client machine
Recently Published Documents


TOTAL DOCUMENTS

13
(FIVE YEARS 3)

H-INDEX

3
(FIVE YEARS 1)

Author(s):  
Suganthi DMs ◽  
Banuchanthiran N ◽  
Sridhar V ◽  
Rajeswari T ◽  
Sabareesh G

Distributed systems are the building block for cloud computing applications. In which the data is stored on a server and accessed as if it is stored on the local client machine. Our proposal is to allocate files uniformly as possible. Such that node has larger number of chunks by load rebalancing algorithm.


Malware is a general problems faced in the present day. Malware is a file that may be on the client machine. Malware can root an uncorrectable risk to the safety and protection of personal workstation clients as an expansion in the spiteful threats. In this paper explain a malware threats detection using data mining and machine learning. Malware detection algorithms with machine learning approach and data file. Also explained break executable files, create instruction set and take a look at different machine learning and data mining algorithm for feature extraction, reduction for detection of malware. In the system precisely distinguishes both new and known malware occurrences even though the double distinction among malware and real software is ordinarily little. There is a demand to present a skeleton which can come across latest, malicious executable files.


2019 ◽  
Vol 2019 (4) ◽  
pp. 311-328 ◽  
Author(s):  
Geoffrey Alexander ◽  
Antonio M. Espinoza ◽  
Jedidiah R. Crandall

Abstract We present a novel attack for detecting the presence of an active TCP connection between a remote Linux server and an arbitrary client machine. The attack takes advantage of side-channels present in the Linux kernel’s handling of the values used to populate an IPv4 packet’s IPID field and applies to kernel versions of 4.0 and higher. We implement and test this attack and evaluate its real world effectiveness and performance when used on active connections to popular web servers. Our evaluation shows that the attack is capable of correctly detecting the IP-port 4-tuple representing an active TCP connection in 84% of our mock attacks. We also demonstrate how the attack can be used by the middle onion router in a Tor circuit to test whether a given client is connected to the guard entry node associated with a given circuit. In addition we discuss the potential issues an attacker would face when attempting to scale it to real world attacks, as well as possible mitigations against the attack. Our attack does not exhaust any global resource, and therefore challenges the notion that there is a direct one-to-one connection between shared, limited resources and non-trivial network side-channels. This means that simply enumerating global shared resources and considering the ways in which they can be exhausted will not suffice for certifying a kernel TCP/IP network stack to be free of privacy risk side-channels.


2017 ◽  
Vol 7 (1.1) ◽  
pp. 230
Author(s):  
C. Vasan Sai Krishna ◽  
Y. Bhuvana ◽  
P. Pavan Kumar ◽  
R. Murugan

In a typical DoS attack, the attacker tries to bring the server down. In this case, the attacker sends a lot of bogus queries to the server to consume its computing power and bandwidth. As the server’s bandwidth and computing power are always greater than attacker’s client machine, He seeks help from a group of connected computers. DDoS attack involves a lot of client machines which are hijacked by the attacker (together called as botnet). As the server handles all these requests sent by the attacker, all its resources get consumed and it cannot provide services. In this project, we are more concerned about reducing the computing power on the server side by giving the client a puzzle to solve. To prevent such attacks, we use client puzzle mechanism. In this mechanism, we introduce a client-side puzzle which demands the machine to perform tasks that require more resources (computation power). The client’s request is not directly sent to the server. Moreover, there will be an Intermediate Server to monitor all the requests that are being sent to the main server. Before the client’s request is sent to the server, it must solve a puzzle and send the answer. Intermediate Server is used to validate the answer and give access to the client or block the client from accessing the server.


2016 ◽  
Vol 49 (2) ◽  
pp. 642-645 ◽  
Author(s):  
M. Gurusaran ◽  
P. Sivaranjan ◽  
K. S. Dinesh Kumar ◽  
P. Radha ◽  
K. P. S. Thulaa Tharshan ◽  
...  

