The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A number of communications in the work of the informative sites of leading scientific organizations of the Russian Federation, including in the structure of the Russian Academy of Sciences and Federal Agency of Scientific Organizations is researched.
Decoy routing is a powerful circumvention mechanism intended to provide secure communications that cannot be monitored, detected, or disrupted by a third party who controls the user's network infrastructure. Current decoy routing protocols have weaknesses, however: they either make the unrealistic assumption that routes through the network are symmetric (i.e., the router implementing the decoy routing...
A system for protecting web resources on web site server is proposed. A few number of protection system have been developed over the past decade. However, because of the insecurity of internet, these traditional systems are quite fragile under the attacks from internet. We propose a protection system for protect the recourses on web site server by combining the hash signature algorithm and digital...
A casual network security monitoring system is proposed in this paper. The system is easy to deploy without reconfiguring the central network infrastructure, the firewall, and the intrusion detector system (IDS) of an organization. A virus-infected host, which is hidden by the network address translator (NAT) of a sub LAN, can be identified easily by using this monitoring system with the IDS. This...
Malicious web pages are an emerging security concern on the Internet due to their popularity and their potential serious impacts. Detecting and analyzing them is very costly because of their qualities and complexities. There has been some research approaches carried out in order to detect them. The approaches can be classified into two main groups based on their used analysis features: static feature...
Web sites are often a mixture of static sites and programs that integrate relational databases as a back-end. As they evolve to meet ever-changing user needs, new versions of programs, interactions and functionalities may be added and existing ones may be removed or modified. Web sites require configuration and programming attention to assure security, confidentiality, and trust of the published information...
Malicious web pages that launch client-side attacks on web browsers have became a severe threat in today's Internet. High-interaction client honeypots are security devices that detect these malicious web pages on a network. However, high-interaction client honeypots are not good enough for detecting malicious web pages, especially for web pages carrying rootkit which is used to hide the presence of...
This paper constructed a web site supervision system to analyze the sentiment orientation of the articles (document, text) on the web sites in intranet. A scheme based on Vector Space Model (VSM) is put forward for identifying the sentiment orientation of document. Considering the feature of a document is relative to the term frequencies appears in the document and corpus, we extract the feature of...
After a brief analysis to the information spreading mode under internet-based micro-blog platform, it quickly classifies and audits the related mirco-blog content in the spreading process in this paper. Then, by analyzing the sender's mood tendency to some specific topics in the content of micro-blog message, it proposes a content audit model under the micro-blog service platform. Furthermore, by...
Whenever the question arises how a product, a personality, a technology or some other specific entity is perceived by the public, the blogosphere is a very good source of information. This is what usually interests business users from marketing or PR. Modern search services offer a rich set of tools to monitor or track the blogosphere as a whole, but the analysis with respect to a certain domain is...
With the pervasion of Internet and the sharp increase of the number of netizens, Network public opinion has been serving as an effective method in the monitoring and reflection of social public opinion. However, Regulatory Authorities are inclined to concern more about public opinion in a special field while it is too difficult to acquisite the expected information that relates to a special area from...
With the widespread use of broadband network, the firewall, as a filter installed on the border of network, can easily cause congestion and becomes the bottleneck of network transmission. The Web Monitoring System Based on the URL Analysis introduced in this paper replicates the user Web request by the use of the monitoring technology, extracts and analyzes the URL of user request. Then the URL will...
With the growth in size and complexity of High Energy Physics experiments, and the accompanying increase in the number of collaborators spread across the globe, the importance of widely relaying timely monitoring and status information has grown. To this end, we present online Web Based Monitoring solutions from the CMS experiment at CERN. The web tools developed present data to the user from many...
Using malicious sites to launch attacks against client user applications is a growing threat in recent years. This led to emergence of new technologies to counter and detect this type of client-side attacks. One of these technologies is honeyclient. Honeyclients crawl the Internet to find and identify web servers that exploit client-side vulnerabilities. In this paper, we address honeyclients by studying...
Client honeypots visit and interact with suspect web sites in order to detect and collect information about malware. This paper will show the benefits of client honeypots as well as the use of an automated state machine in conjunction with a client honeypot. The state machine provides a powerful framework to organize monitoring of malware activity and record the results. We are developing a platform...
Recently, micro-blogging sites such as Twitter have garnered a great deal of interests as an advanced form of blogging, where individuals can share their experiences, thoughts, feelings, etc, in real time. Additionally, mobile device based micro-blogging applications are now enabling the incorporation of extremely precise location information in the form of GPS-based coordinates. With the enormous...
Remote control over the internet is generating significant research interest, of which a major research challenge is the generation of Web User Interface (WUI) according to individual user's specific requirements, for example different users have an interest in monitoring and controlling different machines. Furthermore, the same user may also be interested in different machines in different sessions...
Open source software (OSS) has steadily penetrated the software industry. OSS can be interpreted in many ways, such as software license, as a development philosophy, and as a development process. OSS has increased in its maturity as a solution for industries in the last decade. OSS also continues to exploit its options as a business model. The author proposes a three stage model of the evolution of...
This paper presents the conceptual design of an emergency alert service which addresses the problem of getting help in a crowd. The design is based on the results of more than 30 years of research in social psychology on the bystander effect and it addresses the obstacles for helping by directing an alert directly to the members of the victim's social group who happen to be near the location of the...
The availability of the Internet at the click of a mouse brings with it a host of new problems. Although the World Wide Web was first started by physicists at CERN to enable collation and exchange of data, today, it is used for a wide range of applications. The requirements on bandwidth for each of the applications is also varied. An Internet Service Provider must ensure satisfaction across the entire...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.