The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Under most circumstances, cyber criminals will commit fraudulent transactions using proxy services which hide their real IP address and physical location. This is done in an effort to avoid being tracked and prosecuted by law enforcement agencies. This paper presents the investigation of a proxy detection methodology and efforts to implement such technology into a business solution with the sole purpose...
Scraping is the activity of retrieving data from a website, often in an automated manner and without the permission of the owner. This data can further be used by the scraper in whatever way he desires. The activity is deemed illegal, but the change in legality has not stopped people from doing the same. Anti-scraping solutions are being offered as rather expensive services, which although are effective,...
Website system has been widely used in public life, but it also suffers from attacks because of its interconnection, openness, and other features. Therefore, it is a new challenge for security administrators to solve the problem of how to cope with the frequent website security incidents, detect a large number of websites in a certain region rapidly, provide effective and timely precautions. With...
There are two main methods that identify host information Banner and Fingerprint. Through research, analysis and combined with the two methods, we complete and realize passive host characteristic information identification. For other network security research, particularly with regard to improvement of network intrusion detection system, we prepare data, and broaden ideas.
Since several years the number of VoIP (Voice over IP) infrastructures increases and, consequently, the number of VoIP users increases too. Under these circumstances VoIP systems get more and more attractive for attackers, since the probability of successful attacks increases and attackers gain benefits, e.g., money with fee-based telephone numbers. Therefore, this paper describes a solution to capture,...
Privacy leaks are an unfortunate and an integral part of the current Internet domain name resolution. Each DNS query generated by a user reveals -- to one or more DNS servers -- the origin and the target of that query. Over time, users' communication (e.g., browsing) patterns might become exposed to entities with little or no trust. Current DNS privacy leaks stem from fundamental features of DNS and...
This paper conducts a comprehensive analysis of the security of LAN-based Educational Management Information System (EMIS), and proposes security policies and methods required by the system. Meanwhile, it adopts system permission allocation, user authentication, record tracking, protocol auditing, data backup, disaster recovery, warning system and other technologies to design a multi-layered database...
DNS Servers significantly play a vital role in Internet and Intranet environments. It translates human-friendly names into IP addresses and vice versa. However, propagation processing of any change in DNS Server takes hours and days for its full global-wide implementation in both the versions of IP addressing scheme. This is the age of fast communication where bulk of data communication occurs globally...
Traditional network monitoring tools such as Sniffer, Netview, not only provide the flow of network, but also analyze all kinds of protocols in TCP/IP protocol family, but they can't provide the analysis on TDS protocol which used in the Microsoft SQL Sever 2000 in detail. According to the result of testing and researching TDS 7.1 protocol, sums up the communication rule and packet structure of TDS...
This paper proposes an IP trace analysis system based on code moving (IP_TASCM) for sharing Internet measurement, tools and dataset. However, two characteristics differentiate it from other prior similar systems. One of them is that besides the common catalog service, IP_TASCM also stores tools, datasets and measurement results together for researchespsila download and analysis. The other one is that...
Next generation networks (NGN) advocating network convergence, face a series of important technical challenges, one of them is the management of diverse user identities. Existing solutions tackle only a small range of identity issues, often imposing modifications in established network protocols. We present a new identity management and discovery framework that does not impose modifications on existing...
This paper describes a forensic logging system that collects fine-grained evidence from target servers and networks. For the logging system, we developed a TCSEC-B1 level secure operating system and a dedicated network processor that collects network traffic. The logging system is also capable of protecting servers from malicious attacks as well as allowing security managers to obtain forensic evidences...
In this paper we present empirical results and speculative analysis based on observations collected over a two month period from studies with two high interaction honeynets, deployed in a corporate and an SME (small to medium enterprise) environment, and a distributed honeypots deployment. All three networks contain a mixture of Windows and Linux hosts. We detail the architecture of the deployment...
The purpose of this study is to customize the current Document Management System (DMS) known as Unstructured Data Repository (UDR) by consuming the web services technology. UDR is an electronic repository containing digitized Exploration & Production (E & P) drilling reports. The customization is done within the web using .NET platform. The target users are working people in the (E & P)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.