Internet Activity Analysis Through Proxy Log

Size: px
Start display at page:

Download "Internet Activity Analysis Through Proxy Log"

Transcription

1 Internet Activity Analysis Through Proxy Log Kartik Bommepally, Glisa T. K., Jeena J. Prakash, Sanasam Ranbir Singh and Hema A Murthy Department of Computer Science Indian Institute of Technology Madras, Chennai, India kartikaditya@gmail.com, {glisa, jeena, ranbir}@lantana.tenet.res.in, {hema}@cse.iitm.ac.in Abstract The availability of the Internet at the click of a mouse brings with it a host of new problems. Although the World Wide Web was first started by physicists at CERN to enable collation and exchange of data, today, it is used for a wide range of applications. The requirements on bandwidth for each of the applications is also varied. An Internet Service Provider must ensure satisfaction across the entire spectrum of users. To ensure this, analysis of Internet usage becomes essential. Further, an administrator can keep a record of user s Internet activity and prevent unethical activities, since the Internet is also an excellent resource for providing anonymity. This analysis can also help in resource provisioning and monitoring. In this work, a web-based tool is first proposed to analyse the Internet activity. Next, data is collected from a proxy server at a campus-wide network. Traffic patterns of different types of users are studied. Finally, the paper concludes with strategies for monitoring and control of traffic. I. INTRODUCTION With increase in awareness and availability of Internet, information of any kind has become available at the click of a mouse. An administrator has to ensure that all the users get a fair share of the bandwidth. Today, addiction to the Internet is a serious issue amongst users, especially in campus-wide networks where Internet is freely available. An administrator in a campus may wish to ensure controls on Internet usage. In general, most campuses end up restricting usage over specific periods of the day. This has the disadvantage that a genuine user who needs access to information is also denied. Internet traffic data can be collected from various sources such as routers, gateways or proxy servers. In this paper, we analyse a large proxy log to study user access patterns. Such a study can assist a network management system in traffic shaping and monitoring thus remove the necessity of regimentation. This is the main motivation of this paper. There are few studies on the analysis of proxy log [1], [2]. However, in this study, our analyser focuses only on investigating average access time and it provides flexibility to analyse the access patterns in several forms. In this paper, we first discuss a tool that we have implemented to analyse the behaviour of Internet users behind a proxy. Second, we analyse user s Internet usage pattern using the proposed tool. The contributions of this paper can be stated as follows: Design and implementation of a proxy analyser. Analysis of the amount of time a user spends on Internet. Analysis of the traffic pattern generated by different users. Study of few access control mechanisms. Fig. 1. Log analyser s implementation framework The organisation of the paper is as follows. Section II describes a proxy-controlled Internet access system. Section III discusses the design and implementation of a proxy analyser. Section IV presents the analysis. This paper concludes in Section V. II. PROXY-BASED INTERNET ACCESS A proxy server acts as a go-between for requests from clients seeking resources from other servers. It evaluates every request according to its filtering rules and provides the resource by connecting to the relevant server and requesting the service on behalf of the client. There are several functionalities of a proxy server ([3]). However, we focus on the following features: To keep machines behind it anonymous mainly for security. To speed up access to a resource (via caching). Contentf iltering through predefined rules. Logging Internet traffic. III. DESIGN AND IMPLEMENTATION In this section we briefly discuss the design and implementation of a proxy analyser. It has three major components namely log parser, database loader and data analyser. The basic framework is shown in Figure 1. A. Log Parser The purpose of this module is to extract useful information from the logs. The logs usually include the IP address and/or host name, the time of request, the user s id, the URL requested, the status of the request. This module parses the logs and extract the above information.

