scholarly journals Client Hacked Server: Application Scenario for Malicious Web Control

IJARCCE ◽  
2015 ◽  
pp. 14-18
Author(s):  
Ajit Prakash Alijad ◽  
Pritam Vishnu Aher ◽  
Sujata Ashok Chechare ◽  
Vishal Eknath Ghume
Author(s):  
Amit Sharma

Distributed Denial of Service attacks are significant dangers these days over web applications and web administrations. These assaults pushing ahead towards application layer to procure furthermore, squander most extreme CPU cycles. By asking for assets from web benefits in gigantic sum utilizing quick fire of solicitations, assailant robotized programs use all the capacity of handling of single server application or circulated environment application. The periods of the plan execution is client conduct checking and identification. In to beginning with stage by social affair the data of client conduct and computing individual user’s trust score will happen and Entropy of a similar client will be ascertained. HTTP Unbearable Load King (HULK) attacks are also evaluated. In light of first stage, in recognition stage, variety in entropy will be watched and malevolent clients will be recognized. Rate limiter is additionally acquainted with stop or downsize serving the noxious clients. This paper introduces the FAÇADE layer for discovery also, hindering the unapproved client from assaulting the framework.


Author(s):  
Е.Е. Истратова ◽  
Е.Н. Антонянц ◽  
А.О. Амельченко

В статье представлены результаты модернизации ранее разработанного клиент-серверного приложения для исследования характеристик корпоративной сети. Результаты проведенных исследований позволили сделать вывод о том, что усовершенствованный программный продукт можно применять для сбора статистических данных о характеристиках сетевого подключения при передаче информации в корпоративной сети компании. The article presents the results of the modernization of a previously developed client-server application for the study of the characteristics of the corporate network. The results of the conducted research allowed us to conclude that the improved software product can be used to collect statistical data on the characteristics of the network connection when transmitting information in the corporate network of the company.


2021 ◽  
Vol 103 (3) ◽  
pp. 60-70
Author(s):  
Ye. Utepov ◽  
◽  
A. Tulebekova ◽  
S. Akhazhanov ◽  
Sh. Zharassov ◽  
...  

The construction industry, traditionally considered quite conservative, is now going through a marked change. With competition intensifying, companies have begun to gradually adopt various digital technologies to reduce construction costs, such as the wireless concrete monitoring sensors, which implement a temperature-strength monitoring method for concrete. Each device has its technological features, which are considered in the development of the concepts. Enclosure design is the most important stage of product development. An enclosure made in-house has many advantages and disadvantages. The most important part of the design of an electronic device enclosure is the preliminary research stage. This article presents features of wireless monitoring sensor enclosure design. A data acquisition station (DAS), also referred to in the network topology as a “gateway”, will be used to collect data from the wireless monitoring sensor over the selected protocol. The server application was created based on HTML, PHP, CSS, JavaScript. Testing of the wireless monitoring sensor, SDS, and the server application working together showed full functionality. A study is also given on the determination of concrete strength using the developed sensor according to the ASTM method and using the IPS MG 4.0 by GOST.


Author(s):  
D P Stoten ◽  
M G Dye ◽  
M Webb

The minimal control synthesis (MCS) algorithm is an adaptive control strategy that requires no prior knowledge of plant dynamic parameters, and yet is guaranteed to provide global asymptotic stability of the closed-loop system. The purpose of this paper is to present MCS as applied to web tension und transport control a class of plant that has highly non-linear dynamics and time-varying parameters. The plant is difficult to control by conventional methods over its full operating range. A typical example and model of such a plant is presented along with the implementation of MCS. Experimental comparisons of MCS with conventional control benchmarks are provided. It will be seen that MCS significantly outperforms the conventional controller.


2013 ◽  
Author(s):  
José M. Gonçalves ◽  
André Muga ◽  
Luís Santos Pereira ◽  
João Rolim ◽  
Mikhail G. Horst

Author(s):  
Begoña García Zapirain ◽  
Amaia Mendez Zorrilla

This chapter presents a technological solution to promote and help independent access to work for disabled people using Smart Phones. A deep state of the art about smart phones technologies and about examples of other projects is presented. The aim is to develop a form of technical assistance that supports them in the control of schedules, prevention of dangerous areas in the work place, warnings, and automatic alarm generation. The device chosen to exchange all this information is a Smartphone based on Android Operating System and GPS technology. A set of Android applications have been developed using Java language, and controlling the device via Google-developed Java libraries. All of these are connected to the Server Application through the Communications Module. The server Application Module provides the assistants or psychologists the possibility of supervise all the handicapped people’s activities. The assistants, psychologists, and users have all evaluated the application very positively as it covers disabled people’s needs perfectly.


Author(s):  
Miroslava Ožvoldová ◽  
Franz Schauer

In this chapter, we present the outlines of the remote laboratory integrated in the INTe-L system, using the Internet School Experimental System (ISES) as hardware and an ISES WEB Control kit as software. We suggest an architecture for implementing remote laboratories, with data transfer across the Internet, based on standard and reusable ISES modules as hardware and Java supported ISES software. The Learning Management System (LMS) MOODLE turns out to be a highly effective means of organization of physics courses. The first experience on teaching units Free fall (http://remotelab4.truni.sk), Simple Pendulum (http://remotelab5.truni.sk), and Natural and driven oscillations (www.ises.info – see Remote laboratory) is presented.


2020 ◽  
Vol 10 (1) ◽  
pp. 25-32
Author(s):  
Harun Mukhtar ◽  
Daniel Adi Putra Sitorus ◽  
Yulia Fatma

Mail server is one of the most widely used server functions in the company. This discusses e-mail itself which can reduce mailing costs, is more efficient than manual communication and can be used as attachments that are useful as a supplement and additional documents related to the contents of e-mail. Zimbra is a mail server application that provides complete features and also makes it easy to install mail server management, also mail server security issues are a factor that must be considered by the system administrator. The security design for e-mail servers addresses the importance of being able to prevent spam e-mail attacks that can fill e-mail servers and make mail server performance faster. Because a good mail server security can optimize the performance of the mail server itself. In this final project, the work and implementation of the zimbra mail server security will be carried out specifically for handling email spam. The zimbra email server will analyze its security against spam email attacks, so that it can function as an email server on the company.


Electronics ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 361 ◽  
Author(s):  
Muhammad Ilyas ◽  
Régis Fournier ◽  
Alice Othmani ◽  
Amine Nait-Ali

Along with internet growth, security issues come into existence. Efficient tools to control access and to filter undesirable web content are needed all the time. In this paper, a control access method for web security based on age estimation is proposed, where the correlation between human age and auditory perception is taken into account. In particular, access is denied if a person’s age is not appropriate for the given web content. Unlike existing web access filters, our biometric approach offers greater security and protection to individual privacy. From a technical point of view, the machine-learning regression model is used to estimate the person’s age. The primary contributions of this paper include an age estimation module based on human auditory perception and provision of an open-source web filter to prevent adults from accessing children web applications. The proposed system can also be used to limit the access of children to a webpage specially designed for adults. Our system is evaluated with a dataset collected from 201 persons with different ages from 06 to 60 years old, where it considered 109 male and 82 female volunteers. Results indicate that our system can estimate the age of a person with an accuracy of 97.04% and a root mean square error (RMSE) of 4.2 years. It presents significant performances in the verification scenario with an Equal Error Rate (EER) of 1.4%.


Sign in / Sign up

Export Citation Format

Share Document