Betreute Abschlussarbeiten

2 Entries found


Trust-Oriented Recommender System for Cloud Reputation Services

Master Thesis

in progress

The latest trend in computing world is the cloud computing which is Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. There are numbers of cloud providers that provide different services, e.g. Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), to users. Users need to select the most trustworthy service provider that they can totally rely upon to fulfil their demands. For this purpose, trust calculation plays an important role. Because the limited Web interfaces do not allow users to identify the trustworthiness of service providers like typical face-to-face interaction. Users can find the trustworthiness of a service provider in cloud reputation services, e.g. TaaS4Cloud.  The functionality of this web service can be enhanced by users’ ratings and recommendations to make it more user-centric. So that users can select the appropriate provider they need. In this case, trustworthiness of the users should also be considered to get more dependable recommendations. We can fulfil these requirements of users to select the most trustworthy providers by implementing a trust-oriented recommender system for cloud reputation services.


HoneyDrone - A Honeypot for Drone Systems

Master Thesis


Nowadays, the number and sophistication of cyberattacks is  constantly  increasing.  To  cope  with  this,  security  solutions  such  as  Intrusion Detection Systems (IDSs)  are  considered  a  mandatory  line of  defense  for  any  critical  network.  However,  IDSs usually employ passive monitoring techniques.  Honeypots emerged from the need for more active monitoring.

Honeypots are systems whose only value is to be probed, attacked and compromised. Their purpose is to attract malicious users, study their activities and, at the same time, reduce the attack surface of the monitored network. It is important to note that since honeypots do not feature any other purpose; by definition, any interaction with them is considered an attack. Thus, they do not exhibit false positives, i.e., all incoming traffic is considered malicious.

A A A | Drucken Print | Impressum Impressum | Sitemap Sitemap | Suche Search | Kontakt Contact | Website Analysis: More Information
zum Seitenanfangzum Seitenanfang