2 B. Database Loader This module indexes the information obtained from log parser into the database. It has mainly four components. First component keeps track of the information such as user s id and IP address. Second component keeps track of the domain information. In this study, we record only domain name, instead of entire URL. Third component keeps track of the access time. The information is stored by the four quarters of a day 1. Mainly, this component keeps track of the time that a user spends on Internet. However, proxy server logs only the time when a request has been made, not the time spent on Internet. In this study we use the following formula to compute the access time. { ttotal + Θ t total = cost if t cur t last > Θ limit t total + (t cur t last ) Otherwise where Θ limit is the maximum allowed time difference for two consecutive accesses, Θ cost is a system defined fixed value, t cun is the current access time and t last is the time that the user access last. If the time difference is above the threshold Θ limit 2, only Θ cost 3 is counted against the given user. After every estimation of the access time, t last is updated with t cur and estimation is repeated for all four quarters. The initial value of t total is set to zero. The last component stores the relationship between the above three components. All these components are implemented satisfying all the integrity constraints and agreed upon by BCNF [4]. C. Data Analyser Data analyser is the module which interacts with the user (i.e., network administrator). It provides the facility to view the statistics in the form of a graph. The analysis is done in two forms offline and online. In offline analysis, the log data is collected and loaded into the system offline. However, in online analysis, log information is collected in run time. Whenever a new request arrives on proxy server, it is automatically inserted into the database. As such online analysis may slow down the activities of the proxy servers, it is advisable to deploy online analysis in the networks with low traffic. IV. ACTIVITY ANALYSIS In this section we analyse the Internet usage pattern using the above tool. The analysis is made completely user centric for the administrator to keep track of user s activities. Using the tool one can obtain an estimate of the activity over various websites accessed by the user. However we focus more on social-community websites, which are the main intention of the paper. The analysis presented in this section is broadly divided into three parts. First, we analyse the access pattern in terms of the amount of time that a user spends on Internet using the above tool. Second, we investigate traffic pattern in 1 : to 5:59, 6: to 11:59, 12: to 17:59 and 18: to 23:59 2 If the difference in time of access is very large, it is likely that user has not been sitting at Computer reading the articles. 3 In this study, Θ limit is set to 6min and Θ cost is set to 8min TABLE I CHARACTERISTICS OF PROXY LOG Log Duration 5months Oct. 28 to Feb. 29 No. of Users 4128 No. of request about 73millions Stats for CS4b[-9][-9] Date of Access Q Q1 Q2 Q3 Fig. 2. Average access time viewing the URL matching orkut for the set of students matching the regexp CS4B[-9][-9] for the month of November 28. terms of the number of URLs requested by the users. Third, we further proposed few access control mechanisms to restrict users access without compromising the quality of service and investigate their effects on traffic sharing. A. Dataset We first describe the characteristics of the proxy log used. For this study, we have used a large proxy log collected from IITM 4 proxy server (running Squid [5]) over 5 months. IITM network has two proxy servers Acad-Proxy and Hostel- Proxy. The Characteristics of the log files are shown in Table I. B. Average Access Analysis Various forms of analysis can be carried out using the tool discussed in Section III. However from an academic perspective, the reported analysis focuses on the following issues (i) individual statistics: analysis over individual website accessed by the user, (ii) relative statistics: analysis over collective users for collective sites, and (iii) general statistics: analysis of access pattern by the category. 1) Individual Statistics: The proposed log analyser has provided a facility to explore the statistics of the user s access time for a particular Web site. In Figure 2, we plot the average access time of a batch of users viewing the URLs matching a keyword orkut. Each batch is identified by a regular expresion such as [A-Z][A-Z][-9][- 9][A-Z][-9][-9][-9]. It compares the average access time at different quarters 5 of a day over a period of time. This experiment has been conducted over different batches of users such as CS[-9]B[-9][-9], CS[-9]M[-9][- 9], CS[-9]S[-9][-9] and CS[-9]D[-9][-9]. In Table II, we sumerise the average access time for each batches Q: first quarter, Q1: second quarter, Q2: third quarter, Q3: forth quarter

