scholarly journals Methods for Applying of Scheme of Packet Filtering Rules

This article is devoted to research methods for applying of scheme of packet filtering rules. The scheme of the Firewall is developed on corporate network to allow protect the network system from information security threat. Use of Firewall in different mode of protection in the corporate networks is given which is accessed to segment information resources under the administrator's rules. Filtering packets rule is worked out according to the state of the virtual connection that the process moving of packets is determined by flags and sequence numbers of head IP addresses. The system logging log is designed to record a message about events that involve firewall operating system management activities and events that are fraught with an intersection-related event log. Consequently, the offered rules of packet filtering protected the network traffic from unwanted action. Furthermore, the rules of packet filtering is formed, allowing to observe and management access to resource users on the Web content.

2019 ◽  
pp. 497-513
Author(s):  
Ivan D. Burke ◽  
Renier P. van Heerden

Data breaches are becoming more common and numerous every day, where huge amount of data (corporate and personal) are leaked more frequently than ever. Corporate responses to data breaches are insufficient, when commonly remediation is minimal. This research proposes that a similar approach to physical pollution (environmental pollution) can be used to map and identify data leaks as Cyber pollution. Thus, IT institutions should be made aware of their contribution to Cyber pollution in a more measurable method. This article defines the concept of cyber pollution as: security vulnerable (such as unmaintained or obsolete) devices that are visible through the Internet and corporate networks. This paper analyses the recent state of data breach disclosures Worldwide by providing statistics on significant scale data breach disclosures from 2014/01 to 2016/12. Ivan Burke and Renier van Heerden model security threat levels similar to that of pollution breaches within the physical environment. Insignificant security openings or vulnerabilities can lead to massive exploitation of entire systems. By modelling these breaches as pollution, the aim is to introduce the concept of cyber pollution. Cyber pollution is a more tangible concept for IT managers to relay to staff and senior management. Using anonymised corporate network traffic with Open Source penetration testing software, the model is validated.


2017 ◽  
Vol 7 (4) ◽  
pp. 35-51
Author(s):  
Ivan D. Burke ◽  
Renier P. van Heerden

Data breaches are becoming more common and numerous every day, where huge amount of data (corporate and personal) are leaked more frequently than ever. Corporate responses to data breaches are insufficient, when commonly remediation is minimal. This research proposes that a similar approach to physical pollution (environmental pollution) can be used to map and identify data leaks as Cyber pollution. Thus, IT institutions should be made aware of their contribution to Cyber pollution in a more measurable method. This article defines the concept of cyber pollution as: security vulnerable (such as unmaintained or obsolete) devices that are visible through the Internet and corporate networks. This paper analyses the recent state of data breach disclosures Worldwide by providing statistics on significant scale data breach disclosures from 2014/01 to 2016/12. Ivan Burke and Renier van Heerden model security threat levels similar to that of pollution breaches within the physical environment. Insignificant security openings or vulnerabilities can lead to massive exploitation of entire systems. By modelling these breaches as pollution, the aim is to introduce the concept of cyber pollution. Cyber pollution is a more tangible concept for IT managers to relay to staff and senior management. Using anonymised corporate network traffic with Open Source penetration testing software, the model is validated.


Author(s):  
Afolayan A. Obiniyi ◽  
Ezugwu E. Absalom ◽  
Mohammed Dikko

With the explosion of the public Internet, corporate networks connected to the Internet, if not adequately secured, are vulnerable to damaging attacks. Hackers, viruses, worms, Trojan horses, and spyware try to invade privacy. This research examines how these threats affect the corporate network and ways to reduce them. MikroTik routerOS was configured as the router to examine these threats. Network Address Translation and packet filtering where the key features configured to make the network hidden for unauthorized users and filter unwanted traffics that might reflect malicious acts. The configuration and test were carried out at Iya Abubakar Computer Center, Ahamdu Bello University, Zaria, Nigeria. At the onset, the targeted network was full of virus, worms, Trojan horses, spyware, and vulnerable to unauthorized users. The signal strength of the network was usually very poor due to the effect from the threats affecting the bandwidth. The firewall was configured to filter out inherently dangerous services, exposing the network to fewer risks. After the research, the performance and efficiency of the network was improved tremendously.


2018 ◽  
Vol 7 (2.4) ◽  
pp. 1
Author(s):  
Subhranshu Mohanty ◽  
Amar Kumar Mohapatra ◽  
Srikanta Patnaik

Web applications have become important but there are different types of security problems which could lead to tampering with details. The most common are cookies poisoning, structured query language, cross-site scripting and parameter tempering. This is the reason why most of the web companies today are verifying the type of content they receive and most importantly, from where the contents are originated. It has been thus noted from the above deduction that the major security threat has nothing to do with the Secure Socket Layer rather other layers in the web development program. In order to avoid such threats and other vulnerabilities, initial stages of the web development cycle need to be taken care of.Thus, the main focus of this research paper is to come up with a framework that would help to strengthen the security of the various stages in the web development cycle. For the same, various modules and life cycles have been used.


