57 research outputs found

    Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots

    Full text link
    The Internet Threat Monitoring (ITM),is a globally scoped Internet monitoring system whose goal is to measure, detect, characterize, and track threats such as distribute denial of service(DDoS) attacks and worms. To block the monitoring system in the internet the attackers are targeted the ITM system. In this paper we address flooding attack against ITM system in which the attacker attempt to exhaust the network and ITM's resources, such as network bandwidth, computing power, or operating system data structures by sending the malicious traffic. We propose an information-theoretic frame work that models the flooding attacks using Botnet on ITM. Based on this model we generalize the flooding attacks and propose an effective attack detection using Honeypots

    Modal Parameter Estimation of Tall Structures using HHT with Improved EMD

    Get PDF
    In this paper, identification of the natural frequencies, damping ratios and mode shapes of the structures using the measured ambient responses are proposed using time-frequency analysis. The impulse responses are obtained from the measured acceleration time history data through cross-correlations. Empirical Mode Decomposition (EMD) is employed on these generated impulse responses to obtain Intrinsic Mode Functions (IMFs). Finally, modal identification of the structure is carried out by performing Hilbert Transform (HT) on these generated IMFs. To avoid the problem of mode mixing during EMD of the signal, an improved version with intermittency criteria along with treatment to end effects during sifting is proposed in this paper. Experimentally measured data of Guangzhou New TV (GNTV) Tower is used to test and verify the proposed algorithm. The studies indicate that the proposed HHT based algorithm can be applied quite effectively for the modal identification of practical engineering structures

    Service Oriented Architecture Using ISO RM- ODP With Respect To Computational Viewpoint

    Get PDF
    ABSTRACT: The Service Oriented Architecture using ISO Reference Model for Open Distributed Processing is a high performance technique for providing effective services to the users. This architecture consists of five different viewpoints namely Enterprise viewpoint, Computational viewpoint, Information viewpoint, Engineering viewpoint and Technology viewpoint. This paper discusses the details about the Computational viewpoint. Computational viewpoint defines the functional decomposition of the system into a set of services that interact at interfaces. These services can be found in a security system and present as classification based on the functionality of services. Interaction between the service requester and the security system, and the communication between the security system and the service provider is carried out through external messages. The security system receives an input message then processes it and produces an output message. The semantics of the message is the issue of information view point. If the security check fails or if the processing logic can't be correctly applied, security services can raise exceptions signalling that the errors encountered. Exception message contain annotations and other meta-information

    Service Oriented Architecture using ISO RM- ODP with Respect to Computational Viewpoint

    Get PDF
    ABSTRACT: The Service Oriented Architecture using ISO Reference Model for Open Distributed Processing is a high performance technique for providing effective services to the users. This architecture consists of five different viewpoints namely Enterprise viewpoint, Computational viewpoint, Information viewpoint, Engineering viewpoint and Technology viewpoint. This paper discusses the details about the Computational viewpoint. Computational viewpoint defines the functional decomposition of the system into a set of services that interact at interfaces. These services can be found in a security system and present as classification based on the functionality of services. Interaction between the service requester and the security system, and the communication between the security system and the service provider is carried out through external messages. The security system receives an input message then processes it and produces an output message. The semantics of the message is the issue of information view point. If the security check fails or if the processing logic can't be correctly applied, security services can raise exceptions signalling that the errors encountered. Exception message contain annotations and other meta-information

    Service Oriented Architecture Using ISO RM- ODP With Respect To Computational Viewpoint

    Get PDF
    ABSTRACT: The Service Oriented Architecture using ISO Reference Model for Open Distributed Processing is a high performance technique for providing effective services to the users. This architecture consists of five different viewpoints namely Enterprise viewpoint, Computational viewpoint, Information viewpoint, Engineering viewpoint and Technology viewpoint. This paper discusses the details about the Computational viewpoint. Computational viewpoint defines the functional decomposition of the system into a set of services that interact at interfaces. These services can be found in a security system and present as classification based on the functionality of services. Interaction between the service requester and the security system, and the communication between the security system and the service provider is carried out through external messages. The security system receives an input message then processes it and produces an output message. The semantics of the message is the issue of information view point. If the security check fails or if the processing logic can't be correctly applied, security services can raise exceptions signalling that the errors encountered. Exception message contain annotations and other meta-information
    • …
    corecore