16 research outputs found

    Some ethical hacking possibilities in Kali Linux environment

    Get PDF
    This paper deals with the problem of ethical hacking and security of computer systems. When we talk about security of an information system, we actually mean the primary three attributes of the system: confidentiality, integrity and availability. There are various approaches with aim to identify existing security weaknesses and security assessment. One of them is using Kali Linux operating system with its integrated effective tools specially adapted to the realization of various types of attacks. The paper gives a general overview of some Kali attacking possibilities on client and server side and highlights their specificities. The undoubted benefit of this operating system is a large collection of different hacking tools in one place which significantly facilitates vulnerability assessment and security testing

    EWMA Algorithm in Network Practice

    Get PDF
    Intrusion detection is used to monitor and capture intrusions into computer and network systems which attempt to compromise their security. Many intrusions manifest in changes in the intensity of events occuring in computer networks. Because of the ability of exponentially weighted moving average (EWMA) control charts to monitor the rate of occurrences of events based on their intensity, this technique is appropriate for implementation in control limits based algorithms. The paper also gives a review of a possible optimization method. The validation check of results will be performed on authentic network samples

    Implementation of Software-Defined Networks Using Open-Source Environment

    Get PDF
    The paper gives an overview and analysis of software-defined technologies in the context of the actual problems of conventional computer networks. The virtualization process lies at the basis of software-defined network architecture. The basic concepts of software-defined networks are elaborated, as well as their implementation and configuration in cloud environment using OpenStack open-source software with Microsoft Hyper-V hypervisor. The practical part of this research showed that the implementation of a software-defined network into an existing standard network is relatively simple to realize, remaining all the time in open-source framework. All existing network functionalities were held, and it is also possible to provide additional network operations such as traffic monitoring in a completely open-source environment

    Approximation of Internet Traffic in Wavelet Domain

    No full text
    The paper elaborates the complexity and importance of modeling Internet traffic. In this sense, having in mind the nature of Internet traffic as well as actual information in this sphere, it was emphasized that there is no universally applicable model. This standpoint has initiated the idea of examining the possibility of approximation internet traffic. Because of the rather suitable property, namely that is not necessary to provide stationarity of the input signal, traffic analysis in this paper was performed in wavelet domain, using different types of wavelets, with the aim of determining the convenience of certain wavelets for the analysis of Internet traffic. It was concluded that all examined wavelets have generated approximately similar statistical results, which depend on the selected level of approximation and analyzed traffic curve. For different curves at the same level of approximation, statistical values have been obtained that do not differ significantly from the statistics of the corresponding original signals. It was also found that the discrete approximation of the symlet wavelet sym(2) provided the largest number of statistically accurate results, and in this regard proved to be the most suitable for the analysis of Internet traffic

    Fitting Univariate Distributions to Computer Network Traffic Data Using GUI

    No full text
    The available literature is not completely certain what type(s) of probability distribution best models computer network traffic. The statistical analysis presented in this paper aims to show the implementation of graphical interface for fitting univariate distributions to authentic network traffic data. The analysis is realized in Matlab based GUI, using distribution fitting tool

    The Framework of Runtime Application Self-Protection Technology

    No full text
    This paper describes the basic concepts of a relatively new security approach - Runtime Application Self-Protection Technology (RASP), whose wider implementation is expected in the near future. The current focus of this technology is on the vulnerabilities of Java and. NET platforms. In addition to typification, the paper presents the advantages and disadvantages of RASP. Despite the undoubted advantages, it is not an independent and comprehensive solution to ensure the security of the software. In combination with the tried and tested conventional methods, RASP provides an efficient way to prevent malicious activities

    Delphi Application for Face Detection Using the Sobel Operator

    No full text
    The subject of this work is a face detection. Face detection is the process of determining the positions and sizes of human faces in photos using computer technology. This is a very complex problem which has many solutions with different algorithms. Automatic face detection is the first step in recognizing faces, which leads to much greater opportunities, such as face recognition instead of password for email accounts, or automated banking machine

    Measuring team member performance in Scrum - case study

    No full text
    Based upon information received from the industry, one can define the knowledge and skills that are required for an engineer aiming to work in the IT industry. In this paper the authors present a possible method by which the learning process can be made more efficient. The authors highlight some advantages of the project-oriented approach in a programming course at Subotica Tech, an institution that educates professional engineers. In that course the students are developing applications for mobile devices. This novel method is based on the inclusion of the great number of demands from the industry, which the future engineers meet upon entering this sector

    Code Hunt - "Hunting" to Learn Programming

    No full text
    Programming is a major subject in Computer Science (CS) departments. However, students often face difficulties on the basic programming courses due to several factors that cause these difficulties. The most important reason may be the lack of problem solving abilities that many students show. Learning to code can be made more effective if it is perceived as fun by the learner. Code Hunt uses puzzles that players have to explore by means of clues presented as test cases. Players iteratively modify their code to match the functional behavior of secret solutions. The aim of this paper is to introduce an educational, browser-based coding game which can help in learning coding

    Kernel Sets in Compass Edge Detection

    No full text
    Edge detection is an important operation in the analysis of a digital image and includes a set of mathematical methods to identify points of discontinuity. For this purpose, different algorithms are used for estimating image gradient. Many edge detection techniques are implemented with convolution mask and based on discrete approximations to differential operators. Differential operations measure the rate of change in the image brightness function. The compass approach implies taking a single mask and rotating it to major compass orientations. Using a suitable programming environment, this paper provides a comparative visual analysis of several digital images, with the ability to change the kernel set in compass edge detection
    corecore