Browsing by Author "Abdelwahed, Sherif"
Now showing items 1-18 of 18
-
A distributed control approach for autonomic performance management in cloud computing environment
Mehrotra, Rajat; Abdelwahed, Sherif; Erradi, Abdelkarim ( IEEE Computer Society , 2013 , Conference Paper)In this paper, a distributed control based performance management approach is developed for a general class of web services deployed in a cloud computing environment. This approach is developed using interaction balance ... -
A finite context intrusion prediction model for cloud systems with a probabilistic suffix tree
Kholidy, Hisham A.; Yousof, Ahmed M.; Erradi, Abdelkarim; Abdelwahed, Sherif; Ali, Hisham Arafat ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)The success of the cloud computing paradigm depends on how effectively the cloud infrastructures will be able to instantiate and dynamically maintain computing platforms that meet Quality of Service (QoS) requirements. ... -
A finite state hidden markov model for predicting multistage attacks in cloud systems
Kholidy, Hisham A.; Erradi, Abdlekarim; Abdelwahed, Sherif; Azab, Abdulrahman ( IEEE , 2014 , Conference Paper)Cloud computing significantly increased the security threats because intruders can exploit the large amount of cloud resources for their attacks. However, most of the current security technologies do not provide early ... -
A hierarchical, autonomous, and forecasting cloud IDS
Kholidy, Hisham A.; Erradi, Abdelkarim; Abdelwahed, Sherif; Baiardi, Fabrizio ( IEEE , 2013 , Conference Paper)Cloud computing supports distributed service oriented paradigm, multi-domain and multi-users administrative infrastructure. Due to the distributed nature of the cloud environment, it has high intrusion prospects and suspect ... -
A model-based approach to self-protection in computing system
Chen, Qian; Abdelwahed, Sherif; Erradi, Abdelkarim ( Association for Computing Machinery, Inc , 2013 , Conference Paper)This paper introduces a model-based autonomic security management (ASM) approach to estimate, detect and identify security attacks along with planning a sequence of actions to effectively protect the networked computing ... -
A model-based validated autonomic approach to self-protect computing systems
Chen, Qian; Abdelwahed, Sherif; Erradi, Abdelkarim ( IEEE , 2014 , Article)This paper introduces an autonomic model-based cyber security management approach for the Internet of Things (IoT) ecosystems. The approach aims at realizing a self-protecting system, which has the ability to autonomously ... -
A Modified Layer of Protection Analysis for Cyber-Physical Systems Security
Tantawy, Ashraf; Erradi, Abdelkarim; Abdelwahed, Sherif ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Layer of Protection Analysis (LOPA) is the most commonly used approach for quantitative safety risk assessment in the process control industry to protect a Cyber- Physical System (CPS) from accidental hazards-causing ... -
A predictive control approach for fault management of computing systems
Jia, Rui; Abdelwahed, Sherif; Erradi, Abdelkarim ( Association for Computing Machinery , 2015 , Conference Paper)In this paper, a model-based predictive control approach for fault management in computing systems is presented. The proposed approach can incorporate existing fault diagnosis methods and fault recovery actions to facilitate ... -
A risk mitigation approach for autonomous cloud intrusion response system
Kholidy, Hisham A.; Erradi, Abdelkarim; Abdelwahed, Sherif; Baiardi , Fabrizio ( Springer-Verlag Wien , 2016 , Article)Cloud computing delivers on-demand resources over the Internet on a pay-for-use basis, intruders may exploit clouds for their advantage. This paper presents Autonomous Cloud Intrusion Response System (ACIRS), a proper ... -
An autonomic detection and protection system for denial of service attack
Chen, Qian; Abdelwahed, Sherif; Erradi, Abdelkarim ( ACTA Press , 2012 , Conference Paper)This paper introduces a self-protection structure for computing system. The proposed structure aims to detect, classify and protect against DoS attacks. This architecture utilizes a model-based decision approach that ... -
Attack Prediction Models for Cloud Intrusion Detection Systems
Kholidy, Hisham A.; Erradi, Abdelkarim; Abdelwahed, Sherif ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)In spite of the functional and economic benefits of the cloud-computing systems, they also expose entirely several attacks. Most of the current cloud security technologies do not provide early warnings about such attacks. ... -
Cyber LOPA: An Integrated Approach for the Design of Dependable and Secure Cyber-Physical Systems
Tantawy, Ashraf; Abdelwahed, Sherif; Erradi, Abdelkarim ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Safety risk assessment is an essential process to ensure a dependable cyber-physical system (CPS) design. Traditional risk assessment considers only physical failures. For modern CPSs, failures caused by cyber attacks are ... -
HA-CIDS: A hierarchical and autonomous IDS for cloud systems
Kholidy, Hisham A.; Erradi, Abdelkarim; Abdelwahed, Sherif; Baiardi, Fabrizio ( IEEE , 2013 , Conference Paper)Cloud computing is an attractive model that provides the delivery of on-demand computing resources over the Internet and on a pay-for-use basis. However, while intruders may exploit clouds for their advantage, most IDS ... -
Model-based risk assessment for cyber physical systems security
Tantawy, Ashraf; Abdelwahed, Sherif; Erradi, Abdelkarim; Shaban, Khaled ( Elsevier , 2020 , Article)Traditional techniques for Cyber-Physical Systems (CPS) security design either treat the cyber and physical systems independently, or do not address the specific vulnerabilities of real time embedded controllers and networks ... -
Online risk assessment and prediction models for Autonomic Cloud Intrusion srevention systems
Kholidy, Hisham A.; Erradi, Abdelkarim; Abdelwahed, Sherif; Yousof, Ahmed M.; Ali, Hisham Arafat ( IEEE , 2014 , Conference Paper)The extensive use of virtualization in implementing cloud infrastructure brings unrivaled security concerns for cloud tenants or customers and introduces an additional layer that itself must be completely configured and ... -
QoS optimization for cloud service composition based on economic model
Kholidy, Hisham A.; Hassan, Hala; Sarhan, Amany M.; Erradi, Abdelkarim; Abdelwahed, Sherif ( Springer Verlag , 2015 , Conference Paper)Cloud service composition is usually long term based and economically driven. Services in cloud computing can be categorized into two groups: Application services and Computing Services. Compositions in the application ... -
Towards model-based management of database fragmentation
Ali, Asim; Jia, Rui; Erradi, Abdelkarim; Abdelwahed, Sherif; Hadjidj, Rachid ( USENIX Association , 2013 , Conference Paper)The performance of a database can significantly deteriorate due to the fragmentation of data/index files. Manual database defragmentation and performance optimization remain time consuming and even infeasible as it requires ... -
Towards Proactive Fault Management of Enterprise Systems
Jia, Rui; Abdelwahed, Sherif; Erradi, Abdelkarim ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)This paper introduces a model-based approach for autonomic fault management of computing systems. The proposed approach can recover a system from common faults while minimizing the impact on the system's quality of service ...