“…Furthermore, the paper demonstrates the ways services are accessed by nodes in a cluster using docker swarm and Kubernetes, as well as the differences between the two. [3] The primary purpose of this study is to examine current Docker container orchestration choices. Presently, three orchestrators are extensively used: Docker Swarm, Kubernetes, and OpenShift.…”
Centaurus is an open source software that facilitates the effective development of distributed computing applications in 5G cloud environment. This is necessary for efficient application development since Kubernetes is lacking multi-tenant capability and also in the provision of security. In this scenario, Centaurus can be used to build these gaps. In this project work, a new user and security management tool has been developed for Kubernetes platform using Centaurus. The major tools developed in this project work are User management tool using login feature, tool for clustering and role creation, Multi-Tenant Management tool, Namespace management and virtual machine management tool and a role based access control tool for enhancing the security of distributed applications. Moreover, for enhancing the security of applications developed using Centaurus, a new Role Based Access Control tool has been developed in this project work. This Role Based Access Control tool provides facilities for creating roles, assigning privileges, securing applications based on user privileges and finally the facility for revoking the privileges in order to enhance the security of the system. The major advantages of the system developed in this project work include the increase in Usability, flexibility and security of the applications.
“…Furthermore, the paper demonstrates the ways services are accessed by nodes in a cluster using docker swarm and Kubernetes, as well as the differences between the two. [3] The primary purpose of this study is to examine current Docker container orchestration choices. Presently, three orchestrators are extensively used: Docker Swarm, Kubernetes, and OpenShift.…”
Centaurus is an open source software that facilitates the effective development of distributed computing applications in 5G cloud environment. This is necessary for efficient application development since Kubernetes is lacking multi-tenant capability and also in the provision of security. In this scenario, Centaurus can be used to build these gaps. In this project work, a new user and security management tool has been developed for Kubernetes platform using Centaurus. The major tools developed in this project work are User management tool using login feature, tool for clustering and role creation, Multi-Tenant Management tool, Namespace management and virtual machine management tool and a role based access control tool for enhancing the security of distributed applications. Moreover, for enhancing the security of applications developed using Centaurus, a new Role Based Access Control tool has been developed in this project work. This Role Based Access Control tool provides facilities for creating roles, assigning privileges, securing applications based on user privileges and finally the facility for revoking the privileges in order to enhance the security of the system. The major advantages of the system developed in this project work include the increase in Usability, flexibility and security of the applications.
“…You can manage hundreds or thousands of containers at production scale with this hugely well-liked framework. It is supported by an ardent open-source community and is generally portable [11].…”
Microservices are emerging as a new computing paradigm which is a suitable complementation of cloud computing. Microservices decompose traditional monolithic applications into a set of fine-grained services which can be independently developed, tested and deployed. In this work we have developed an e-commerce web application using microservices architecture. The drawbacks of monolithic architecture are overcome by microservices in building the e-commerce web application. The web application is developed using MERN stack technology. The services developed in the application are containerized using Docker containers. The containerized services are then managed using Kubernetes which is an orchestration platform. Skaffold is used in the application to sync local code files with the cold files in Docker. The events emitted by services are managed using an event bus called NATS streaming server.
“…Thus, virtual machines (using OpenStack) were added in the Clients (legitimate traffic) network that use the services alongside with students and researchers. Based on an Ubuntu 20.04 server template, multiple workers, along with a Kubernetes orchestrator [ 30 ], were created, that became part of the vulnerable servers’ clients, in addition to students and researchers. Since the platforms used are Moodle instances (eLearning platform), to generate legitimate traffic, JMeter scripts were run to simulate a user’s activity: login, check courses and assignments and logout.…”
Section: Proposition Of the Roedunet2021 Datasetmentioning
Cybersecurity is an arms race, with both the security and the adversaries attempting to outsmart one another, coming up with new attacks, new ways to defend against those attacks, and again with new ways to circumvent those defences. This situation creates a constant need for novel, realistic cybersecurity datasets. This paper introduces the effects of using machine-learning-based intrusion detection methods in network traffic coming from a real-life architecture. The main contribution of this work is a dataset coming from a real-world, academic network. Real-life traffic was collected and, after performing a series of attacks, a dataset was assembled. The dataset contains 44 network features and an unbalanced distribution of classes. In this work, the capability of the dataset for formulating machine-learning-based models was experimentally evaluated. To investigate the stability of the obtained models, cross-validation was performed, and an array of detection metrics were reported. The gathered dataset is part of an effort to bring security against novel cyberthreats and was completed in the SIMARGL project.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.