Volume 11 Number 1 June 2024

    
Enhancing Web Architecture to Counter Cloud Security Attacks

Vlad Andrei Poenaru, George Suciu, Cristian George Cernat, Gyorgy Todoran and Traian Lucian Militaru

https://doi.org/10.6025/isej/2024/11/1/8-12

Abstract Cloud technology is becoming a prominent tool for delivering web applications. However, research is scarce on the impact of Distributed Denial of Service (DDOS) on clouds and how various attack methods compare to robust cloud designs. Can cloud technology withstand these attacks, or will traditional web architectures, enhanced with efficient caching and reverse proxy solutions, consistently outperform? This study addresses... Read More


A Strategy For Spotting Irregularities in Unix Shell Activities Using a Pre-trained DistilBERT Model in Computer Security

Zefang Liu, John F. Buford

https://doi.org/10.6025/isej/2024/11/1/13-28

Abstract Identifying irregularities in command shell activities is crucial to maintaining computer security. Significant progress has been made in deep learning and natural language understanding, especially with transformer-based models, which have shown considerable potential in tackling intricate security issues. In this study, we present a thorough strategy for spotting irregularities in Unix shell activities using a pre-trained DistilBERT model, combining both... Read More