Scheduling Parallel Intrusion Detecting Applications on Hybrid Clouds

Recently, Parallel Intrusion Detection (PID) becomes very popular and its procedure of the parallel processing is called a PID application (PIDA). This PIDA can be regarded as a Bag-of-Tasks (BoT) application, consisting of multiple tasks that can be processed in parallel. Given multiple PIDAs (i.e....

Full description

Bibliographic Details
Main Authors: Yi Zhang, Jin Sun, Zebin Wu, Shuangyu Xie, Ruitao Xu
Format: Article
Language:English
Published: Hindawi-Wiley 2018-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2018/2863793
id doaj-aa14c679e04b48488a02908629ecc2f0
record_format Article
spelling doaj-aa14c679e04b48488a02908629ecc2f02020-11-25T01:09:31ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222018-01-01201810.1155/2018/28637932863793Scheduling Parallel Intrusion Detecting Applications on Hybrid CloudsYi Zhang0Jin Sun1Zebin Wu2Shuangyu Xie3Ruitao Xu4School of Computer Science and Engineering, Nanjing University of Science and Technology, No. 200 Xiaolingwei Street, Nanjing, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, No. 200 Xiaolingwei Street, Nanjing, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, No. 200 Xiaolingwei Street, Nanjing, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, No. 200 Xiaolingwei Street, Nanjing, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, No. 200 Xiaolingwei Street, Nanjing, ChinaRecently, Parallel Intrusion Detection (PID) becomes very popular and its procedure of the parallel processing is called a PID application (PIDA). This PIDA can be regarded as a Bag-of-Tasks (BoT) application, consisting of multiple tasks that can be processed in parallel. Given multiple PIDAs (i.e., BoT applications) to be handled, when the private cloud has insufficiently available resources to afford all tasks, some tasks have to be outsourced to public clouds with resource-used costs. The key challenge here is how to schedule tasks on hybrid clouds to minimize makespan given a limited budget. This problem can be formulated as an Integer Programming model, which is generally NP-Hard. Accordingly, in this paper, we construct an Iterated Local Search (ILS) algorithm, which employs an effective heuristic to obtain the initial task sequence and utilizes an insertion-neighbourhood-based local search method to explore better task sequences with lower makespans. A swap-based perturbation operator is adopted to avoid local optimum. With the objective of improving the proposal’s efficiency without loss of any effectiveness, to calculate task sequences’ objectives, we construct a Fast Task Assignment (FTA) method by integrating an existing Task Assignment (TA) method with an acceleration mechanism designed through theoretical analysis. Accordingly, the proposed ILS is named FILS. Experimental results show that FILS outperforms the existing best algorithm for the considered problem, considerably and significantly. More importantly, compared with TA, FTA achieves a 2.42x speedup, which verifies that the acceleration mechanism employed by FTA is able to remarkably improve the efficiency. Finally, impacts of key factors are also evaluated and analyzed, exhaustively.http://dx.doi.org/10.1155/2018/2863793
collection DOAJ
language English
format Article
sources DOAJ
author Yi Zhang
Jin Sun
Zebin Wu
Shuangyu Xie
Ruitao Xu
spellingShingle Yi Zhang
Jin Sun
Zebin Wu
Shuangyu Xie
Ruitao Xu
Scheduling Parallel Intrusion Detecting Applications on Hybrid Clouds
Security and Communication Networks
author_facet Yi Zhang
Jin Sun
Zebin Wu
Shuangyu Xie
Ruitao Xu
author_sort Yi Zhang
title Scheduling Parallel Intrusion Detecting Applications on Hybrid Clouds
title_short Scheduling Parallel Intrusion Detecting Applications on Hybrid Clouds
title_full Scheduling Parallel Intrusion Detecting Applications on Hybrid Clouds
title_fullStr Scheduling Parallel Intrusion Detecting Applications on Hybrid Clouds
title_full_unstemmed Scheduling Parallel Intrusion Detecting Applications on Hybrid Clouds
title_sort scheduling parallel intrusion detecting applications on hybrid clouds
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2018-01-01
description Recently, Parallel Intrusion Detection (PID) becomes very popular and its procedure of the parallel processing is called a PID application (PIDA). This PIDA can be regarded as a Bag-of-Tasks (BoT) application, consisting of multiple tasks that can be processed in parallel. Given multiple PIDAs (i.e., BoT applications) to be handled, when the private cloud has insufficiently available resources to afford all tasks, some tasks have to be outsourced to public clouds with resource-used costs. The key challenge here is how to schedule tasks on hybrid clouds to minimize makespan given a limited budget. This problem can be formulated as an Integer Programming model, which is generally NP-Hard. Accordingly, in this paper, we construct an Iterated Local Search (ILS) algorithm, which employs an effective heuristic to obtain the initial task sequence and utilizes an insertion-neighbourhood-based local search method to explore better task sequences with lower makespans. A swap-based perturbation operator is adopted to avoid local optimum. With the objective of improving the proposal’s efficiency without loss of any effectiveness, to calculate task sequences’ objectives, we construct a Fast Task Assignment (FTA) method by integrating an existing Task Assignment (TA) method with an acceleration mechanism designed through theoretical analysis. Accordingly, the proposed ILS is named FILS. Experimental results show that FILS outperforms the existing best algorithm for the considered problem, considerably and significantly. More importantly, compared with TA, FTA achieves a 2.42x speedup, which verifies that the acceleration mechanism employed by FTA is able to remarkably improve the efficiency. Finally, impacts of key factors are also evaluated and analyzed, exhaustively.
url http://dx.doi.org/10.1155/2018/2863793
work_keys_str_mv AT yizhang schedulingparallelintrusiondetectingapplicationsonhybridclouds
AT jinsun schedulingparallelintrusiondetectingapplicationsonhybridclouds
AT zebinwu schedulingparallelintrusiondetectingapplicationsonhybridclouds
AT shuangyuxie schedulingparallelintrusiondetectingapplicationsonhybridclouds
AT ruitaoxu schedulingparallelintrusiondetectingapplicationsonhybridclouds
_version_ 1725178392800657408