Conveners
Session 1A - Cloud Computing and Network Virtualisation
- Mihai CARABAȘ (Agency ARNIEC/RoEduNet, University Politehnica of Bucharest)
Description
Online participation available here
https://acecloud.webex.com/acecloud/j.php?MTID=me480250a7ecfecd2627bea2b43b3030c
In the years, ARM started to take its share of the personal computers and server markets.
Their CPUs are known for their low power consumption and mobile market supremacy. In these new areas, virtualization is used to provide working machines in the cloud and create secure environments.
The FreeBSD community started developing an ARM-based hypervisor, but it was not tested on real hardware...
In this paper we present a mechanism to automate network traffic monitoring by using Docker images. The application has three parts: a Snort3 application for capturing network traffic, a Grafana application to display statistics on the dashboard and a custom API that makes the connection between Snort3 and Grafana. We pushed these images to DockerHub. An automation script that executes all...
The domain of cyber security represents a constant struggle between researchers and hackers, a continuous competition where the global digital infrastructure is at stake. Throughout the years, various protective measures have been developed to prevent against an increasing number of exploits that are becoming more and more complex and refined. Instead of concentrating on general mitigating...
The Flask framework is used for implementing a simple web app that allows any user to visualize and monitor computing resources that it has access to. The resources are virtualized, deployed, and managed through the OpenStack infrastructure. Within the web app, the user can see the entire set of virtual machines as a topological view or check system information as graphical representations...
The exploit of network traffic has become common due to the increased flow of web traffic from services like HTTP, FTP, SMTP etc. The number of cyberattacks has grown due to the fact that they require different information about a target with the purpose of intimidating, blackmailing or harassing a person or a company. Servers of medical and dental organizations have become a good source of...