The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Syslog play an increasingly important role as a technological means of security audit in the monitoring equipment and resources. From the actual needs,the project design and realize audit logging . Compare the differences between RFC5424 and RFC3164, and achieve the syslog protocol with rsyslog. The project use PHP programming to implement user management interface and support to query log with Combination...
The intelligent building system integration is a hot topic in the construction sector currently. The processing decision required to give in emergency, is to achieve the controlling, linkage, coordination and optimization goals, providing the time of escaping and passages for supervisors. In this paper, the mutual controlled monitoring and communication technology which is based on dual tone multi-frequency...
The system of WebMail content and attachments recovery can monitor the network without affecting the performance of the network, check the network for confidential information leakage phenomenon. if found it will store the leak records into the hard disk automatically which will be used as evidence for security sectors. This paper introduces in detail the design and implementation of the WebMail content...
This paper proposes the solution of information service and management based on China Next Generation of Internet (CNGI) for the regional sustainable development in the Great Mekong Subregion (GMS), especially in the Yunnan Province of China at this stage. The platform and the technical standards of information service and management are developed. The platform is consisted of next generation of the...
For the current problems in the security situation of colliery equipment ,and based on non-linear relationship among the parameters of colliery equipment ,this paper presents a method for forecasting the safety of colliery equipment based on BP neural network.By using BP neural network in the colliery safety equipment monitoring and warning issues,we established a multi-index comprehensive monitoring...
An intelligent security system based on ARM microcontroller was developed. The system can realize the monitoring of the intrusion signals automatically by using pyroelectric infrared detectors, alarming through the Ethernet, and displaying the invasion information on the PC screen. In order to monitor alarm signals, the PC server is in the state of listening when there is no information arrived, and...
The proposed model in this paper is the intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood. The technique is designed for detection of malicious nodes in a neighborhood of nodes in which each pair of nodes in the neighborhood are within radio range of each other. Such a neighborhood of...
With the development of database technology and the popularity of Internet, the database applications have been increasingly widespread; we must face on some serious database security. The database system is the aggregates of the message, and it is the core components of the computer message system. The security of database is very important; it is related to the success of enterprise and national...
Although many studies proved that it was possible to embed application servers on a chip with limited resources, security considerations were generally marginalized. Due to their frontal position, application servers are subject to an increasing number of threats. These vulnerabilities are actually ignored in most cases mainly because of cost constraints. This paper introduces the concept of Secure...
Even though Intrusion Detection Systems (IDS) are in wide-spread use, the question of how to efficiently initiate responses to detected attacks has been discussed far less often, especially in highly dynamic scenarios such as tactical MANETs. Despite being flexible and robust in their ability to self-organize, these MANETS are distinctly more susceptible to attacks than their wired counterparts. Especially...
User's behaviors in information systems have different formats in different working modes, they mean users' intention actually. API callings, menu selections or requests are the familiar base elements of software behaviors, and different technologies are required to monitor and understand them. In information systems, it is necessary to insure that users' software behavior is trusted while processing...
This paper describes a new botnet that we have discovered at the beginning of December 2009. Our Net Flow-based network monitoring system reported an increasing amount of Telnet scanning probes. Tracing back to a source we have identified world wide infected DSL modems and home routers. Nowadays, various vendors use Linux in this kind of devices. A further investigation has shown that most of deployed...
Researched and developed the software system of Information Management and Decision Support System of the hidden danger troubleshooting of Coal Mine. By using the technology of collaborative software to realize fast circulation of information, dynamic tracking, rapid feedback, and closed-loop management of transaction processing for the hidden danger, and by applying the technology of data mining,...
In Service Oriented Architecture, Quality of Service (Qos) represents an important issue which is often considered when selecting and composing services. For receiving up-to-date information, non-functional properties can be continuously monitored using current methods. Because of the occurrence of monitoring at every time of service calling, the current methods imposes some overhead on the SOA. The...
This paper discusses different aspects of performing monitoring in the context of software intensive systems. The focus is especially on cases where the observed system is distributed, and the monitoring system needs to be secure, dependable and capable to adapt to a number of dynamic scenarios during the system evolution. Based on analysis of monitoring needs in this type of a domain, a set of core...
A workflow system for SaaS enables organizations of any size to build, execute, manage, and evolve its own process-oriented business applications. In this paper we bring up a flexible manual task process customization workflow system based on SaaS to resolve the problems problem caused by orchestrating SaaS business process based on XPDL. It enables multi-tenant to customize processes and manual task...
Situational assessment is significant for host-level security. Most existing approaches are generally limited to network security that is different from host-level security. In this paper, we introduce an approach to assess host security. Analyzing process and file behaviors, we propose a series of security indices, based on which we compute the value of process situation (PS) and file situation (FS)...
In the Age of Information, network education pays more attention to the application of IT technology and the training of talents, which makes learning more of customization and of opening up. In order to better enable learners to go beyond the limitations of space and time to acquire knowledge; in order to provide excellent learning environment for greater freedom and greater choice of learning activities...
The wireless local area network (WLAN) technology has a rapid development because its advantages of fast and high-efficient, flexible and easy in net building. Wireless network brings users convenient network service, but it also hides many security problems that hinder WLAN's development. This paper combines the accountability of IP address with trust routing to a second mechanism applied in WLAN...
The availability of real-time CAN-ECU data and the emerging vehicular networks are critical for advanced vehicle monitoring and control. This paper presents our integrated info-security scheme, real-time hardware/software solutions and their application scenarios. The core is the Integrated Info-Security Circuit Board to communicate with ECUs and sensors inside a vehicle through CAN Bus, LIN Bus,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.