XML Schema-Based Minification for Communication of Security Information and Event Management (SIEM) Systems in Cloud Environments
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 9
Abstract
XML-based communication governs most of today’s systems communication, due to its capability of representing complex structural and hierarchical data. However, XML document structure is considered a huge and bulky data that can be reduced to minimize bandwidth usage, transmission time, and maximize performance. This contributes to a more efficient and utilized resource usage. In cloud environments, this affects the amount of money the consumer pays. Several techniques are used to achieve this goal. This paper discusses these techniques and proposes a new XML Schema-based Minification technique. The proposed technique works on XML Structure reduction using minification. The proposed technique provides a separation between the meaningful names and the underlying minified names, which enhances software/code readability. This technique is applied to Intrusion Detection Message Exchange Format (IDMEF) messages, as part of Security Information and Event Management (SIEM) system communication hosted on Microsoft Azure Cloud. Test results show message size reduction ranging from 8.15% to 50.34% in the raw message, without using time-consuming compression techniques. Adding GZip compression to the proposed technique produces 66.1% shorter message size compared to original XML messages.
Authors and Affiliations
Bishoy Moussa, Mahmoud Mostafa
Towards Analytical Modeling for Persuasive Design Choices in Mobile Apps
Persuasive technology has emerged as a new field of research in the past decade with its applications in various domains including web-designing, human-computer interaction, healthcare systems, and social networks. Altho...
Developing an Algorithm for Securing the Biometric Data Template in the Database
In the current technology advancement, biometric template provides a dependable solution to the problem of user verification in an identity control system. The template is saved in the database during the enrollment and...
Dynamic Access Control Policy based on Blockchain and Machine Learning for the Internet of Things
The Internet of Things (IoT) is now destroying the barriers between the real and digital worlds. However, one of the huge problems that can slow down the development of this global wave, or even stop it, concerns securit...
Towards Agile Implementation of Test Maturity Model Integration (TMMI) Level 2 using Scrum Practices
the software industry has invested the substantial effort to improve the quality of its products like ISO, CMMI and TMMI. Although applying of TMMI maturity criteria has a positive impact on product quality, test enginee...
Workshop Session Recordings on Green Volunteering Activities of Students in a Disadvantaged Area According to the Good-Hearted Vocation Teacher to Support Itinerant Junk Buyers
This project was aimed to provide workshop session recordings on green volunteering activities of students in one disadvantaged area under the bridge of zone 1, Pracha-Utit Road 76, Toong-kru District, Bangkok where the...