Hydrogen bonds in biological macromolecules play significant structural and functional roles. They are the key contributors to most of the interactions without which no living system exists. In view of this, a web-based computing server, the Hydrogen Bonds Computing Server (HBCS), has been developed to compute hydrogen-bond interactions and their standard deviations for any given macromolecular structure. The computing server is connected to a locally maintained Protein Data Bank (PDB) archive. Thus, the user can calculate the above parameters for any deposited structure, and options have also been provided for the user to upload a structure in PDB format from the client machine. In addition, the server has been interfaced with the molecular viewers Jmol and JSmol to visualize the hydrogen-bond interactions. The proposed server is freely available and accessible via the World Wide Web at http://bioserver1.physics.iisc.ernet.in/hbcs/.


2015 ◽  
Vol 48 (3) ◽  
pp. 939-942 ◽  
Author(s):  
K. S. Dinesh Kumar ◽  
M. Gurusaran ◽  
S. N. Satheesh ◽  
P. Radha ◽  
S. Pavithra ◽  
...  

An online computing server,Online_DPI(where DPI denotes the diffraction precision index), has been created to calculate the `Cruickshank DPI' value for a given three-dimensional protein or macromolecular structure. It also estimates the atomic coordinate error for all the atoms available in the structure. It is an easy-to-use web server that enables users to visualize the computed values dynamically on the client machine. Users can provide the Protein Data Bank (PDB) identification code or upload the three-dimensional atomic coordinates from the client machine. The computed DPI value for the structure and the atomic coordinate errors for all the atoms are included in the revised PDB file. Further, users can graphically view the atomic coordinate error along with `temperature factors' (i.e.atomic displacement parameters). In addition, the computing engine is interfaced with an up-to-date local copy of the Protein Data Bank. New entries are updated every week, and thus users can access all the structures available in the Protein Data Bank. The computing engine is freely accessible online at http://cluster.physics.iisc.ernet.in/dpi/.


Author(s):  
Bui The Luan ◽  
Nguyen Van Khanh

We study the problem of protecting Windowsbased  online  games  against  hackers.  We  consider  an interaction  scenario  between  3  parties,  the  game producer,  the  game  distributor  and  the  game  player (client), where we aim to support the distributor to fight against cheater  clients  with minimum  cooperation from the game producer. For a protection solution, we propose a software architecture which introduces the specifically designed  moduleGameGuard.  Upon  being  played  in  the Client machine, the GameClient program simultaneously interacts  with GameGuard so  that  if  a  serious  hack  is attempted, it will be detected and then both modules will terminate. We  support  the  game  distributors  with  a  general protection framework which is not dependent on specific games  and  also  only  needs  minimum  cooperation  from the  distant  game  producers.  Our  approach  is  powerful enough that we would defeat most kinds of attacks which are  based  on  hooking  Windows  APIs,  including  ones from memory, graphic or hardware attack categories.


Author(s):  
Nuno Preguica ◽  
Marek Zawirski ◽  
Annette Bieniusa ◽  
Sergio Duarte ◽  
Valter Balegas ◽  
...  

2013 ◽  
Vol 432 ◽  
pp. 549-554
Author(s):  
Mei Mei Wu

In this paper we introduce a kind of management mechanism for computer immune system GECISM (GEneral Computer Immune System Model)[. With it when emergency happens it can be timely and actively response according to the current state of database. Thus it improved the executive efficiency of the computer immune system. The method is that we design the local rules in the form of active database. It neednt user intervention for the processes to be handled by the processor. The database of the client machine can automatically carry out the judgment of "self" and "non-self". So it can improve the system's processing capability.


2012 ◽  
Vol 190-191 ◽  
pp. 1121-1124
Author(s):  
Jin Wu

This article describes the design of the long-distance pipeline system, then gives out the overall framework of the remote monitoring system consisting of server and client machine, the serial communication program design methods, and the functional modules of the client machine. After analyzing the pipeline simulation model the conclusion is made.


Sign in / Sign up

Export Citation Format

Share Document