scholarly journals IPV4 and IPV6 based hybrid approach for spam and virus detection

2018 ◽  
Vol 7 (2.4) ◽  
pp. 147
Author(s):  
Swati Hira ◽  
Samir Ajani ◽  
Pratibha Kokardikar ◽  
Shubhangi Neware

The proposed email setup consist of multiple mail servers distributed at two levels to achieve desirable email access performance. It is a well-established fact that 99% of the emails received over internet are either spam or contained viruses and such emails can be dropped at the first entry point of the Network. Thus, the first level in the proposed architecture has been taken as an email gateway which is equipped with antivirus and anti-spam software. Spam assassion is an open source freeware software for filtering of the spam emails. Perl based spamassassion id to CPU and Memory hungry for heavily loaded server thus this new arrangement would then overcome the Problem of slow Email access for users by detaching spamassassion from email repository servers. The second level of the servers with email repositories for users all the email servers used in this implementation would be Linux X86 servers. Virtualization technique presents a software interface to virtual machines that is similar but not identical to that of the underlying hardware. First level is implemented in Virtual machine. So as to provide scalability, portability, migration and vendor independent. 

With the huge development in relocation to distributed computing for customary applications, the interest inHadoop VIRTUALIZATION is the new requirement for further research and improvements. The extreme interest for Hadoop VIRTUALIZATION in distributed computing is been tended to with the innovation improvement and regarding virtual machines. Significantly the equipment segments the executives of virtual machine is impressively achieving the pick of research with the ongoing headways by different organizations and open source explores like AlphaVM, Hyper-V, Integrity Virtual Machines, JPC (Virtual Machine), PowerVM, Sun xVM, VMware Workstation and z LPARs. Another most imperative segment of Hadoop VIRTUALIZATION and virtual machine picture stockpiling is been the bottleneck for the further headway. The impediments are being tended to by bunching and capacity territory organizing, anyway these current arrangements are no counterpart for the modern evaluation interest for the VM picture stockpiling necessities. Subsequently in this work we propose a cloud based virtual machine stockpiling structure intended for huge scale arrangement fulfilling alternate requirements for capacity highlights like replication and estimations of execution enhancements. This work additionally exhibits the headways in execution for Hadoop VIRTUALIZATION the board


2013 ◽  
Vol 307 ◽  
pp. 488-493 ◽  
Author(s):  
Guo Yu Zhao ◽  
Hao Fu Tang ◽  
Li Min Xiao ◽  
Xiu Qiao Li

Enterprise service is transforming from traditional physical computing nodes to virtual machines which provides better isolation and more effective use of computing ability of the hardware. However, the widely deployment of virtual machines also increase the pressure of storage significantly with the fact that each must has at list one multi-gigabytes image file to store. To address the high pressure of storage from virtual machine images, we developed a user level inline deduplication file system with Content Addressable Storage (CAS). We use the open-source framework FUSE to encapsulate the deduplication process so as to achieve portability and flexibility. Compared to an ordinary file system without deduplication, we show that our file system can save at least 30% of space of single VM image and even more of multiple VM images while achieving considerable run time performance.


Author(s):  
Ganesh Chandra Deka ◽  
Prashanta Kumar Das

Virtualization is an old proven technology used for effective utilization of Servers, Storage, and Network for reducing IT expenses without compromising the efficiency and agility for all size businesses. The area of application of Virtualization is very diverse such as e-Learning, Social Networking, and Simulation are a few to be mentioned. This chapter focuses on different virtualization approaches, benefits, architecture of different open source and commercial Virtual Machine Manager (VMM) and Virtual Machines (VM) migration techniques. All the technical terms appearing in this chapter is either defined wherever they appear or explained in the Key Terms and Definitions section of the chapter. The hardware requirements of all the hypervisiors are discussed for hassle free implementation and smooth reading of the chapter.


Author(s):  
Ramandeep Kaur

A lot of research has been done in the field of cloud computing in computing domain.  For its effective performance, variety of algorithms has been proposed. The role of virtualization is significant and its performance is dependent on VM Migration and allocation. More of the energy is absorbed in cloud; therefore, the utilization of numerous algorithms is required for saving energy and efficiency enhancement in the proposed work. In the proposed work, green algorithm has been considered with meta heuristic algorithms, ABC (Artificial Bee colony .Every server has to perform different or same functions. A cloud computing infrastructure can be modelled as Primary Machineas a set of physical Servers/host PM1, PM2, PM3… PMn. The resources of cloud infrastructure can be used by the virtualization technology, which allows one to create several VMs on a physical server or host and therefore, lessens the hardware amount and enhances the resource utilization. The computing resource/node in cloud is used through the virtual machine. To address this problem, data centre resources have to be managed in resource -effective manner for driving Green Cloud computing that has been proposed in this work using Virtual machine concept with ABC and Neural Network optimization algorithm. The simulations have been carried out in CLOUDSIM environment and the parameters like SLA violations, Energy consumption and VM migrations along with their comparison with existing techniques will be performed.


