Print
Category: Articles Archive
Hits: 2344

 

Int. J. of Comp. & Info. Tech. (2018) 6(1): 01-76

Volume 6, Issue 1;  March 2018 


 

P2P Botnet Detection Based on Traffic Behavior Analysis and Classification

Hojjat Beiknejad 1,*, Hamed Vahdat-Nejad 1Hossein Moodi 2

1 Faculty of Electrical and Computer Engineering, University of Birjand, Birjand, Iran
2 Department of Computer Engineering, Birjand University of Technology, Birjand, Iran

AbstractNowadays, botnets are being considered as the most important security threats in the internet and it is important to find new ways for their detection. Peer to Peer (P2P) botnets are the most important kinds of botnets that use P2P communication protocols to control their bots remotely. Therefore, their detection is more difficult than other botnets. more ...


Review Paper

An Aware Technique of Energy-Aware for Task Consolidation in Cloud Computing

Ali Nejadmazare 1, *

1 Faculty of Engineering, Abadan Branch, Islamic Azad University (IAU), Abadan, Iran 

AbstractTask consolidation can be considered as a strategy to maximize the availability of cloud computing resources, which includes many benefits, including: a. better use of resources; b. resource maintenance in a rational way; c. customization of the IT service (IT), d. Reliable Services, e. QoS (Quality of Service) and etc. However, maximizing the rates of use and utilization of tasks does not mean efficient use of energy. more ...


This Issue is updating and other papers will be uploaded as soon.