3 TABLE II DEGREE WISE ACTIVITY FOR orkut DURING OCTOBER 28 BTECH: CS[-9]B[-9][-9][-9] MTECH: CS[-9]M[-9][-9][-9] MaxAccess(date) AvgAccess MaxAccess(date) AvgAccess Q :52:(28-1-2) :13:48 :3:39(28-1-4) ::14 Q1 :38:55( ) :16:18 :58:19(28-1-9) :4:18 Q2 :58:57( ) :29:28 1:24:26( ) :6:44 Q3 1:6:22(28-1-1) :45:38 :34:11( ) :4:28 MS: CS[-9]S[-9][-9][-9] Ph.D.: CS[-9]D[-9][-9][-9] MaxAccess(date) AvgAccess MaxAccess(date) AvgAccess Q :47:39(28-1-2) :15:2 :44:41( ) :4:11 Q1 :46:35( ) :23:54 1:25:15( ) :15:16 Q2 1:5:3(28-1-8) :37:44 :53:7( ) :26:4 Q3 1:1:9( ) :3:45 :53:52(28-1-2) :19: Stats for CS4bXX Date of Access chat social-community browse academics Fig. 4. Statistics of a user over four domains for the month of December. The data is collected from Hostel-Proxy Q Q1 Q2 Q3 CS8SXXX CS7SXXX CS7SXXX CS7SXXX CS7SXXX CS7SXXX CS7SXXX CS6SXXX CS6SXXX Users name matching CS[-9]S[-9][-9][-9] CS8SXXX CS8SXXX CS8SXXX CS8SXXX Fig. 3. Shows statistics for the set of students matching the regular expression CS[-9]S[-9][-9][-9]. To hide the identity of the users we have omitted the last three characters. The data is collected from Hostel-Proxy for the URLs matching orkut. It also shows that for the btech and dual degree students 6, the average access value is close to the maximum access value. The average access values across the four degrees of students can be ordered as btech+dual > ms > phd > mtech. 2) Relative Statistics: In the relative analysis, we can compare the average access time across different users. In Figure 3, we explore the access time for the users matching the regular expression CS[-9]S[-9][-9][-9] for the URLS matching orkut, facebook and iitm. This information can be used to perform inter/intra batch user s access pattern analysis. We further perform various experiments across different batches of students. One interesting observation is that the senior students are likely to have high Internet activity compared to their junior students. 3) General Statistics: In general statistical analysis, we explore the average access time of a user across different sites. To aggregate the results, we group the statistics by the category of the URLs that the user explored. This tool explores only four categories namely chat, social-community, academics and browse. To simplify the classification task, this tool considers only certain number of URLs for each category. The sites in each category are manually selected from the list of popular sites. Figure 4 shows the distribution of the access pattern of a user over the four classes for quarter Q3. The similar 6 User IDs matching the regular expression CS[-9]B[-9][-9]. TABLE III NUMBER OF CONNECTIONS TO DIFFERENT WEB SITES DURING FOUR QUARTERS. IITM GOOGLE FACEBOOK ORKUT Qi Access #con #con #con #con Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q Q experements are further conducted for all the quarters. It is observed that in every quarter the activity goes by the order browse > social-community > chat > academics. The periods to and to have activity in all the quarters, which suggest that the user is on vacation and from onwards the activity again rises to high values in all the quarters. The access values are as high as 5:59:44 for browse, 5:47:58 for social-community, 5:48:49 for chat and finally 3:3:51 for acads in the Q3 quarter of the day (all the extreme values are recorded between and ). Tables III shows the number of connections to the server and the time spent on four different websites. Of all the websites google shows an alarming result of about connections having access time more than 1Hr for Q3, followed by orkut with 249 connections made in Q3 having access time for more than 1Hr. C. Traffic Analysis through URL Count From the above analysis, it is clear that the distribution of average access time across the users is not uniform. There are students who spend most of their working hours browsing

