• Genetic Algorithms For Tightening Security 

      Palumbo, Fabrizio; Buji, Adam; Yazidi, Anis; Haugerud, Hårek (Chapter; Peer reviewed; Conference object, 2022)
      Proper configuration of operating systems and program parameters is known to be a key security factor in order to remove vulnerabilities. It is known that vulnerabilities can be caused by a human misconfiguration or by an ...
    • The Impact of Enterprise Culture on DevOps Adoption: A Study of Security and Collaborative Practices in Software Development 

      Solli, Gry Heidi (Master thesis, 2023)
      Through the years, the need for faster release of software product has increased. DevOps, a combination of software developers and IT operations collaborating together, includes using automation, container technology and ...
    • Implementation of an approach to mitigate Yo-Yo attack in cloud auto-scaling mechanism 

      Mostamand Kashi, Meraj (ACIT;2022, Master thesis, 2022)
      In recent years, global business has witnessed significant cloud adoption, which provides considerable value over traditional datacenters—achieving greater scalability, cost efficiency, and improved performance. Cloud ...
    • Improving Phishing Detection with the Grey Wolf Optimizer 

      Naser Jaber, Aws; Fritsch, Lothar; Haugerud, Hårek (International Conference on Electronics, Information, and Communication (ICEIC);2022 International Conference on Electronics, Information, and Communication (ICEIC), Conference object, 2022-04-11)
      With the recent epidemic of COVID-19-themed scam and phishing, the efficient automated detection of such attacks is crucial. Although many anti-phishing solutions, such as lists and similarity and heuristic-based approaches ...
    • IncludeOS: A minimal, resource efficient unikernel for cloud services 

      Bratterud, Alfred; Walla, Alf-Andre; Haugerud, Hårek; Engelstad, Paal E.; Begnum, Kyrre (IEEE International Conference on Cloud Computing Technology and Science;2015, Journal article; Peer reviewed, 2015)
      The emergence of cloud computing as a ubiquitous platform for elastically scaling services has generated need and opportunity for new types of operating systems. A service that needs to be both elastic and resource efficient ...
    • Investigating the inner workings of container image vulnerability scanners 

      Zarei, Mehdi (ACIT;2022, Master thesis, 2022)
      The use of container technology as a main part of software development increasing exponentially. Containers do not only provide a huge benefit for Integration/Continuous Delivery (CI/CD) pipelines, but also simplify shipping ...
    • Management of high availability services using virtualization 

      Braastad, Espen (Master thesis, 2006)
      This thesis examines the use of virtualization in management of high availability services using open source tools. The services are hosted in virtual machines, which can be seamlessly migrated between the physical nodes ...
    • Maximizing hypervisor scalability using minimal virtual machines 

      Bratterud, Alfred; Haugerud, Hårek (IEEE International Conference on Cloud Computing Technology and Science;, Chapter; Peer reviewed, 2013)
      The smallest instance offered by Amazon EC2 comes with 615MB memory and a 7.9GB disk image. While small by today's standards, embedded web servers with memory footprints well under 100kB, indicate that there is much to be ...
    • Migrating stateful containers using an autonomous collector 

      Knutsen, Kjetil (Master thesis, 2021)
      With the growth of cloud computing and Infrastructure as a Service, and the need to keep costs low many companies tries to utilize all their available resources as much as possible. Today, there is not currently any solution ...
    • Minimum-Impact First: Scheduling Virtual Machines Under Maintenance Scenarios 

      Yazidi, Anis; Haugerud, Hårek; Ung, Frederik; Begnum, Kyrre Matthias (11th ACM International Conference on Management of Digital EcoSystems;, Conference object, 2019)
      Virtual Machine (VM) migration is an important feature for ensuring smooth operations during maintenance and disaster recovery scenarios. The migration might be inter-site and in such a case the inter-site bandwidth which ...
    • Mitigating DDoS using weight-based geographical clustering 

      Kongshavn, Madeleine; Haugerud, Hårek; Yazidi, Anis; Maseng, Torleiv; Hammer, Hugo Lewi (Concurrency and Computation: Practice and Experience;Volume 32, Issue 11, e5679, Journal article; Peer reviewed, 2020-02-22)
      Distributed denial of service (DDoS) attacks have for the last two decades been among the greatest threats facing the internet infrastructure. Mitigating DDoS attacks is a particularly challenging task as an attacker tries ...
    • Monitoring and Analyzing a Game Server Scenario 