Author(s):  
Gurpreet Singh ◽  
Manish Mahajan ◽  
Rajni Mohana

BACKGROUND: Cloud computing is considered as an on-demand service resource with the applications towards data center on pay per user basis. For allocating the resources appropriately for the satisfaction of user needs, an effective and reliable resource allocation method is required. Because of the enhanced user demand, the allocation of resources has now considered as a complex and challenging task when a physical machine is overloaded, Virtual Machines share its load by utilizing the physical machine resources. Previous studies lack in energy consumption and time management while keeping the Virtual Machine at the different server in turned on state. AIM AND OBJECTIVE: The main aim of this research work is to propose an effective resource allocation scheme for allocating the Virtual Machine from an ad hoc sub server with Virtual Machines. EXECUTION MODEL: The execution of the research has been carried out into two sections, initially, the location of Virtual Machines and Physical Machine with the server has been taken place and subsequently, the cross-validation of allocation is addressed. For the sorting of Virtual Machines, Modified Best Fit Decreasing algorithm is used and Multi-Machine Job Scheduling is used while the placement process of jobs to an appropriate host. Artificial Neural Network as a classifier, has allocated jobs to the hosts. Measures, viz. Service Level Agreement violation and energy consumption are considered and fruitful results have been obtained with a 37.7 of reduction in energy consumption and 15% improvement in Service Level Agreement violation.


Author(s):  
Yuancheng Li ◽  
Pan Zhang ◽  
Daoxing Li ◽  
Jing Zeng

Background: Cloud platform is widely used in electric power field. Virtual machine co-resident attack is one of the major security threats to the existing power cloud platform. Objective: This paper proposes a mechanism to defend virtual machine co-resident attack on power cloud platform. Method: Our defense mechanism uses the DBSCAN algorithm to classify and output the classification results through the random forest and uses improved virtual machine deployment strategy which combines the advantages of random round robin strategy and maximum/minimum resource strategy to deploy virtual machines. Results: we made a simulation experiment on power cloud platform of State Grid and verified the effectiveness of proposed defense deployment strategy. Conclusion: After the virtual machine deployment strategy is improved, the coverage of the virtual machine is remarkably reduced which proves that our defense mechanism achieves some effect of defending the virtual machine from virtual machine co-resident attack.


2014 ◽  
Vol 1046 ◽  
pp. 508-511
Author(s):  
Jian Rong Zhu ◽  
Yi Zhuang ◽  
Jing Li ◽  
Wei Zhu

How to reduce energy consumption while improving utility of datacenter is one of the key technologies in the cloud computing environment. In this paper, we use energy consumption and utility of data center as objective functions to set up a virtual machine scheduling model based on multi-objective optimization VMSA-MOP, and design a virtual machine scheduling algorithm based on NSGA-2 to solve the model. Experimental results show that compared with other virtual machine scheduling algorithms, our algorithm can obtain relatively optimal scheduling results.


Author(s):  
Pritam Patange

Abstract: Cloud computing has experienced significant growth in the recent years owing to the various advantages it provides such as 24/7 availability, quick provisioning of resources, easy scalability to name a few. Virtualization is the backbone of cloud computing. Virtual Machines (VMs) are created and executed by a software called Virtual Machine Monitor (VMM) or the hypervisor. It separates compute environments from the actual physical infrastructure. A disk image file representing a single virtual machine is created on the hypervisor’s file system. In this paper, we analysed the runtime performance of multiple different disk image file formats. The analysis comprises of four different parameters of performance namely- bandwidth, latency, input-output operations performed per second (IOPS) and power consumption. The impact of the hypervisor’s block and file sizes is also analysed for the different file formats. The paper aims to act as a reference for the reader in choosing the most appropriate disk file image format for their use case based on the performance comparisons made between different disk image file formats on two different hypervisors – KVM and VirtualBox. Keywords: Virtualization, Virtual disk formats, Cloud computing, fio, KVM, virt-manager, powerstat, VirtualBox.


2018 ◽  
Vol 17 (2) ◽  
pp. 7335-7349
Author(s):  
Rashid Alakbarov

The article analyzes the advantages of mobile cloud technologies and problems emerging during the use of those. The network infrastructure created based on cloudlets at the second level of mobile cloud computing with hierarchical structure is analyzed. At the same time, the article explores the issues of satisfaction of demand of mobile equipment for computing and memory resources by using these technologies. The article presents one solution for the allocation of mobile user requests in virtual machines created in cloudlets located near base stations of wireless metropolitan area networks (WMAN) in a balanced way by considering the technical capacity of those. Alongside, the article considers the solution of user problem during designated time and the issue of determining virtual machines satisfying other requirements. For this purpose, different characteristics of the stated problem, virtual machines, as well as communication channels between a user and virtual machines are considered. By using possible values determining the importance of cloudlets, conditions for loading software applications of a user to a virtual machine are explored and an appropriate method is proposed.


2021 ◽  
Vol 4 (2) ◽  
pp. 192-203
Author(s):  
Ida Bagus Ary Indra Iswara ◽  
I Putu Pedro Kastika Yasa

The use of video conferencing technology is increasing due to the COVID-19 pandemic. Bigbluebutton and jitsi are examples of open source video conferencing platforms that can be installed on their own servers. The server is created using a cloud-based virtual machine. Analysis of quality of service which includes delay, packet loss, throughput, and jitter is needed to determine the quality of service and the comparison of the two platforms. Observations were also made on the use of CPU, memory / RAM, and disk usage for each server. There are 3 test scenarios carried out. Each scenario is carried out on each existing VM specification. From this test, it is known that in the delay parameter, the highest bigbluebutton is obtained, which is 35,35 ms. And then the highest jitsi delay is 17,66 ms. In packet loss parameters, jitsi obtained the highest yield, namely 0,29%, while for bigbluebutton only 0,16% of packet loss was the highest. Throughput, bigbluebutton and jitsi all got very bad results. However, bigbluebutton obtained better results, namely, the highest throughput was 5.6%. While Jitsi obtained the highest throughput, namely 2,8%. Whereas for the jitter parameter, jitsi obtained 0,00 ms results on all tests in each VM. Meanwhile, bigbluebutton, get 0,1 ms on test 3 on VM 1


Sign in / Sign up

Export Citation Format

Share Document