4 4 35 overall TABLE IV SIZE OF EACH USER S CLASS FOR THE MONTH OF FEB. 29 No. of URL accessed Fig Users Average number of URLs generated per day from a user the Internet. It is important for an administrator to monitor traffic at different instances in time and identify the users who are causing maximum traffic. In this section we further investigate the number of URLs requested by the users over a period of time. URL count does not provide the actual network bandwidth consumed by the users. To estimate the actual bandwidth, we also needs the information such as data transfer rate, size of the documents downloaded etc [6], [7]. Such information is not available in our dataset. However, the number of URLs reflects activities of a user on Internet. Therefore, we can use the URL count as a measure to approximate the traffic. The simple hypothesis is that larger the number of URLs requested, higher is the Internet traffic caused 7. Such analysis helps the administrator to perform various Internet traffic shaping based on (i) the type of URLs that the user visited, (ii) the usage of restricted URLs, (iii) restricting certain users from accessing certain URLs at the time when there is slow connection or busy traffic. The analysis reported in this section is done independent of the tool discussed in Section III. 1) Users Classification: Figure 5 shows the distribution of the average number of URLs requested by the users per day. It clearly shows that majority of the users have a small average number of URLs accessed per day and few users have extremely large number of requests. Based on the average number of requests generated by the users, we further classify the users into three lower, middle and higher band users. The bound of each band is defined using the following expressions and l = µ c σ (1) u = µ + c σ (2) where µ is the average number of URLs generated by a user in a day, σ is the standard deviation and c is a constant in [,1]. Users with average count lesser than l are placed in lower band, between l to u are placed in middle band and greater than u in higher band. Table IV shows the size of each band. It clearly shows that number of users in higher band is much smaller compared to other classes. % of traffic Fig. 6. lower band middle band higher band lower Traffic Distribution middle User s type upper Percentage of traffic generated by each band In Figure 6, we investigate the percentage of the traffic (i.e., URL counts) generated by the users in each band. It clearly shows that though the number of users in higher band is small, it generates a considerable amount of traffic i.e., almost 45%. In Figure 7, we show the percentage of the traffic generated by the users at different time intervals of a day. It clearly shows that the distribution is not uniform. The traffic during fourth quarter is higher than the other quarters. It is also important to investigate the traffic caused by certain Web sites. In Figure 8, we plot the percentage of URLs containing popular keywords. The keywords are selected using term frequency 8. It is clearly observed that a significant portion of the traffic is caused by the URLs containing the keywords such as orkut, facebook, talk, youtube which are discouraged to use in many of the organisations. Entropy is a popular measure used to analyse the distribution of the symbols of a random variable. If the entropy is high, then the distribution is uniform and if entropy is small then the distribution is skewed. We also apply entropy to study the distribution of URLs visited by the users. A user with a small entropy indicates that the user confines his/her activities mostly to few domains. Such study can also be used to analyse user specific traffic shaping to decide whether a particular user is needed to grant more access to certain sites or to restrict access to certain sites. We use a normalised entropy to study this distribution and define as follows. H = u U P(u) log(p(u)) log( U ) where U is the list of URLs access by a user. In Figure 9, we show the distribution of the entropy using the distribution of the most popular 5 URLs. It clearly shows that there are users who mostly confine their activities to only very few URLs. (3) 7 However, this hypothesis does not reflect the actual Internet bandwidth 8 Number of domains containing a term

