@conference { ISI:000380407100006, title = {A multi-criteria analysis of intrusion detection architectures in cloud environments}, booktitle = {2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15)}, year = {2015}, note = {International Conference on Cloud Computing Technologies and Applications (CloudTech), Marrakech, MOROCCO, JUN 02-04, 2015}, pages = {87-95}, abstract = {Cloud computing promises to increase innovation and the velocity with which applications are deployed all while helping any enterprise meet most IT service needs at a lower total cost of ownership and higher return investment. As the march of cloud continues, it brings both new opportunities and new security challenges. To take advantage of those opportunities while minimizing risks, we argue that Intrusion Detection Systems (IDS) integrated in the cloud is one of the best existing solutions nowadays in the field. The concept of intrusion detection was known since past and was first proposed in 1980s. Since that time IDSs are evolving. However, even several efforts have been made in the area of Intrusion Detection Systems for cloud computing environment, many attacks still prevail. Therefore, the work presented in this paper proposes a multi-criteria analysis and a comparative study between several IDS architectures designed to work in cloud computing environments. To achieve this objective, in the first place we will search in the state of the art for several consistent IDS architectures designed to work in a cloud environment. Whereas, in a second step we will establish the criteria that will be useful for the evaluation of architectures. Later, using the approach of multi-criteria decision analysis MacBeth (Measuring Attractiveness by a Categorical Based Evaluation Technique) we will evaluate the criteria and assign to each one the appropriate weight according to their importance in the field of IDS architectures in cloud computing. The last step is to evaluate architectures against the criteria and collecting results of the model constructed in the previous steps.}, isbn = {978-1-4673-8149-9}, author = {Zbakh, Mostapha and Elmahdi, Khalil and Cherkaoui, Rachid and Enniari, Saad} } @conference { ISI:000380387700087, title = {Performance evaluation of sparse matrix-vector product (SpMV) computation on GPU architecture}, booktitle = {2014 SECOND WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS)}, year = {2014}, note = {2014 Second World Conference on Complex Systems (WCCS), Agadir, MOROCCO, NOV 10-12, 2014}, pages = {23-27}, publisher = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, organization = {Ibn Zohr Univ; Moroccan Soc of Complex Syst; IEEE Morocco; Int Acad for Syst and Cybernet Sci IASCYS}, abstract = {Sparse matrices are entailed in many linear algebra problems such as linear systems resolution, matrix eigenvalues/vectors computation and partial differential equations, wherefore sparse matrix vector product (SpMV) constitutes a basic kernel for solving many scientific and engineering applications problems. With the appearance of Graphics Processing Units (GPUs) as platforms that provides important acceleration factors, the optimization of SpMV on GPUs and its implementation has been a subject of broad research for the last few years. In this work we present a comparative evaluation of sparse matrix vector product (SpMV) on different platforms. We use Cusp library on CUDA architecture GPUs and MKL Intel library as reference on CPUs. Experimental results have been conducted using a set of matrices from matrix market repositoryi, comparing performance between GPU-based Cusp(2)and CPU-based MKL(3)libraries. The results showed a global speedup, obtained with GPU, ranging from 1.1 x to 4.6 x compared to CPU implementations. An analysis and evaluation of these results is discussed.}, isbn = {978-1-4799-4647-1}, author = {Kasmi, Najlae and Mahmoudi, Sidi Ahmed and Zbakh, Mostapha and Manneback, Pierre} } @conference { ISI:000324984400079, title = {Cloud Computing Architectures Based IDS}, booktitle = {PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12)}, year = {2012}, note = {1st International Conference on Complex Systems (ICCS), Agadir, MOROCCO, NOV 05-06, 2012}, pages = {457-462}, abstract = {Today, cloud computing is an attractive and cost-saving saving service for buyers as it provides accessibility and reliability options for users and scalable sales for providers. Before implementing this method of computing, however, it is important to consider the security of the cloud. In this paper, we will present, a classification of specific and traditional attacks to the cloud computing according to their origin and their category, as a solution to protect the cloud from these attacks, the IDS integrated in the cloud remains among the best solution, therefore we will show some existing cloud computing architecture based Intrusion Detection System (IDS), their strengths and weaknesses. For the comparative study between the architectures, we have adopted transparency, alerts analysis, authentication, accountability, dynamic reaction, centralized management, interoperability, deployability and control from front office side as criterion for comparison, as a result of this comparative study, we propose a new architecture in one hand by correcting some weaknesses and in the other hand integrating certain concept.}, isbn = {978-1-4673-4766-2}, author = {Saad, En Niari and El Mahdi, Khalil and Zbakh, Mostapha}, editor = {Essaaidi, M and Nemiche, M} }