The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Content Delivery Networks (CDN) act as trusted overlay networks that offer high-performance delivery of common Web objects, static data and rich multimedia content by distributing content load among edge servers which are close to the clients. And the interconnection of different CDNs (called CDNi) could provide more advantages and benefits to both content provider and client than a single CDN during...
We propose a restoration method that Pacemaker only detects a failure of physical server but a virtual resource arrangement scheduler calls OpenStack APIs to re-build virtual resources on multiple physical servers to restore them. We implemented the proposed method and showed the effectiveness of fast restoration through performance measurements.
Web systems evolved in the last years starting from static websites to Web applications, up to Ajax-based Rich Internet Applications (RIAs). Reverse Engineering techniques followed the same evolution, too. The authors and many other WSE contributors proposed a lot of innovative and effective ideas providing important advances in the reverse engineering field. In this paper, we will show the historical...
Reasonable and efficient use of information technology resources can serve education well and improve teaching quality. During the teaching process, it creates multiple virtual website by using internet service manager in servers through LAN access to the server of virtual web site. This can greatly improve the internet speed and meet the needs of teaching.
Now days, Internet in becoming a basic medium communication either for business or individual life as most countries in the world are applying free internet access. However, absence of proper regulation has lead to social epidemic such as reducing working performance, addiction to pornographic sites and online gamming. Organization, companies and family institutions are fully aware of the current...
This work presents a classifier capable of classifying websites accessed by a community of users based on characteristics of web traffic they generate. The classifier introduced here can be used for engineering web traffic. This classifier is capable of identifying a few different classes of websites based on intensity of bursts of web requests made to each website in both the long and the short run...
Web-based malware is becoming a more serious security issue every day as web services become a bigger part of the Internet. The cost of detecting malware based on web page crawling increases exponentially the more pages beneath the main page are scanned. In this paper, we propose a dynamic method to detect malware when a user connects to a web page infected by malware. Then, we also devise a server-based...
Pharming attacks - a sophisticated version of phishing attacks - aim to steal users' credentials by redirecting them to a fraudulent website using DNS-based techniques. Pharming attacks can be performed at the client-side or into the Internet, using complex and well designed techniques that make the attack often imperceptible to the user. With the deployment of broadband connections for Internet access,...
As the popularity of the web increases and web applications become tools of everyday use, the role of web security has been gaining importance as well. The last years have shown a significant increase in the number of web-based attacks. Too many nouns web application security vulnerabilities result from generic input validation problems. Examples of such vulnerabilities are SQL injection and Cross-Site...
Phishing is a kind of online security attack where the attacker creates a replica of an existing web page to fool users in order to hack their personal, financial, or password data. The statistics today reveal that the current Anti-Phishing system has failed to prevent Phishing completely. In this paper an Anti-Phishing algorithm is proposed which is termed as Phish-Secure. Phish-Secure use the concept...
Malicious web pages that launch client-side attacks on web browsers have became a severe threat in today's Internet. High-interaction client honeypots are security devices that detect these malicious web pages on a network. However, high-interaction client honeypots are not good enough for detecting malicious web pages, especially for web pages carrying rootkit which is used to hide the presence of...
Phishing is the criminal activity of enticing people into visiting websites that impersonate the real thing, to dupe them into revealing passwords and other credentials to carry out financial fraud. This less suspected and high profile attack lays a deceit trap to the unwitting and gullible customers to part with their sensitive credentials to unauthorized entities. The inherent suave and subtle vulnerabilities...
Industry has responded to the ever-growing presence of spam by attacking the spam distribution infrastructure, essentially trying to prevent spam email from ever landing in the inbox of end-users. Recently, industry and academia have begun investigating the web hosting infrastructure of spam campaigns, attacking spammers where it hurts most, in their pocketbooks. Spammers have responded by introducing...
Nowadays, more than 2 billion people around the world have access to the Internet regularly, and the Internet is the most important platform for information, work and entertainment with more than 150 million active websites. However, these websites are accessible only through devices equipped with a screen and a Graphical User Interface (GUI). Furthermore, these devices need a network connection to...
This research is subjected to propose an architecture for fast built and integrated a new marketplace service. For comparison to traditional manners of establishing a marketplace, the cost and the availability for operating and integrating the technology would be very huge. Therefore, the proposed system is named AMaaS, which redesigns the architecture that most online application marketplaces have,...
This paper discussed the, meaning and related techniques of constructing the high-performance WEB sites for the self-help service system, for the sake of advance usability and dependability of the self-help service system, design the project that carrying out gather-group technique of servers and load-balanced technique in system, it is mostly considered the complexion of the difference construct...
A development model of blog management system was proposed based on the requirement analysis and feasible analysis. In order to express the system structure clearly, the functions and management models of foreground and background were studied. Visitors, registered users and administrators were endowed with different rights, which are based on the different level. Object-oriented program design method...
As the popularity of smart phone, Web 2.0 data, and 3G mobile networks, people are getting used to search for information from the Internet anytime and everywhere. However, typing text query on mobile device and digesting a large number of retrieved user-generated data are both inconvenient for users. To overcome these troubles, we develop a wearable system, Le Festin, which is a shop sign recognition...
This paper describes a new type of search engine that allows the users to have more interaction and control of their Internet. Using the new search engine, we can treat Web pages and files on the Internet like files on our own disk directory. We can browse, organize, search, and even edit Internet files the same way as we do on our files. The proposed approach is to present the search results in a...
In this paper, we propose a stochastic web dynamic model based on the concept of queuing theory to measure popularity of websites in the World Wide Web. We assume that the characteristics of a website such as novelty, popularity, reliability, and relevancy are governed by two major forces: internal or self-growth of each website and external functions acting on the website. In stochastic language,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.