5 1 Distribution of the URLs accessed in a day % of URLs Number of Users [-.1] [.1-.2] Hours in a day [.2-.3] [.3-.4] [.4-.5] [.5-.6] [.6-.7] [.7-.8] [.8-.9] [.9-1.] Normalized entropy range Fig. 7. Traffic generated in an hour of the day Fig. 9. Entropy Distribution of the users using the log files for the month Feb % of URLs Number of URLs 1.4e+7 1.2e+7 1e+7 8e+6 6e+6 4e+6 Distribution of URLs accessed in a day without access control restrict on limit restrict on domain dynamic control stoptazmo sendspace ibnlive 2e+6 Fig. 8. google-analytics yieldmanager googleads iitm clients neroscout facebook indiatimes doubleclick voice cricinfo talkgadget yahoo orkut megaupload mail google Traffic consumed by the URLs containing a keyword Hours in a day Fig. 1. Comparing the traffic generated with or without access control mechanisms at different intervals in time D. Traffic Control In the above discussion, we explore users Internet access pattern. In this section, few access control mechanisms are discussed to investigate feasibility of controlling users Internet activity through proxy servers. To analyse the effects of these mechanisms, we have run simulation programs over the original dataset. Figure 1 shows the distribution of the URLs at different time intervals of a day after applying access control mechanisms. There are several ways to control users Internet access. However we have focused on the following. 1) First, we apply restriction on the number of URLs requested by the users in a day (limits to average number of URLs per day). Figure 1 clearly shows that the traffic reduces siginificantly (almost 56%) after applying this control mechanism. However this mechanism is not flexible. It may results heavy traffic at one time and no traffic at another time of a day. 2) Second, we apply restriction on the domain names. We have ignored all the URLs containing the keywords megaupload, orkut, talkgadget, voice, facebook. The traffic reduces significantly (almost 34%) after ignoring the URLs. From the figure, it clearly indicates that users are likely to access these social networking sites during evening and night. The reduction at different quarters can be ordered as Q3 > Q2 > Q > Q1. 3) The above restrictions, sometimes, may cause denial of important information access. A better control mechanism will be to restrict dynamically based on traffic load. Lastly, we apply the above domain restriction when the number of connection at a time is more than a limit (average number of connections). This is shown in the figure by the transition from normal traffic to controlled traffic. The control mechanisms are not limited to the above mechanisms. However, we left further analysis on traffic shaping using proxy logs as our future work. V. CONCLUSION In this paper, we discuss a proxy log analyser. Using this tool, we analyse the amount of time that a user spends on Internet. We further investigate the traffic generated by users by exploring URL count. Lastly, we apply few access control mechanisms and investigate their effects on Internet traffic. REFERENCES [1] Squid log analyzers. [Online]. Available: [2] W. Lou and H. Lu, Efficient prediction of web accesses on a proxy server, Conference on Information and Knowledge Management, 22. [3] Proxy server. [Online]. Available: server [4] C. J. Date, An Introduction to Database Systems. Addison-Wesley, [5] Squid proxy server. [Online]. Available: [6] B. Zhou, D. He, and Z. Sun, Traffic predictability based on ARIMA/GARCH model, 26, pp [Online]. Available: all.jsp?arnumber= [7] D. M. Divakaran, H. A. Murthy, and T. A. Gonsalves, Detection of SYN flooding attacks using linear prediction analysis, 14th IEEE International Conference on Networks, pp. 1 6, September 26.

Denial of Service and Anomaly Detection

Denial of Service and Anomaly Detection Denial of Service and Anomaly Detection Vasilios A. Siris Institute of Computer Science (ICS) FORTH, Crete, Greece vsiris@ics.forth.gr SCAMPI BoF, Zagreb, May 21 2002 Overview! What the problem is and

More information

Configuring Your Gateman Proxy Server

Configuring Your Gateman Proxy Server Configuring Your Gateman Proxy Server A proxy server acts as an intermediary between a workstation users and the Internet to ensure security, administrative control, distribution of bandwidth and caching

More information

User Guide. You will be presented with a login screen which will ask you for your username and password.

User Guide. You will be presented with a login screen which will ask you for your username and password. User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that

More information

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in

More information

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Understanding Web personalization with Web Usage Mining and its Application: Recommender System Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,

More information

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh

More information

Google Analytics for Robust Website Analytics. Deepika Verma, Depanwita Seal, Atul Pandey

Google Analytics for Robust Website Analytics. Deepika Verma, Depanwita Seal, Atul Pandey 1 Google Analytics for Robust Website Analytics Deepika Verma, Depanwita Seal, Atul Pandey 2 Table of Contents I. INTRODUCTION...3 II. Method for obtaining data for web analysis...3 III. Types of metrics

More information

Data Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA)

Data Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) Data Driven Success Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) In business, data is everything. Regardless of the products or services you sell or the systems you support,

More information

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Hosting more than one FortiOS instance on. VLANs. 1. Network topology Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of

More information

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu Dilip Kumar Krishnappa, Samamon Khemmarat, Lixin Gao, Michael Zink University of Massachusetts Amherst,

More information

NETWORKS AND THE INTERNET

NETWORKS AND THE INTERNET NETWORKS AND THE INTERNET Outline to accompany the slide presentation 1. Networks and the Internet A Primer for Prosecutors and Investigators 2. Getting There From networks to the Internet Locating a place

