1,669 research outputs found

    Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Get PDF
    A denial of service attack (DOS) is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.http://www.iiisci.org/journal/CV$/sci/pdfs/P129065.pd

    Driving continuous improvement

    Get PDF
    The quality of improvement depends on the quality of leading and lagging performance indicators. For this reason, several tools, such as process mapping, cause and effect analysis and FMEA, need to be used in an integrated way with performance measurement models, such as balanced scorecard, integrated performance measurement system, performance prism and so on. However, in our experience, this alone is not quite enough due to the amount of effort required to monitor performance indicators at operational levels. The authors find that IT support is key to the successful implementation of performance measurement-driven continuous improvement schemes

    Uji Performansi Cloud Platform Aneka 3.0 Menggunakan Aplikasi Thread Model, Mapreduce, Task Model

    Get PDF
    Cloud Computting adalah suatu suatu teknologi yang membuat penyimpanan tidak hanya pada internal memori laptop/pc tetapi juga bisa pada laptop/pc lain. Aneka3.0 adalah layanan yang berjalan pada oleh sistem operasi Microsoft Windows 2000, Windows XP, Windows Vista, dan Windows 7, dan Windows 8. pembangun cloud untuk menjalan komputasi dan aplikasi data yg intensif. sebagai salah satu perangkat penyedia antara pengguna dan untuk menjalankan aplikasi dilingkungan kerja menggunakan salah satu dari model pemrograman pendukung, dan penetapann api serta perangkat - perangkat tersebut memungkinkan pengguna untuk membangun aplikasi baru atau menjalankan aplikasi yang sudah ada. Dalam Karya akhir ini penulis akan membuat Aneka 3.0 pada lingkungan laboratorium untuk membatasi hak akses user, memudahkan user mengakses file sharing, menjaga keamanan file yang ada dilingkungan laboratorium komputer

    Implementasi Active Directory Untuk Lingkungan Laboratorium Komputer

    Get PDF
    Active Directory adalah layanan direktori yang dimiliki oleh sistem operasi jaringan Microsoft Windows 2000, Windows XP, Windows Vista, dan Windows Server 2008. Active Directory terdiri atas basis data dan juga layanan direktori. Basis data yang dimiliki oleh Active Directory menyimpan segala sumber daya yang terdapat didalam jaringan seperti halnya komputer yang telah tergabung ke sebuah domain, daftar akun pengguna dan kelompok pengguna, folder yang di-share, dan lain-lain. Sementara itu, layanan direktori yang dimilikinya membuat informasi yang disimpan di dalam basis data dapat diakses oleh pengguna dan aplikasi. Dalam Karya akhir ini penulis akan membuat Active Directory pada lingkungan laboratorium untuk membatasi hak akses user, memudahkan user mengakses file sharing, menjaga keamanan file yang ada dilingkungan laboratorium komputer. Kata Kunci : Active Directory, keamanan, hak akse

    Windows .NET Network Distributed Basic Local Alignment Search Toolkit (W.ND-BLAST)

    Get PDF
    BACKGROUND: BLAST is one of the most common and useful tools for Genetic Research. This paper describes a software application we have termed Windows .NET Distributed Basic Local Alignment Search Toolkit (W.ND-BLAST), which enhances the BLAST utility by improving usability, fault recovery, and scalability in a Windows desktop environment. Our goal was to develop an easy to use, fault tolerant, high-throughput BLAST solution that incorporates a comprehensive BLAST result viewer with curation and annotation functionality. RESULTS: W.ND-BLAST is a comprehensive Windows-based software toolkit that targets researchers, including those with minimal computer skills, and provides the ability increase the performance of BLAST by distributing BLAST queries to any number of Windows based machines across local area networks (LAN). W.ND-BLAST provides intuitive Graphic User Interfaces (GUI) for BLAST database creation, BLAST execution, BLAST output evaluation and BLAST result exportation. This software also provides several layers of fault tolerance and fault recovery to prevent loss of data if nodes or master machines fail. This paper lays out the functionality of W.ND-BLAST. W.ND-BLAST displays close to 100% performance efficiency when distributing tasks to 12 remote computers of the same performance class. A high throughput BLAST job which took 662.68 minutes (11 hours) on one average machine was completed in 44.97 minutes when distributed to 17 nodes, which included lower performance class machines. Finally, there is a comprehensive high-throughput BLAST Output Viewer (BOV) and Annotation Engine components, which provides comprehensive exportation of BLAST hits to text files, annotated fasta files, tables, or association files. CONCLUSION: W.ND-BLAST provides an interactive tool that allows scientists to easily utilizing their available computing resources for high throughput and comprehensive sequence analyses. The install package for W.ND-BLAST is freely downloadable from . With registration the software is free, installation, networking, and usage instructions are provided as well as a support forum

    Web Vulnerability Study of Online Pharmacy Sites

    Get PDF
    Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers’ personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expanding on prior studies. Technical, managerial and legal recommendations on how to mitigate security issues are presented. The proposed four-step method first consists of choosing an online testing tool. The next steps involve choosing a list of 60 online pharmacy sites to test, and then running the software analysis to compile a list of flaws. Finally, an in-depth analysis is performed on the types of web application vulnerabilities. The majority of sites had serious vulnerabilities, with the majority of flaws being cross-site scripting or old versions of software that have not been updated. A method is proposed for the securing of web pharmacy sites, using a multi-phased approach of technical and managerial techniques together with a thorough understanding of national legal requirements for securing systems

    Software Patents: What One-Click Buy and Safe Air Travel Have in Common

    Get PDF
    Have you ever sat in an airplane, typing on your laptop, when the darn thing crashes for the one-millionth time? Have you ever then thought about how the airplane you are sitting in is controlled by software, too--the technical term being fly by wire --and then started sweating uncontrollably? Software controls not only air traffic but plenty of other safety-critical technologies: the tightrope walk of controlling the chain reaction of radioactive elements in nuclear power plants; the navigation and activation of missiles;3 the moves and cutting-depth of a surgical laser when correcting eye-sights; the list goes on... With such reliance on software, malfunction due to errors in the program code becomes unacceptable. Software patents help heighten the standard by supporting the re-use of the code of established and tested systems

    WinLomac: Low Water Mark integrity protection for Windows 2000

    Get PDF
    Computer security has long been one of the most important research areas in computer science. In recent years, the rapid growth in Internet based industry has raised the importance of computer security to an unprecedented level. However, at the same time, profit driven commercial software development always leaves security concerns behind the quick incorporation of new functionalities. Therefore, the need to improve the security of these products is very urgent now. Microsoft Windows 2000, as one of the most popular operating systems, also needs to be improved. Especially, because of the unavailability of the necessary documentation and source code, few third party research and development have been done for Windows 2000 operating system kernel. In this paper, we introduce WinLomac, a prototype security enhancement software for Windows 2000 operating system that enforces Low Water Mark integrity model based Mandatory Access Control in the kernel
    corecore