      Jelmert, Stian Opsahl (Master thesis, 2008)
      Today, most literature about services in system administration is about conventional services like email servers. How could one monitor and analyze a scenario where the service in question is a game server? As these two ...
    • On automated cloud bursting and hybrid cloud setups using Apache Mesos 

      Haugerud, Hårek; Xue, Noha; Yazidi, Anis (Concurrency and Computation: Practice and Experience;Volume 32, Issue 17, Special Issue: Special Issue on Computational Intelligence Techniques for Industrial and Medical Applications (CITIMA2018). Special Issue on Cloud Computing, IoT, and Big Data: Technologies and Applications (CloudTech17), e5662, Journal article; Peer reviewed, 2020-02-05)
      Hybrid cloud technology is becoming increasingly popular as it merges private and public clouds to bring the best of two worlds together. However, due to the heterogeneous cloud installation, facilitating a hybrid cloud ...
    • Optimizing Power and Energy Efficiency in Cloud Computing 

      Khan, Naveed; Haugerud, Hårek; Shrestha, Raju; Yazidi, Anis (MEDES '19: Proceedings of the 11th International Conference on Management of Digital EcoSystems;, Conference object, 2019)
      With the exponential growth in cloud computing, the steadily increasing amount of power consumption due to the use of physical and virtual machines is becoming a serious challenge. In this context, we report a study on ...
    • Orchestrating Resource Allocation for Interactivevs. Batch Services using a Hybrid Controller 

      Ahmad, Bilal; Yazidi, Anis; Haugerud, Hårek; Farokhi, Soodeh (Chapter; Peer reviewed, 2017)
      Cloud service providers are trying to reduce their operating costs while offering their services with a higher quality via resorting to the concept of elasticity. However, the vast majority of related work focuses solely ...
    • Passive traffic characterization and analysis in heterogeneous IP networks 

      Thorkildssen, Håvard Wik (Master thesis, 2005)
      In this thesis we revisit a handful of well-known experiments, using modern tools, to see if results yielded from earlier experiments are valid for today’s heterogeneous networks. The traffic properties we look at are ...
    • Poster: QoE-Based Analysis of Real-Time Adaptive 360-Degree Video Streaming 

      Midoglu, Cise; Klausen, Magnus; Alay Erduran, Özgü; Yazidi, Anis; Haugerud, Hårek; Griwodz, Carsten (S3: Wireless of the Students, by the Students, for the Students;S3'19: Proceedings of the 2019 on Wireless of the Students, by the Students, and for the Students Workshop, Conference object, 2019-10)
      We propose a QoE-based analysis approach for real-time adaptive 360-degree video streaming measurements, focusing on the correlation between objective video metrics and subjective end-user scores.
    • Quality of Monitoring Optimization in Underwater Sensor Networks through a Multiagent Diversity-Based Gradient Approach 

      Ould-Elhassen Aoueileyine, Mohamed; Bennouri, Hajar; Berqia, Amine; Lind, Pedro; Haugerud, Hårek; Krejcar, Ondrej; Bouallegue, Ridha; Yazidi, Anis (Peer reviewed; Journal article, 2023)
      Due to the complex underwater environment, conventional measurement and sensing methods used for land are difficult to apply directly in the underwater environment. Especially for seabed topography, it is impossible to ...
    • Quality of Monitoring Optimization in Underwater Sensor Networks through a Multiagent Diversity-Based Gradient Approach 

      Ould-Elhassen Aoueileyine, Mohamed; Bennouri, Hajar; Berqia, Amine; Lind, Pedro; Haugerud, Hårek; Krejcar, Ondrej; Bouallegue, Ridha; Yazidi, Anis (Peer reviewed; Journal article, 2023)
      Due to the complex underwater environment, conventional measurement and sensing methods used for land are difficult to apply directly in the underwater environment. Especially for seabed topography, it is impossible to ...
    • Recovering Request Patterns to a CPU Processor from Observed CPU Consumption Data 

      Hammer, Hugo Lewi; Yazidi, Anis; Bratterud, Alfred; Haugerud, Hårek; Feng, Boning (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;188(1), Journal article; Peer reviewed, 2016)
      Statistical queuing models are popular to analyze a computer systems ability to process different types requests. A common strategy is to run stress tests by sending artificial requests to the system. The rate ...