Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Using power-law properties of social...
~
Louisiana Tech University.
Using power-law properties of social groups for cloud defense and community detection.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Using power-law properties of social groups for cloud defense and community detection.
Author:
Rice, Justin L.
Description:
99 p.
Notes:
Source: Dissertation Abstracts International, Volume: 74-09(E), Section: B.
Notes:
Adviser: Vir V. Phoha.
Contained By:
Dissertation Abstracts International74-09B(E).
Subject:
Computer Science.
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3570079
ISBN:
9781303095504
Using power-law properties of social groups for cloud defense and community detection.
Rice, Justin L.
Using power-law properties of social groups for cloud defense and community detection.
- 99 p.
Source: Dissertation Abstracts International, Volume: 74-09(E), Section: B.
Thesis (Ph.D.)--Louisiana Tech University, 2013.
The power-law distribution can be used to describe various aspects of social group behavior. For mussels, sociobiological research has shown that the Levy walk best describes their self-organizing movement strategy. A mussel's step length is drawn from a power-law distribution, and its direction is drawn from a uniform distribution. In the area of social networks, theories such as preferential attachment seek to explain why the degree distribution tends to be scale-free. The aim of this dissertation is to glean insight from these works to help solve problems in two domains: cloud computing systems and community detection.
ISBN: 9781303095504Subjects--Topical Terms:
212513
Computer Science.
Using power-law properties of social groups for cloud defense and community detection.
LDR
:03591nmm a2200313 4500
001
419290
005
20140520124010.5
008
140717s2013 ||||||||||||||||| ||eng d
020
$a
9781303095504
035
$a
(MiAaPQ)AAI3570079
035
$a
AAI3570079
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Rice, Justin L.
$3
660329
245
1 0
$a
Using power-law properties of social groups for cloud defense and community detection.
300
$a
99 p.
500
$a
Source: Dissertation Abstracts International, Volume: 74-09(E), Section: B.
500
$a
Adviser: Vir V. Phoha.
502
$a
Thesis (Ph.D.)--Louisiana Tech University, 2013.
520
$a
The power-law distribution can be used to describe various aspects of social group behavior. For mussels, sociobiological research has shown that the Levy walk best describes their self-organizing movement strategy. A mussel's step length is drawn from a power-law distribution, and its direction is drawn from a uniform distribution. In the area of social networks, theories such as preferential attachment seek to explain why the degree distribution tends to be scale-free. The aim of this dissertation is to glean insight from these works to help solve problems in two domains: cloud computing systems and community detection.
520
$a
Privacy and security are two areas of concern for cloud systems. Recent research has provided evidence indicating how a malicious user could perform co-residence profiling and public to private IP mapping to target and exploit customers which share physical resources. This work proposes a defense strategy, in part inspired by mussel self-organization, that relies on user account and workload clustering to mitigate co-residence profiling. To obfuscate the public to private IP map, clusters are managed and accessed by account proxies. This work also describes a set of capabilities and attack paths an attacker needs to execute for targeted co-residence, and presents arguments to show how the defense strategy disrupts the critical steps in the attack path for most cases. Further, it performs a risk assessment to determine the likelihood an individual user will be victimized, given that a successful non-directed exploit has occurred. Results suggest that while possible, this event is highly unlikely.
520
$a
As for community detection, several algorithms have been proposed. Most of these, however, share similar disadvantages. Some algorithms require apriori information, such as threshold values or the desired number of communities, while others are computationally expensive. A third category of algorithms suffer from a combination of the two. This work proposes a greedy community detection heuristic which exploits the scale-free properties of social networks. It hypothesizes that highly connected nodes, or hubs, form the basic building blocks of communities. A detection technique that explores these characteristics remains largely unexplored throughout recent literature. To show its effectiveness, the algorithm is tested on commonly used real network data sets. In most cases, it classifies nodes into communities which coincide with their respective known structures. Unlike other implementations, the proposed heuristic is computationally inexpensive, deterministic, and does not require apriori information.
590
$a
School code: 0109.
650
4
$a
Computer Science.
$3
212513
650
4
$a
Engineering, Computer.
$3
384375
650
4
$a
Psychology, Behavioral.
$3
212473
690
$a
0984
690
$a
0464
690
$a
0384
710
2
$a
Louisiana Tech University.
$b
Computer Science and Engineering.
$3
660330
773
0
$t
Dissertation Abstracts International
$g
74-09B(E).
790
$a
0109
791
$a
Ph.D.
792
$a
2013
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3570079
based on 0 review(s)
Multimedia
Multimedia file
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3570079
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login