Cloud Computing

This dataset is collected from a running Decentralized Application (DApp). When the DApp receives transaction requests stably, we add system pressures with stress-ng, such as I/O pressure to inject anomalies manually. We increase disk pressure for 20 minutes every hour. We keep monitoring the DApp for 12 hours and collect data every 15 seconds, resulting in 3237 samples and 229 resource-related metrics for our experiments. In addition, an important metric that represents the number of transaction failures can be seen as the anomaly indicator of the DApp.

Categories:
265 Views

This dataset is an experimental result of the paper “Performance Evaluation for Geographically Distributed Blockchain-based Services in a Cloud Computing Environment”. The Geographically Distributed Cloud Performance Evaluation Ambassador (GDCPEA) is deployed on each Go Ethereum (Geth) node to measure the elapsed time from the start to the end of the Geth main operations.

Categories:
969 Views

It is now widely known fact that the Cloud computing and Software defined network paradigms have received a wide acceptance from researchers, academia and the industry. But the wider acceptance of cloud computing and SDN paradigms are hampered by increasing security threats. One of the several facts is that the advancements in processing facilities currently available are implicitly helping the attackers to attack in various directions. For example, it is visible that the conventional DoS attacks are now extended to cloud environments as DDoS attacks.

Categories:
3233 Views

With the modern day technological advancements and the evolution of Industry 4.0, it is very important to make sure that the problem of Intrusion detection in Cloud , IoT and other modern networking environments is addressed as an immediate concern. It is a fact that Cloud and Cyber Physical Systems are the basis for Industry 4.0. Thus, intrusion detection in cyber physical systems plays a crucial role in Industry 4.0. Here, we provide the an intrusion detection dataset for performance evaluation of machine learning and deep learning based intrusion detection systems.

Categories:
3319 Views

This dataset contains measurements of TPC-C benchmark executions in MySQL server deployed in Google Cloud Platform.

Categories:
319 Views

Cloud forensics is different than digital forensics because of the architectural implementation of the cloud. In an Infrastructure as a Service (IaaS) cloud model. Virtual Machines (VM) deployed over the cloud can be used by adversaries to carry out a cyber-attack using the cloud as an environment.

Categories:
2332 Views

A proactive and reactive service composition service composition (PRSC) method for CMfg based on digital thread. Firstly, the digital thread-driven information interaction architecture is established, based on which the detailed process of PRSC and the constitution of digital thread are designed.

Categories:
192 Views

This repository contains code and instruction to reproduce the experiments presented in the paper
"A Methodology and Simulation-based Toolchain for Estimating Deployment Performance of Intelligent Collective Services at the Edge"
by Roberto Casadei, Giancarlo Fortino, Danilo Pianini, Andrea Placuzzi, Claudio Savaglio, and Mirko Viroli.

Categories:
232 Views

The dataset contains the navigation measurements obtained in the indoor experiment field. The volunteers move on the whole 4th floor of the Building D of Dong Jiu Teaching classes at Huazhong University of Science and Technology. Meanwhile, the experimental area consists of a total area of 717 m 2. These datasets were used and can be used to test and validate the radio map database updating-based localization positioning algorithm through the RSSI signals space.

Categories:
1305 Views

Pages