovery framework for containers

S Lee, J Nam - IEEE Access, 2023 - ieeexplore.ieee.org
Containerization has gained significant popularity in cloud-native applications, offering
lightweight and portable capabilities, with container orchestration platforms such as …

Continuous compliance

M Kellogg, M Schäf, S Tasiran, MD Ernst - Proceedings of the 35th IEEE …, 2020 - dl.acm.org
Vendors who wish to provide software or services to large corporations and governments
must often obtain numerous certificates of compliance. Each certificate asserts that the …

ProSAS: Proactive Security Auditing System for Clouds

S Majumdar, GS Chawla… - … on Dependable and …, 2021 - ieeexplore.ieee.org
The multi-tenancy in a cloud along with its dynamic and self-service nature could cause
severe security concerns, such as isolation breaches among cloud tenants. To mitigate such …

Permon: An openstack middleware for runtime security policy enforcement in clouds

A Tabiban, S Majumdar, L Wang… - 2018 IEEE Conference …, 2018 - ieeexplore.ieee.org
To ensure the accountability of a cloud environment, security policies may be provided as a
set of properties to be enforced by cloud providers. However, due to the sheer size of clouds …

Learning probabilistic dependencies among events for proactive security auditing in clouds

S Majumdar, A Tabiban, Y Jarraya… - Journal of …, 2019 - content.iospress.com
Security compliance auditing is a viable solution to ensure the accountability and
transparency of a cloud provider to its tenants. However, the sheer size of a cloud, coupled …

Learning-based anomaly cause tracing with synthetic analysis of logs from multiple cloud service components

Y Yuan, H Anu, W Shi, B Liang… - 2019 IEEE 43rd Annual …, 2019 - ieeexplore.ieee.org
It is critical for a reliable cloud to effectively find out root causes of the cloud service
anomalies for efficacious treatment. System logs are widely used for anomaly detection and …