The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security mechanisms within DBMSs are far from effective to detect and prevent anomalous behavior of applications and intrusions from attackers. In fact, intrusions executed by unauthorized users to explore system vulnerabilities, and malicious database transactions executed by authorized users, both cannot be detected and prevented by typical security mechanisms. In this paper we proposed a database...
In this paper, the tool "sniffer" is introduced and controlled as a sensor by the IDS via mobile agents; these agents gather intrusion detection data and send them back to the server for analysis. We propose a distributed intrusion detection system (DIDS) which detects intrusion from outside the network segment as well as from inside using mobile agents. The proposed model consists of three...
Autonomous robots that operate in real-world domains face multiple challenges that make planning and goal selection difficult. Not only must planning and execution occur in real time, newly acquired knowledge can invalidate previous plans, and goals and their utilities can change during plan execution. However, these events can also provide opportunities, if the architecture is designed to react appropriately...
Next generation services are a trend that places emphasis on providing value-added services. This trend remains a challenge to telecommunication operators who in an effort to survive and remain relevant, now have to contend with managing their existing network-based services as well as their new application-based next generation services. A critical implication is that operation management systems,...
Embedded systems in general and microcontrollers in particular are playing a key role in today's industrial automation and remote monitoring era for enhanced productivity and reduced costs. The aim of this paper is to report research at e-Monitoring and e-Management Research Centre (eM2RC) at College of E&ME (NUST) on distributed e-Monitoring and e-Management (eM2) using Man-to-Machine, Machine-to...
Our goal is to enhance on-site personalized access and recommendations for cultural heritage. We have designed and implemented the SMARTMUSEUM platform using adaptive and privacy preserving user profiling. The described recommendation system relies on combining a semantics/ontologies based approach with a data mining/statistics based approach. The paper presents the architecture and main methods of...
Flexible, distributed monitoring systems are essential to support decisions in a variety of contexts such as, for instance, vehicular traffic control, emergency evacuation plans, energy optimization services, pollutant detection or intelligent agriculture applications. In this paper, we present WSNAP, a platform for wireless sensor network (WSN) deployment. WSNAP relies on standard technologies, which...
This paper describes a PROFINET I/O passive OPC server that was realized as a student's project built at the Institute of Informatics, Silesian University of Technology in cooperation with the company Softing A.G. The authors describe the project idea and present the practical results of the experiment. The results prove the thesis that the proposed solution for data exchange between horizontal and...
This paper presents an automated approach to record Web activity as the user connects to Internet. It includes monitoring and logging of Web URLs visited by the user. The distinctive features of this approach are a) it starts automatically, b) it is transparent to users, c) it is robust against intentional or un-intentional process kill, and d) it is robust against intentional or un-intentional corruption...
In this paper we present the design and evaluation of a system for deploying highly available and migratable services in shared infrastructures, such as the PlanetLab, where the available resource capacities at a node can fluctuate significantly. A migratable service can monitor its operating conditions and autonomously relocate itself to another node when the available resource capacities at the...
Sybil attack is one of the most challenging problems that plague current decentralized peer-to-peer systems. In Sybil attack, a single malicious user creates multiple peer identities known as sybils. These sybils are employed to target honest peers and hence subvert the system. In this paper, we propose a novel solution that enables all honest peers to protect themselves from sybils with high probability...
Botnet is recognized as one of the fastest growing threat to the Internet and most users do not aware that they were victimized. ThaiCERT is one of many computer emergency response teams that have limited resources in term of budget to monitor and handle this kind of threat. An interim solution for teams with limited resource is to subscribe to the Shadowserver Foundation's mailing list instead of...
Self-adaptive and self-organizing systems must be self-monitoring. Recent research has shown that self-monitoring can be enabled by using correlations between monitoring variables (metrics). However, computer systems often make a very large number of metrics available for collection. Collecting them all not only reduces system performance, but also creates other overheads related to communication,...
The increasing complexity and dynamics in IT infrastructure and the emerging Cloud services present challenges to timely incident/problem diagnosis and resolution. In this paper we present a problem determination platform with multi-dimensional knowledge integration (e.g. configuration data, system vital data, log data, related tickets) and enablement for efficient incident and problem management...
While IT management services represent a mature subject in the IT business arena, the emerging cloud generation of management services require critical enhancements to the current processes and technologies in order to deliver IT management remotely with rapid on-boarding and minimal labor involvement from experts, to be affordable and scale up to the promise of the cloud. Traditional Remote Infrastructure...
This work augments MINIX 3's failure-resilience mechanisms with novel disk-driver recovery strategies and guaranteed file-system data integrity. We propose a flexible filter-driver framework that operates transparently to both the file system and the disk driver and enforces different protection strategies. The filter uses checksumming and mirroring in order to achieve end-to-end integrity and provide...
This paper attempts to generate test cases for concurrent programs based on event graph. Through the analysis of state transition of event graph, sub-event-graphs can be generated. Each sub-event-graph corresponds to a test case. We may get benefits from this method in the following. (1) While executing the test case, we can monitor the state transition. (2) Every sub-event-graph is an execution path,...
We discuss a systematic approach to network forensic collection and analysis of data in converged networks. Since attacks cannot be completely avoided, it is necessary to have appropriate forensics systems. Upon integration into a network forensic infrastructure, we expect this forensic model will enable a faster response and more structured investigations of VoIP-based network attacks.
In e-science environment researchers can submit complex tasks as scientific workflows. However, because the network may be blocked or even interrupted sometimes, it can hinder the researchers to submit tasks, as well as the overload on the server. Additionally, many tasks submitted by researchers may use the same resources, which may result in the overload of the specific resources. Meanwhile, some...
Softswitching is a significant technology of the Next-Generation Network, but it can't be widely used if there isn't a provisioning system supporting it. The workflow-based Softswitching provisioning system in this paper helps engineers working together even they are not in the same location, and provides an easier way to configure the devices quickly and correctly. It not only improves efficiency...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.