The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An efficient web server fulfills the requirements of the users as with the rapid development in technology. All the web contents accessed through Internet serviced by a web server in content distribution networks (CDN). Web server distributes web pages to respective clients as a first priority. To increase the performance, scalability and efficiency, the web server needs a peer-to-peer (P2P) network...
This paper analyzes database requirement of embedded development and embedded Web server, combines with the database design on embedded home gateway using SQLite architecture, and implements the SQLite embedded database on home gateway. Web server is successfully ported, and embedded Linux operation system is ported to home gateway platform.
In recent times, the web-based applications has grown rapidly and there has been an explosive increase in the number of users. Hence, it is necessary to develop technique to deal with several users. In this study, we particularly focus on web-based multiplayer online role-playing games (MORPGs), which have a large number of users and deal with high frequency of user requests. In our previous work,...
Many techniques are commonly used to increase server availability or for distributing the load among a group of servers. We propose a technique for splitting a single HTTP request that allows a TCP connection to be dynamically split between two Web servers without using a central control. For example, one server can handle connection establishment and closing, while another handles the data transfer...
To offer Web-IMS convergent services, network operators are providing interfaces for Web servers such as Parlay X on top of IMS application servers. However, this type of architecture leads to the building of at least as many interfaces as there are IMS services opened to the Web servers. This architecture also lacks consideration on media/transport processing. This paper presents a unique and generic...
One challenge in web security education is its interdisciplinary and practical nature. Students need to have the basic knowledge and skills of a web developer to understand many of the web security topics, and some of them are normally covered in multiple advanced courses like Computer Networks and Network Security, or are absent from many existing undergraduate or graduate degree programs. This paper...
Most successful cyber attacks begin with successful information gathering. Now more and more Web servers try to hide their identities by removing product tokens in the “Server” header in their responses discreetly, but that fails because of some Web fingerprinting tools. Some tools try to defeat these fingerprinting tools by changing Web servers' headers order or adding/removing some headers, but,...
The widespread use of Web applications, in conjunction with large number of vulnerabilities, makes them very attractive targets for malicious attackers. The increasing popularity of Web 2.0 applications, such as blogs, wikis, and social sites, makes Web servers even more attractive targets. In this paper we present empirical analysis of attackers activities based on data collected by two high-interaction...
Using malicious sites to launch attacks against client user applications is a growing threat in recent years. This led to emergence of new technologies to counter and detect this type of client-side attacks. One of these technologies is honeyclient. Honeyclients crawl the Internet to find and identify web servers that exploit client-side vulnerabilities. In this paper, we address honeyclients by studying...
The impact of software faults present in components to the larger system is currently a relevant and still open research topic. Web-based applications are simultaneously a relevant type of system for our society and are typically exposed to many software components in the server side. The impact of faults in these components to the web servers is an important aspect when evaluating the dependability...
The SQL injection attacks (SQLIAs) vulnerability is extremely widespread and poses a serious security threat to web applications with built-in access to databases. The SQLIA adversary intelligently exploits the SQL statement parsing operation by web servers via specially constructed SQL statements that subtly lead to non-explicit executions or modifications of corresponding database tables. In this...
Searching for examples to encourage and motivate students in a subject is not a trivial task. Future Computer Science and Telecommunications Engineers tend to look at Automatic Control reluctantly. They do not relate their working life to it. But, if we blend examples from two areas: telecommunications and control, maybe we can change their minds. These engineers work with web servers: systems that...
TCP/IP, the most commonly used network protocol, consumes a significant portion of time in Internet servers. While a wide spectrum of studies has been done to reduce its processing overhead such as TOE and Direct Cache Access, most of them did studies solely from the per-packet perspective and concentrated on the packet memory access overhead. They ignored per-session data TCP Control Block (TCB),...
Web servers providing services are widely used in Internet. The behaviors of web servers can be expressed by actions equipped with parameters of time and priority. However, process algebras nowadays cannot specify the behaviors of web server with different groups of clients with priorities and time limitations. We present a process algebra with timed-priority executing policy that can specify the...
A new way to interact with small devices consists in embedding tiny Web servers, allowing the devices to serve fully-fledged Web applications. When the device needs to keep its users up-to-date of its internal state, the Web application has to use an event publication solution. Several works have recently been conducted in order to evaluate the trade-offs of various Web-based event notification solutions...
With the explosive growth of the network, the workload on the servers is increasing rapidly so that servers will be easily overloaded for a short time. Linux virtual server (LVS) project which is an open source project overcomes the overloading problem of the servers. The three implemented ways of the virtual server is introduced. A LVS cluster of Web servers based on VS/DR is presented for an online...
Internet marketing is the practice of applying marketing techniques to drive traffic to websites. The business community has developed techniques that can generate traffic to websites; however, little work has been done to develop models that assess the performance of web servers resulting from Internet marketing campaigns. From a computer performance standpoint, one challenging aspect of Internet...
Managing client perceived pageview response time for multiple classes of service is essential in today's highly competitive, e-commerce environment. We present Connection and Performance Model Driven Optimization (CP-MDO), a novel approach for providing optimal QoS as defined by a cost objective based on client perceived pageview response time and pageview drop rate. Our approach combines two vital...
The Delay/disruption tolerant networks (DTNs) provides a new option for the future network applications, but nothing has been done for the research on how to design and deploy the Web servers which can provide performance guarantee or service differentiation on DTNs. Response delay is a key performance metric for Web servers and proportional delay differentiated service is an important DiffServ model...
This paper is focused on modeling Web request and session level arrival processes. We propose a statistically rigorous approach which includes testing for non-stationarity and Gaussianity, and uses model selection criterion. Furthermore, a goodness of fit test is applied to each candidate model - ARMA, ARIMA, FARIMA, and FGN - and for validation purpose real data is compared with data simulated from...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.