scholarly journals Detection of Network Attacks Based on Multiprocessing and Trace Back Methods

2021 ◽  
Author(s):  
Vijayakumar R ◽  
Vijay K ◽  
Sivaranjani P ◽  
Priya V

The way of thinking of traffic observing for discovery of system assaults is predicated on a “gained information” viewpoint: current methods recognize either the notable assaults which they’re customized to alarm on, or those strange occasions that veer off from a known typical activity profile. These philosophies depend on an expert structure which gives the ideal data, either with respect to “marks” of the striking attacks or as anomaly free traffic datasets, adequately rich to make delegate profiles for commonplace movement traffic. The theory talks about the limitations of current information-based system to recognize organize assaults in an inexorably unpredictable and advancing Web, Described by ever-rising applications and an ever-expanding number of most recent system assaults. In an oppositely inverse viewpoint, we place the weight on the occasion of solo recognition strategies, fit for distinguishing obscure system assaults during a unique situation with none past information, neither on the attributes of the assault nor on the gauge traffic conduct. In view of the perception that an outsized portion of system assaults are contained during a little division of traffic flows, the proposition exhibits an approach to join basic bunching strategies to precisely distinguish and portray malignant flows. to bring up the practicality of such an information autonomous methodology, a solid multi-bunching-based location technique is created and assess its capacity to recognize and portray arrange assaults with none past information, utilizing bundle follows from two genuine operational systems. The methodology is acclimated identify and describe obscure vindictive flows, and spotlights on the identification and portrayal of ordinary and notable assaults, which encourages the translation of results. When contrasted with the predominant DDoS traceback techniques, the proposed system has assortment of favorable circumstances—it is memory no concentrated, proficiently adaptable, vigorous against parcel contamination, and free of assault traffic designs. The consequences of inside and out test and reenactment considers are introduced to exhibit the adequacy and effectiveness of the proposed strategy. It’s an uncommon test to traceback the wellspring of Circulated Disavowal of-Administration (DDoS) assaults inside the Web. In DDoS assaults, aggressors create a lot of solicitations to casualties through undermined PCs (zombies), with the point of keeping ordinary help or debasing from getting the norm of administrations. Because of this fundamental change, the proposed system conquers the acquired downsides of parcel stamping strategies, similar to weakness to bundle contaminations. The execution of the proposed strategy welcomes no changes on current steering programming. Moreover, this work builds up a hypothetical structure for assessing the insurance of IDS against mimicry assaults. It shows an approach to break the wellbeing of 1 distributed IDS with these strategies, and it tentatively affirms the capacity of various assaults by giving a worked model. The Project is intended by using Java 1.6 as face and MS SQL Server 2000 as backside. The IDE used is Net Beans 6.8.

2013 ◽  
Vol 433-435 ◽  
pp. 1635-1638
Author(s):  
Zhi Gang Feng ◽  
Fang Yuan Dai

In order to improve the efficiency of the traditional building materials information management, a construction materials quality detection management system is designed and developed. It includes three subsystems, they are quality testing system, information management system and process monitoring and control system. In the system, SQL Server 2000 is used as background database, Visual C++ 6.0 is used as the development platform, ADO is used as the connection between Visual C++ and SQL Server 2000. By using this system, the original paper records are stored in the database, the testing process is standardizes. The modernization of building materials information management is improved. This system has been successfully used in certain Building Materials Quality Supervision Station, which proved that the development process is suitable for Building Materials Supervision Station to quickly establish construction materials quality detection management system.


2016 ◽  
Vol 7 (1) ◽  
pp. 1557-1573
Author(s):  
Hendra Kasman

Sistem Informasi Persediaan ini dirancang untuk memaksimalkan proses pengolahan data barang di bagian perlengkapan rumah sakit Prof. Dr. Tabrani Pekanbaru, sistem yang tergolong masih menggunakan cara konvensional kurang memadai untuk mengolah informasi secara cepat dan akurat. Sehingga dibutuhkan sistem yang mampu mengolah data dan menyampaikan informasi secara lebih cepat yakni sistem yang berbasis komputer. Dengan membangun sistem persediaan berbasis komputer diharapkan kesalahan – kesalahan didalam pengolahan dan penyampaian informasi pada saat menggunakan sistem konvensional tidak terjadi lagi, seperti didalam pengolahan informasi stok barang dan pengolahan segala transaksi yang terjadi di bagian perlengkapan. Pengembangan sistem ini dilakukan dengan menganalisa sistem yang berjalan, merancang sistem, dan mengimplementasikan ke dalam sistem komputer dalam hal ini membangun aplikasi menggunakan bahasa pemrograman Visual Basic 6.0 dan database SQL Server 2000 sebagai media penyimpanan data. Dengan menerapkan sistem informasi persediaan barang menggunakan sistem komputer yakni membuat sebuah aplikasi maka pengolahan data persediaan barang seperti pengolahan data transaksi permintaan barang, transaksi barang masuk dan barang keluar dari bagian perlengkapan akan lebih terorganisir dengan baik sehingga akan menghasilkan informasi yang lebih tepat berupa laporan – laporan yang dibutuhkan komponen sistem yang berhubungan dengan informasi persediaan barang bagian perlengkapan di rumah sakit tersebut.