More information

Burst Technology. bt-loganalyzer. User Guide

Burst Technology. bt-loganalyzer. User Guide Burst Technology presents bt-loganalyzer SQL Edition User Guide Burstek TM 9240 Bonita Beach Road Bonita Springs, FL 34135 Telephone: (239) 495-5900 or toll free (800) 709-2551 Visit the Burstek Website

More information

Capturing Barracuda Web Filter Activity in Reports

Capturing Barracuda Web Filter Activity in Reports Capturing Barracuda Web Filter Activity in Reports IT administrators require detailed information about Internet usage on the network. This helps budget computing resources and ensure adherence to corporate

More information

Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network

Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network 1 T.Ganesh, 2 K.Santhi 1 M.Tech Student, Department of Computer Science and Engineering, SV Collge of

More information

Intrusion Detection System using Log Files and Reinforcement Learning

Intrusion Detection System using Log Files and Reinforcement Learning Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT

More information

NETFORT LANGUARDIAN MONITORING WAN CONNECTIONS. How to monitor WAN connections with NetFort LANGuardian Aisling Brennan

NETFORT LANGUARDIAN MONITORING WAN CONNECTIONS. How to monitor WAN connections with NetFort LANGuardian Aisling Brennan NETFORT LANGUARDIAN MONITORING WAN CONNECTIONS How to monitor WAN connections with NetFort LANGuardian Aisling Brennan LANGuardian gives you the information you need to troubleshoot problems and monitor

More information

Approximate mechanism for measuring Stability of Internet Link in aggregated Internet Pipe

Approximate mechanism for measuring Stability of Internet Link in aggregated Internet Pipe 1 Approximate mechanism for measuring Stability of Internet Link in aggregated Internet Pipe Abstract Vipin M, Mohamed Imran K R {vipintm, mohamed.imran}@au-kbc.org AU-KBC Research Centre, MIT Campus of

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

How To Use Windows Live Family Safety On Windows 7 (32 Bit) And Windows Live Safety (64 Bit) On A Pc Or Mac Or Ipad (32)

How To Use Windows Live Family Safety On Windows 7 (32 Bit) And Windows Live Safety (64 Bit) On A Pc Or Mac Or Ipad (32) NAME Windows Live Family Safety Company Microsoft Version 2012 Type of product Devices supported Operating systems Price* Client Computer Windows 7 (32 or 64 bit edition) Windows Vista Service Pack 2 Windows

More information

Table of Contents INTRODUCTION... 3. Prerequisites... 3 Audience... 3 Report Metrics... 3

Table of Contents INTRODUCTION... 3. Prerequisites... 3 Audience... 3 Report Metrics... 3 Table of Contents INTRODUCTION... 3 Prerequisites... 3 Audience... 3 Report Metrics... 3 IS MY TEST CONFIGURATION (DURATION / ITERATIONS SETTING ) APPROPRIATE?... 4 Request / Response Status Summary...

More information

Networks and the Internet A Primer for Prosecutors and Investigators

Networks and the Internet A Primer for Prosecutors and Investigators Computer Crime & Intellectual Property Section Networks and the Internet A Primer for Prosecutors and Investigators Michael J. Stawasz Senior Counsel Computer Crime and Intellectual Property Section ()

More information

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India maharudra90@gmail.com,

More information

Defending Against Traffic Analysis Attacks with Link Padding for Bursty Traffics

Defending Against Traffic Analysis Attacks with Link Padding for Bursty Traffics Proceedings of the 4 IEEE United States Military Academy, West Point, NY - June Defending Against Traffic Analysis Attacks with Link Padding for Bursty Traffics Wei Yan, Student Member, IEEE, and Edwin

More information

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas

More information

Sophos XG Firewall v 15.01.0 Release Notes. Sophos XG Firewall Reports Guide v15.01.0

Sophos XG Firewall v 15.01.0 Release Notes. Sophos XG Firewall Reports Guide v15.01.0 Sophos XG Firewall v 15.01.0 Release Notes Sophos XG Firewall Reports Guide v15.01.0 For Sophos and Cyberoam Customers Document Date: November 2015 Contents 2 Contents Reports... 4 Basics...4 Reports Navigation...

