The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Energy fuels the growth and development of any country, and as such effective monitoring, measurement, billing and access control is imperative. This paper presents a device that uses the evolving Internet of Things (IoT) technology in the design and implementation of an Internet based prepaid energy meter often referred to as smart meters. The energy measurement and billing system is automated. The...
Nowadays, providing a security system for houses has become a vital research in which the latest technologies are being adopted to serve this purpose. Wireless network is one of the technologies that have been used to provide remote monitor and control for the home appliances. This paper aims to propose a security door lock system based on Raspberry pi technology where cameras, keypad and pi-lids...
In this paper we study the problem of estimating the cardinality of pairwise set operations (union and intersection) over sets possessed by different data owners, while preserving differential privacy. In our problem setting, a data owner could only communicate with an untrusted server, and thus have to perturb its set data for privacy protection before sharing them with the server. This problem setting...
Digital documents are likely to have problems associated with the persistence of links, especially when dealing with references to external resources. People keep track of various webpages of their interest using distributed digital collections and without possession of these documents; the curator cannot control how they change. In the current context, managing these distributed digital collections...
In order to communicate with another service, a service needs to know the address of other services. This knowledge can be acquired by a process called service discovery (SD). In a microservice architecture (MSA), unlike SOA, a service discovery framework has not been provided out of the box. In a telecom environment additional requirements may arise, besides the basic one of discoverability. In this...
There is a spectrum of solutions are available for distributing content over the Internet today. One of these solutions is Content distribution networks (CDN). CDN need to make decisions, such as server selection and routing, to improve a performance of content distribution. But we must remember, that performance may be limited by various factors such as packet loss in the network, a small receive...
Worldwide, constant growth of number of computers in use actualises issue of IT users impact on environment. Green IT methodology is one of the proactive action on preservation of environment and reduction of negative effects of IT. Untill 2012. there was not a clear metric standard for measuring data center power efficiency. Among available metrics in this paper two of them are considered: Power...
Traditional unreliable failure detectors are per process oracles that provide a list of nodes suspected of having failed. In [Rossetto et al., 2015], we introduced the Impact failure detector that outputs a trust level value which is the degree of confidence in the system. An impact factor is assigned to each node and an input threshold parameter defines an impact factor limit value, over which the...
Attacks of Ransomware are increasing, this form of malware bypasses many technical solutions by leveraging social engineering methods. This means established methods of perimeter defence need to be supplemented with additional systems. Honeypots are bogus computer resources deployed by network administrators to act as decoy computers and detect any illicit access. This study investigated whether a...
Information security access platform is a core security practices of foundation to construct security access platform system of smart grid, and undertake a various important function of real-time monitoring, security access, secure data transmission and exchange, active defense in all kinds of complex network environments. However, the monitoring of network traffic classification is directly related...
A quorum system is a collection of process sets (quorums) which intersect among themselves. Quorums are used by many distributed applications such as mutual exclusion, data replication, and for the dissemination of information. This work presents an autonomic solution to build a majority quorum system that is self-adaptive by dymically reconfiguring itself if processes fail. Processes can fail by...
Recently, cyber attacks become so sophisticated that conventional countermeasures that focus on preventing intrusion are becoming less effective. Thus, recent countermeasures are focusing on after intrusion such as an incident response. We previously proposed a system in order to support network administrators performing incident responses. However, our previous system uses only anomaly detection...
In recent years, IT Service Providers have been rapidly introducing automation to their service delivery model. Driven by market pressure to reduce cost and maintain quality of services, they are looking for technologies that will allow rapid progress towards attainment of truly automated service delivery. Software monitoring systems are designed to actively collect and signal event occurrences and,...
Global Domain Name System (DNS) traffic provides a unique perspective on domain names usage by both legitimate users and suspicious applications. Beyond conventional DNS analysis queries and responses altogether, in this paper we investigate domain name queries to identify suspicious network traffic at.br country code Top-Level Domain (ccTLD) authoritative name servers. By monitoring and modeling...
Small-to medium-scale enterprise systems are typically complex and highly specialized, but lack the management resources that can be devoted to large-scale (e.g., Cloud) systems, making them extremely challenging to manage. Here we present an adaptive algorithm for addressing a common management problem in enterprise service networks: safely and rapidly recovering from the failure of one or more services...
At present malicious software or malware has increased considerably to form a serious threat to Internet infrastructure. It becomes the major source of most malicious activities on the Internet such as direct attacks, (distributed) denial-of-service (DOS) activities and scanning. Infected machines may join a botnet and can be used as remote attack tools to perform malicious activities controlled by...
In recent years, the amount of data produced by mobile devices and the Internet has increased rapidly. To facilitate the storage of such a large amount of data, open-source-based cloud storage services have also increased. However, most of administration tools which are specialized in managing open-source-based storage services have shortcomings such as lack of sufficient features and difficulty in...
Many complex application services are deployed in virtualized Cloud environments. Cloud applications consist of multiple components and the data flow among these components tends to be highly complex and unpredictable. The complexity and heterogeneity make anomaly detection challenging. We propose FlowBox, a distributed anomaly detection system for Cloud applications. FlowBox considers each server...
Network technologies development provides constant access to the consumer electronic devices, so that they are becoming remotely managed. This paper presents a solution for support of Lua based configuration scripts definition as a part of the auto-configuration system. This system enables the user to create, control or remove configuration scripts and define criteria for script execution triggering...
We present a comprehensive framework for automatic phishing incident processing and work in progress concerning automatic phishing detection and reporting. Our work is based upon the automatic phishing incident processing tool PhiGARo which locates users responding to phishing attack attempts and prevents access to phishing sites from the protected network. Although PhiGARo processes the phishing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.