The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Remote access Trojans (RATs) are used by attackers to compromise and control the victim machine. In this work, a novel Network-based framework is introduced for detecting RAT bots based on data mining techniques. Several machine learning (ML) techniques are used to differentiate between benign and RAT infected machines. Various performance measurements are used to evaluate the performance of the proposed...
Currently, most computer systems use user IDs and passwords as the login patterns to authenticate users. However, many people share their login patterns with coworkers and request these coworkers to assist co-tasks, thereby making the pattern as one of the weakest points of computer security. Insider attackers, the valid users of a system who attack the system internally, are hard to detect since...
Parking in modern world is always a subject of concern and isn't a task to be ignored as it was in old days. With modernization and introduction of digital devices, machines have taken a very important and irreplaceable role in human life. Parking nowadays is also done with the help of much advanced and sophisticated systems. The problem with most of these system is that they need a very high capital...
The long-term and real-time recording and analysis of a patient's heart rate can be helpful for medical staff to estimate a patient's prognosis. The long-term trends of various heart rate variability (HRV) parameters of a patient's condition may indicate disease development. In some cases, it may be used as feedback for providing suitable medical treatment. Because of the long-term purpose of recording...
Distributed Denial of Service (DDoS) is one kind of attacks using multiple computers. An attacker would act as a fake service requester that drains resources in computer target. This makes the target cannot serve the real request service. Thus we need to develop DDoS detector system. The proposed system consists of traffic capture, packet analyzer, and packet displayer. The system utilizes Ntopng...
Methods and ways to perform denial-of-service attack are analyzed and classified in this work. Famous Denial-of-Service attack classifications are reviewed and analyzed. New elements of modern DoS attack classification are proposed.
Nowadays, the attacks are no longer performed from a single computer but from thousands, sometimes millions of systems that are located all over the globe and are grouped in a network called botnet. The most widely used technique to control a botnet is to try to connect to many domain names, generated according to an algorithm called domain generating algorithm (DGA). In this paper we present different...
Attacks of Ransomware are increasing, this form of malware bypasses many technical solutions by leveraging social engineering methods. This means established methods of perimeter defence need to be supplemented with additional systems. Honeypots are bogus computer resources deployed by network administrators to act as decoy computers and detect any illicit access. This study investigated whether a...
In recent years, programs operating on networks are increasing because of the development of distributed processing technology. Therefore, agent-oriented programming, which can respond dynamically to environmental changes, is receiving attention as a development technique. The agent framework is supports software development through agent-oriented programming. For this research, DASH is a repository...
This paper shall introduce the Taipei City Mass Rapid Transit underground section stations chiller Supervisory Control And Data Acquisition (SCADA) system and customized application software system development. Each station's existing chiller machine microprocessor Human Machine Interface (HMI) utilizes a standard communication protocol convertor and the environmental control system control room Open...
At present, more and more courses and exams are held in the college computer room, which leads to more complex operating environment and higher system requirements, so the systematic maintenance work is very difficult. In the article, we develope a control system by c# language, which combines with the actual usage of room and the blank space of the computer room management, aimed at focusing on monitoring...
Mechanisms to detect and analyze malicious software are essential to improve security systems. Current security mechanisms have limited success in detecting sophisticated malicious software. More than to evade analysis system, many malwares require specific conditions to activate their actions in the target system. The flexibility of Software-Defined Networking (SDN) provides an opportunity to develop...
Botnet detection plays an important role in network security. Botnet are collection of compromised computers called the bot. For detecting the presence of bots in a network, there are many detection techniques available. Network based detection method is the one of the efficient method in detecting bots. Paper reviews four different botnet detection techniques and a comparison of all these techniques...
Cloud computing is an emerging technology which enables the cloud users to access the computing resources without having to pay huge capital expenses to scale up the IT infrastructure and reduces the management cost, in both hardware and software. A cloud introduces a resource rich computing model with features such as flexibility, pay per use, elasticity, scalability, and others. In this context,...
Performing research on live network traffic requires the traffic to be well documented and described. The results of such research are heavily dependent on the particular network. This paper presents a study of network characteristics, which can be used to describe the behaviour of a network. We propose a number of characteristics that can be collected from the networks and evaluate them on five different...
Health monitoring involves sensing, reporting, and sometimes adjusting the states of objects or nodes remotely. This paper describes the design and implementation of a real-time distributed hardware health monitoring framework, assuming a homogeneous set of hardware nodes. The framework consists of sensor components operating at the nodes, and visualization components operating at monitoring stations...
Green computing has become one of the hottest trends in recent years. In this research area, the major purpose is to reduce the energy consumption as well as the CO2 emission. Obviously, this topic has been the important issue in the field of electronic and computer engineering. In fact, energy factor might be considered to be a significant cost when running any computing system. Basically, energy...
Concentration of Carbon monoxide (CO) and Carbon dioxide (CO2) that high in the air is very dangerous for human life. Carbon monoxide is a poisonous gas that damages the circulation of oxygen in the blood when inhaled, while carbon dioxide is one of the gases that cause global warming. Both gases are classified as colorless and odorless gas so that the necessary special tools to monitor their concentration...
Domain Name System is the most widely used protocol for domain name resolution in the Internet. Domain name resolution is necessary for most of Internet services and it is usually provided by DNS full resolvers. Unfortunately, many reports indicated that DNS protocol was also used in botnet communication recently. Botnet communications between bot-infected computers and Command and Control (C&C)...
Public computer lab is very common in college and university. The main cost for maintenance lab is the power cost. In our university, the public computer lab consume more than 40kWh per day. The earlier study found that most cost comes from a major part: Some users don't shut down the computer after their usage. In this study, we use a low-power single-board computer (Raspberry Pi 2) for interactive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.