Skip to main content

Showing 1–9 of 9 results for author: Bulut, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.11406  [pdf, other

    cs.NI cs.DC

    GreenNFV: Energy-Efficient Network Function Virtualization with Service Level Agreement Constraints

    Authors: MD S Q Zulkar Nine, Tevfik Kosar, Fatih Bulut, **ho Hwang

    Abstract: Network Function Virtualization (NFV) platforms consume significant energy, introducing high operational costs in edge and data centers. This paper presents a novel framework called GreenNFV that optimizes resource usage for network function chains using deep reinforcement learning. GreenNFV optimizes resource parameters such as CPU sharing ratio, CPU frequency scaling, last-level cache (LLC) allo… ▽ More

    Submitted 17 October, 2023; originally announced October 2023.

  2. arXiv:2306.15763  [pdf, other

    cs.SE cs.LG

    Predicting the Impact of Batch Refactoring Code Smells on Application Resource Consumption

    Authors: Asif Imran, Tevfik Kosar, Jaroslaw Zola, Muhammed Fatih Bulut

    Abstract: Automated batch refactoring has become a de-facto mechanism to restructure software that may have significant design flaws negatively impacting the code quality and maintainability. Although automated batch refactoring techniques are known to significantly improve overall software quality and maintainability, their impact on resource utilization is not well studied. This paper aims to bridge the g… ▽ More

    Submitted 27 June, 2023; originally announced June 2023.

  3. arXiv:2206.11187  [pdf, other

    cs.AI cs.CR

    Automated Compliance Blueprint Optimization with Artificial Intelligence

    Authors: Abdulhamid Adebayo, Daby Sow, Muhammed Fatih Bulut

    Abstract: For highly regulated industries such as banking and healthcare, one of the major hindrances to the adoption of cloud computing is compliance with regulatory standards. This is a complex problem due to many regulatory and technical specification (techspec) documents that the companies need to comply with. The critical problem is to establish the map** between techspecs and regulation controls so… ▽ More

    Submitted 22 June, 2022; originally announced June 2022.

    Comments: 5 pages

  4. arXiv:2206.11182  [pdf, other

    cs.CR cs.AI

    Vulnerability Prioritization: An Offensive Security Approach

    Authors: Muhammed Fatih Bulut, Abdulhamid Adebayo, Daby Sow, Steve Ocepek

    Abstract: Organizations struggle to handle sheer number of vulnerabilities in their cloud environments. The de facto methodology used for prioritizing vulnerabilities is to use Common Vulnerability Scoring System (CVSS). However, CVSS has inherent limitations that makes it not ideal for prioritization. In this work, we propose a new way of prioritizing vulnerabilities. Our approach is inspired by how offens… ▽ More

    Submitted 22 June, 2022; originally announced June 2022.

    Comments: 5 pages

  5. arXiv:2206.11171  [pdf, other

    cs.CR cs.AI

    Attack Techniques and Threat Identification for Vulnerabilities

    Authors: Constantin Adam, Muhammed Fatih Bulut, Daby Sow, Steven Ocepek, Chris Bedell, Lilian Ngweta

    Abstract: Modern organizations struggle with insurmountable number of vulnerabilities that are discovered and reported by their network and application vulnerability scanners. Therefore, prioritization and focus become critical, to spend their limited time on the highest risk vulnerabilities. In doing this, it is important for these organizations not only to understand the technical descriptions of the vuln… ▽ More

    Submitted 22 June, 2022; originally announced June 2022.

    Comments: 9 pages

  6. arXiv:1906.11607  [pdf, other

    cs.SE

    Technical Health Check For Cloud Service Providers

    Authors: Muhammed Fatih Bulut, Hongtan Sun, Pritpal Arora, Maja Vukovic, Klaus Koenig, Jonathan Young

    Abstract: Understanding the overall health of an IT Infrastructure is a key part of IT Service Management. Traditional approach to perform technical health check is by visiting customer's physical site and rigorously examining the IT infrastructure with Subject Matter Experts. Alternatively, periodic surveys are sent to Technical Architects who are responsible for the managed IT infrastructure. In essence,… ▽ More

    Submitted 25 June, 2019; originally announced June 2019.

    Comments: 9 pages

  7. arXiv:1904.05867  [pdf, other

    cs.DC cs.NI

    Energy-Efficient High-Throughput Data Transfers via Dynamic CPU Frequency and Core Scaling

    Authors: Luigi Di Tacchio, Zulkar Nine, Tevfik Kosar, Fatih M. Bulut, **ho Hwang

    Abstract: The energy footprint of global data movement has surpassed 100 terawatt hours, costing more than 20 billion US dollars to the world economy. Depending on the number of switches, routers, and hubs between the source and destination nodes, the networking infrastructure consumes 10% - 75% of the total energy during active data transfers, and the rest is consumed by the end systems. Even though there… ▽ More

    Submitted 11 April, 2019; originally announced April 2019.

  8. arXiv:1810.05892  [pdf, other

    cs.NI

    GreenDataFlow: Minimizing the Energy Footprint of Global Data Movement

    Authors: MD S Q Zulkar Nine, Luigi Di Tacchio, Asif Imran, Tevfik Kosar, M. Fatih Bulut, **ho Hwang

    Abstract: The global data movement over Internet has an estimated energy footprint of 100 terawatt hours per year, costing the world economy billions of dollars. The networking infrastructure together with source and destination nodes involved in the data transfer contribute to overall energy consumption. Although considerable amount of research has rendered power management techniques for the networking in… ▽ More

    Submitted 13 October, 2018; originally announced October 2018.

  9. arXiv:1805.08616  [pdf, other

    cs.NI

    Energy-Efficient Mobile Network I/O Optimization at the Application Layer

    Authors: Kemal Guner, MD S Q Zulkar Nine, Tevfik Kosar, Fatih Bulut

    Abstract: Mobile data traffic (cellular + WiFi) will exceed PC Internet traffic by 2020. As the number of smartphone users and the amount of data transferred per smartphone grow exponentially, limited battery power is becoming an increasingly critical problem for mobile devices which depend on the network I/O. Despite the growing body of research in power management techniques for the mobile devices at the… ▽ More

    Submitted 19 May, 2018; originally announced May 2018.

    Comments: arXiv admin note: text overlap with arXiv:1805.03970 and substantial text overlap with arXiv:1707.06826