2018 ◽  
Vol 12 (1) ◽  
pp. 114
Author(s):  
Mohammad Niqresh

The study aims at identifying the concept of digital library, it also tries to shed the light on the most significant intellectual issues by presenting its definition, development, functions (selection and acquisition of information resources from the web, sources indexing, communication and management of intellectual property rights, production of electronic resources and its availability, and digital resources maintaining), characteristics, and the purpose of turning into digital library, passed by the proposed stages of digital library transition, Types of Intellectual Property (Copyright, Patents, Trademarks, Commercial Secrets), it also discusses copyrights and intellectual property, the problems and challenges of digital library, and finally the future of digital library. Many researchers agree that the main objective of the digital library is to accomplish all the functions of the traditional library, but in the form of electronic digital libraries which are only an extension for jobs that are performed and the resources that are accessible in digital library. The study concluded that digital libraries emerged as an obligatory result of revolution of the third millennium which is called the communications revolution, as libraries are able to prove that they are able to stand and cope with all the modern technology, where there is no conflict between the new and modern trends in libraries issue, but it also benefits from both of them concerning their evolution instruments in service for beneficiaries in every time and place.


Author(s):  
JYOTSNA BAGRET ◽  
PRASANNA MUNDADA ◽  
SABAH TAZEEN ◽  
TANUJA MULLA

This paper describes how the web content visualization can be greatly improved using the modeling technique. Web content visualization is the outcome of effort made to avail an improved 3D visualization unlike the 2D web content visualization at present. Web page navigation in this case will be depicted by a 2D graph and the web content will be visualized in the form of 3D graph. Also the RSS feeds will be visualized in the form of 3D graph. In normal browser we type name of the URL in the address bar and that URL is downloaded. But the 3D browser takes any URL as an input and generates a 3D graph of the whole website. When we type the URL, a root node of this URL is created. And then this URL goes to the Parser. The parser, parse this web page and gives output in the form of the set of the hyperlinks. Corresponding to each link we create a node and it is attached to the root node. In this way the whole 3D graph of the website is generated. Different color schemes are used for the nodes of different links e.g. text links, image links, video links etc. Advanced search facility is also provided. Moreover as the graph is 3D in nature, the user can rotate the graph as per his requirement.


2014 ◽  
pp. 987-1000
Author(s):  
Kaiquan Xu ◽  
Wei Wang ◽  
Jimmy S. J. Ren ◽  
Jin Xu ◽  
Long Liu ◽  
...  

With the Web 2.0 paradigm, a huge volume of Web content is generated by users at online forums, wikis, blogs, and social networks, among others. These user-contributed contents include numerous user opinions regarding products, services, or political issues. Among these user opinions, certain comparison opinions exist, reflecting customer preferences. Mining comparison opinions is useful as these types of viewpoints can bring more business values than other types of opinion data. Manufacturers can better understand relative product strengths or weaknesses, and accordingly develop better products to meet consumer requirements. Meanwhile, consumers can make purchasing decisions that are more informed by comparing the various features of similar products. In this paper, a novel Support Vector Machine-based method is proposed to automatically identify comparison opinions, extract comparison relations, and display results with the comparison relation maps by mining the volume of consumer opinions posted on the Web. The proposed method is empirically evaluated based on consumer opinions crawled from the Web. The initial experimental results show that the performance of the proposed method is promising and this research opens the door to utilizing these comparison opinions for business intelligence.


Author(s):  
Ye. A. Kosova ◽  
A. S. Gapon ◽  
K. I. Redkokosh

The purpose of the article is to assess the accessibility of electronic educational resources (EER) published in the university Moodle Learning Management System (LMS). The analysis involved 22 EERs in mathematical and information technology disciplines, located in the Moodle LMS of the V. I. Vernadsky Crimean Federal University. The examination algorithm included analysis using the Web Accessibility Evaluation Tool (WAVE) and expert analysis of web accessibility using visual, auditory and manual methods based on 89 checklist attributes. In the result of the analysis, multiple accessibility errors of the Moodle platform and the EERs hosted on it were found. The most serious platform problems include: lack of compatibility with text browsers; errors of reproduction by screen readers; errors of content reproduction on mobile devices. The list of accessibility errors made by the authors of EERs includes: incorrect design of hyperlinks (22.7 % of the EERs); lack of subtitles (13.6 %), transcripts (22.7 %), synopses of video lectures (27.3 %); lack of alternative descriptions for figures (68.2 %); time limit for tests (9.1 %); lack of special markup for mathematical notation (36.4 %) and program code (13.6 %), etc. Results of the survey show need in training of EERs’ authors in technologies for developing accessible educational web content. It is advisable to familiarize web developers deploying an LMS at universities with the basics of web accessibility, LMS accessibility functions and modules in order to select the most suitable platform, determine and install the required set of accessibility tools. Before launching all EERs should be subject to mandatory examination for compliance with the web accessibility guidelines.


Sign in / Sign up

Export Citation Format

Share Document