More information

Getting Started on the PC and MAC

Getting Started on the PC and MAC Getting Started on the PC and MAC Click on the topic you want to view. Download the Desktop App Download the ios or Android App Desktop App Home Screen Home Screen Drop Down Menu Home Screen: Upcoming

More information

Barracuda Web Filter Demo Guide Version 3.3 GETTING STARTED

Barracuda Web Filter Demo Guide Version 3.3 GETTING STARTED Version 3.3 GETTING STARTED What is the Web Filter? Integrated content filtering and application blocking Best-of-breed spyware protection Integrated gateway antivirus Desktop spyware protection Firmware

More information

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security

More information

Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data

Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data Identifying the Number of to improve Website Usability from Educational Institution Web Log Data Arvind K. Sharma Dept. of CSE Jaipur National University, Jaipur, Rajasthan,India P.C. Gupta Dept. of CSI

More information

Protecting Your Network Against Risky SSL Traffic ABSTRACT

Protecting Your Network Against Risky SSL Traffic ABSTRACT Protecting Your Network Against Risky SSL Traffic ABSTRACT Every day more and more Web traffic traverses the Internet in a form that is illegible to eavesdroppers. This traffic is encrypted with Secure

More information

Monitoring Pramati Web Server

Monitoring Pramati Web Server Monitoring Pramati Web Server 15 Overview This section describes how to monitor Pramati Web Server from the Console. You can monitor information regarding the running Default Server and Virtual Hosts,

More information

Threshold Based Kernel Level HTTP Filter (TBHF) for DDoS Mitigation

Threshold Based Kernel Level HTTP Filter (TBHF) for DDoS Mitigation I. J. Computer Network and Information Security, 2012, 12, 31-39 Published Online November 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2012.12.03 Threshold Based Kernel Level HTTP Filter

More information

THE OPEN UNIVERSITY OF TANZANIA

THE OPEN UNIVERSITY OF TANZANIA THE OPEN UNIVERSITY OF TANZANIA Institute of Educational and Management Technologies COURSE OUTLINES FOR DIPLOMA IN COMPUTER SCIENCE 2 nd YEAR (NTA LEVEL 6) SEMESTER I 06101: Advanced Website Design Gather

More information

Preprocessing Web Logs for Web Intrusion Detection

Preprocessing Web Logs for Web Intrusion Detection Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer

More information

v6.1 Websense Enterprise Reporting Administrator s Guide

v6.1 Websense Enterprise Reporting Administrator s Guide v6.1 Websense Enterprise Reporting Administrator s Guide Websense Enterprise Reporting Administrator s Guide 1996 2005, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121,

More information

Stopping secure Web traffic from bypassing your content filter. BLACK BOX

Stopping secure Web traffic from bypassing your content filter. BLACK BOX Stopping secure Web traffic from bypassing your content filter. BLACK BOX 724-746-5500 blackbox.com Table of Contents Introduction... 3 Implications... 4 Approaches... 4 SSL CGI Proxy... 5 SSL Full Proxy...

More information

Bisecting K-Means for Clustering Web Log data

Bisecting K-Means for Clustering Web Log data Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining

More information

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on

More information

Using TestLogServer for Web Security Troubleshooting

Using TestLogServer for Web Security Troubleshooting Using TestLogServer for Web Security Troubleshooting Topic 50330 TestLogServer Web Security Solutions Version 7.7, Updated 19-Sept- 2013 A command-line utility called TestLogServer is included as part

More information

Patch Management Table of Contents:

Patch Management Table of Contents: Table of Contents: Manage Machines Manage Updates Patch Policy Configure Patch Parameters 153 Chapter 5 - Sadjadi et al. Introduction As new operating system and software updates are released in an ever

More information

Chapter 8 Router and Network Management

Chapter 8 Router and Network Management Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by

More information

Classifying DNS Heavy User Traffic by using Hierarchical Aggregate Entropy. 2012/3/5 Keisuke Ishibashi, Kazumichi Sato NTT Service Integration Labs

