使用无服务器架构构建和评估用户网络安全配置文件

A. Parres-Peredo, I. Piza-Dávila, Francisco Cervantes
{"title":"使用无服务器架构构建和评估用户网络安全配置文件","authors":"A. Parres-Peredo, I. Piza-Dávila, Francisco Cervantes","doi":"10.1109/TSP.2019.8768825","DOIUrl":null,"url":null,"abstract":"Serverless computing is a novel usage of cloud computing that offers programmers an environment to execute functions with no concerns on the infrastructure where the code runs. This work presents a serverless implementation of a technique used in cybersecurity, which focuses on the identification of unexpected behaviors from network users by means of TopK rankings. The implementation proposed leverages the potential of serverless computing by integrating the following services from Amazon Web Services: Lambda, DynamoDB, SQS and S3. The running time required to process user network traffic was dramatically reduced in comparison to other implementations of the same algorithm.","PeriodicalId":399087,"journal":{"name":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Building and Evaluating User Network Profiles for Cybersecurity Using Serverless Architecture\",\"authors\":\"A. Parres-Peredo, I. Piza-Dávila, Francisco Cervantes\",\"doi\":\"10.1109/TSP.2019.8768825\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Serverless computing is a novel usage of cloud computing that offers programmers an environment to execute functions with no concerns on the infrastructure where the code runs. This work presents a serverless implementation of a technique used in cybersecurity, which focuses on the identification of unexpected behaviors from network users by means of TopK rankings. The implementation proposed leverages the potential of serverless computing by integrating the following services from Amazon Web Services: Lambda, DynamoDB, SQS and S3. The running time required to process user network traffic was dramatically reduced in comparison to other implementations of the same algorithm.\",\"PeriodicalId\":399087,\"journal\":{\"name\":\"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TSP.2019.8768825\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 42nd International Conference on Telecommunications and Signal Processing (TSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TSP.2019.8768825","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

摘要

无服务器计算是云计算的一种新用法,它为程序员提供了一个执行函数的环境,而不需要考虑代码运行的基础设施。这项工作提出了一种用于网络安全的技术的无服务器实现,其重点是通过TopK排名来识别网络用户的意外行为。提议的实现通过集成Amazon Web services中的以下服务来利用无服务器计算的潜力:Lambda、DynamoDB、SQS和S3。与同一算法的其他实现相比,处理用户网络流量所需的运行时间大大减少。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Building and Evaluating User Network Profiles for Cybersecurity Using Serverless Architecture
Serverless computing is a novel usage of cloud computing that offers programmers an environment to execute functions with no concerns on the infrastructure where the code runs. This work presents a serverless implementation of a technique used in cybersecurity, which focuses on the identification of unexpected behaviors from network users by means of TopK rankings. The implementation proposed leverages the potential of serverless computing by integrating the following services from Amazon Web Services: Lambda, DynamoDB, SQS and S3. The running time required to process user network traffic was dramatically reduced in comparison to other implementations of the same algorithm.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Enhancement of Beat Tracking in String Quartet Music Analysis Based on the Teager-Kaiser Energy Operator Smart Speaker: Suspicious Event Detection with Reverse Mode Speakers Supervised Learning in Multi-Agent Environments Using Inverse Point of View Evaluation of Layer 3 Multipath Solutions using Container Technologies Detecting Cluster Synchronization in Chaotic Dynamic Networks via Information Theoretic Measures
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1