M/C Journal ◽  
2020 ◽  
Vol 23 (3) ◽  
Author(s):  
Daniel De Zeeuw ◽  
Marc Tuters

At the fringes of the platform economy exists another web that evokes an earlier era of Internet culture. Its anarchic subculture celebrates a form of play based based on dissimulation. This subculture sets itself against the authenticity injunction of the current mode of capitalist accumulation (Zuboff). We can imagine this as a mask culture that celebrates disguise in distinction to the face culture as embodied by Facebook’s “real name” policy (de Zeeuw and Tuters). Often thriving in the anonymous milieus of web forums, this carnivalesque subculture can be highly reactionary. Indeed, this dissimulative identity play has been increasingly weaponized in the service of alt-right metapolitics (Hawley).Within the deep vernacular web of forums and imageboards like 4chan, users play by a set of rules and laws that they see as inherent to online interaction as such. Poe’s Law, for example, states that “without a clear indicator of the author's intent, it is impossible to create a parody of extreme views so obviously exaggerated that it cannot be mistaken by some readers for a sincere expression of the parodied views”. When these “rule sets” are enacted by a massive angry white teenage male demographic, the “weapons of the geek” (Coleman) are transformed into “toxic technoculture” (Massanari).In light of an array of recent predicaments in digital culture that trace back to this part of the web or have been anticipated by it, this special issue looks to host a conversation on the material practices, (sub)cultural logics and web-historical roots of this deep vernacular web and the significance of dissimulation therein. How do such forms of deceptive “epistemological” play figure in digital media environments where deception is the norm —  where, as the saying goes, everyone knows that “the internet is serious business” (which is to say that it is not). And how in turn is this supposed culture of play challenged by those who’ve only known the web through social media?Julia DeCook’s article in this issue addresses the imbrication of subcultural “lulz” and dissimulative trolling practices with the emergent alt-right movement, arguing that this new online confluence  has produced its own kind of ironic political aesthetic. She does by situating the latter in the more encompassing historical dynamic of an aestheticization of politics associated with fascism by Walter Benjamin and others.Having a similar focus but deploying more empirical digital methods, Sal Hagen’s contribution sets out to explore dissimulative and extremist online groups as found on spaces like 4chan/pol/, advocating for an “anti-structuralist” and “demystifying” approach to researching online subcultures and vernaculars. As a case study and proof of concept of this methodology, the article looks at the dissemination and changing contexts of the use of the word “trump” on 4chan/pol/ between 2015 and 2018.Moving from the unsavory depths of anonymous forums like 4chan and 8chan, the article by Lucie Chateau looks at the dissimulative and ironic practices of meme culture in general, and the subgenre of depression memes on Instagram and other platforms, in particular. In different and often ambiguous ways, the article demonstrates, depression memes and their ironic self-subversion undermine the “happiness effect” and injunction to perform your authentic self online that is paradigmatic for social media platforms like Facebook and Instagram. In this sense, depression meme subculture still moves in the orbit of the early Web’s playful and ironic mask cultures.Finally, the contribution by Joanna Zienkiewicz looks at the lesser known platform Pixelcanvas as a battleground and playfield for antagonistic political identities, defying the wisdom, mostly proffered by the alt-right, that “the left can’t meme”. Rather than fragmented, hypersensitive, or humourless, as online leftist identity politics has lately been criticized for by Angela Nagle and others, leftist engagement on Pixelcanvas deploys similar transgressive and dissimulative tactics as the alt-right, but without the reactionary and fetishized vision that characterises the latter.In conclusion, we offer this collection as a kind of meditation on the role of dissimulative identity play in the fractured post-centrist landscape of contemporary politics, as well as a invitation to think about the troll as a contemporary term by which "our understanding of the cybernetic Enemy Other becomes the basis on which we understand ourselves" (Gallison).ReferencesColeman, Gabriella. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous. New York: Verso, 2014.De Zeeuw, Daniël, and Marc Tuters. "Teh Internet Is Serious Business: On the Deep Vernacular Web and Its Discontents." Cultural Politics 16.2 (2020): 214–232.Galison, Peter. “The Ontology of the Enemy.” Critical Inquiry 21.1 (2014): 228–66.Hawley, George. Making Sense of the Alt-Right. New York: Columbia UP, 2017.Massanari, Adrienne. “#Gamergate and the Fappening: How Reddit’s Algorithm, Governance, and Culture Support Toxic Technocultures.” New Media & Society 19.3 (2016): 329–46.Zuboff, Shoshana. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. New York: PublicAffairs, 2019.


Author(s):  
Mª Ángeles Moraga ◽  
Ignacio García-Rodríguez de Guzmán ◽  
Coral Calero ◽  
Mario Piattini

The use of Web portals continues to rise, showing their importance in the current information society. Specifically, this chapter focuses on portlet-based portals. Portlets are Web components, and they can be thought of as COTS but in a Web setting. Recently, the Web service for remote portlets (WSRP) standard has come into existence. Its aim is to provide a common interface in order to allow the communication between portal and portlets. Bearing all that in mind, in this chapter we propose an ontology for this standard. This ontology offers an understandable summary of the standard. Thus, the ontology leads both portlet and portal developers to focus their effort on developing the portlet domain logic instead of implementing its communication.


Author(s):  
Tony Bain ◽  
Louis Davidson ◽  
Robin Dewson ◽  
Chuck Hawkins
Keyword(s):  

2011 ◽  
Vol 271-273 ◽  
pp. 1020-1022
Author(s):  
Dong Feng Nie ◽  
Yun Du

There exists a huge social demand for college sports management system software, in order to more conveniently process the increasing sports information, and conform to the trend of scientific management. This study is based on the analytic hierarchy process to divide sports resources into multiple modules. The web-based college sports management system software was developed through such computer technologies as .NET and SQL Server, and equipped with some features like powerful function on dynamic information interaction, and easy installation, operation and use with safety, which can accelerate informationization and networking of college sports management.


Sign in / Sign up

Export Citation Format

Share Document