Classifying DNS Heavy User Traffic by using Hierarchical Aggregate Entropy. 2012/3/5 Keisuke Ishibashi, Kazumichi Sato NTT Service Integration Labs Classifying DNS Heavy User Traffic by using Hierarchical Aggregate Entropy 2012/3/5 Keisuke Ishibashi, Kazumichi Sato NTT Service Integration Labs Motivation Network resources are consumed by a small number

More information

CA Nimsoft Monitor. Probe Guide for URL Endpoint Response Monitoring. url_response v4.1 series

CA Nimsoft Monitor. Probe Guide for URL Endpoint Response Monitoring. url_response v4.1 series CA Nimsoft Monitor Probe Guide for URL Endpoint Response Monitoring url_response v4.1 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject

More information

MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS

MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS MODEL OF SOFTWARE AGENT FOR NETWORK SECURITY ANALYSIS Hristo Emilov Froloshki Department of telecommunications, Technical University of Sofia, 8 Kliment Ohridski st., 000, phone: +359 2 965 234, e-mail:

More information

Detection of Distributed Denial of Service Attack with Hadoop on Live Network

Detection of Distributed Denial of Service Attack with Hadoop on Live Network Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,

More information

Remote Console Installation & Setup Guide. November 2009

Remote Console Installation & Setup Guide. November 2009 Remote Console Installation & Setup Guide November 2009 Legal Information All rights reserved. No part of this document shall be reproduced or transmitted by any means or otherwise, without written permission

More information

Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.

Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. TLP:WHITE - Port Evolution Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. Gerard Wagener 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy

More information

A Web-Based Sensor Data Management System for Distributed Environmental Observation

A Web-Based Sensor Data Management System for Distributed Environmental Observation A Web-Based Sensor Data Management System for Distributed Environmental Observation Takahiro Torii, Yusuke Yokota, and Eiji Okubo Index Terms Sensor Web, sensor network, distributed data management, query

More information

Optimal Service Pricing for a Cloud Cache

Optimal Service Pricing for a Cloud Cache Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,

More information

How To Block Unauthorized Internet Access through Proxies

How To Block Unauthorized Internet Access through Proxies How To - Block Unauthorized Internet Access through Proxies How To Block Unauthorized Internet Access through Proxies Applicable Version: 10.00 onwards Overview A Proxy is a tool that attempts to make

More information

Load Balancing using MS-Redirect Mechanism

Load Balancing using MS-Redirect Mechanism Load Balancing using MS-Redirect Mechanism G. Naveen Kumar 1, T. Ram Kumar 2 and B.Phijik 3 Vignan s Institute of Technology and Aeronautical Engineering Deshmukhi(v), Pochampalli(M), Nalgonda, Hyderabad

More information

Application of Netflow logs in Analysis and Detection of DDoS Attacks

Application of Netflow logs in Analysis and Detection of DDoS Attacks International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in

More information

Above the fold: It refers to the section of a web page that is visible to a visitor without the need to scroll down.

Above the fold: It refers to the section of a web page that is visible to a visitor without the need to scroll down. Above the fold: It refers to the section of a web page that is visible to a visitor without the need to scroll down. Access: It is the ability to see what you are trying to view (e.g. you can see a friend

More information

SysAidTM Deployment Tool Guide

SysAidTM Deployment Tool Guide SysAidTM Deployment Tool Guide Document Updated: 10 November 2009 Introduction You want SysAid to see your assets, providing information on their hardware, software, history, and more. The most simple

More information

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

Shoal: IaaS Cloud Cache Publisher

Shoal: IaaS Cloud Cache Publisher University of Victoria Faculty of Engineering Winter 2013 Work Term Report Shoal: IaaS Cloud Cache Publisher Department of Physics University of Victoria Victoria, BC Mike Chester V00711672 Work Term 3

More information

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise

More information

modeling Network Traffic

modeling Network Traffic Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th

More information

Effective Prediction of Kid s Behaviour Based on Internet Use

Effective Prediction of Kid s Behaviour Based on Internet Use International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 183-188 International Research Publications House http://www. irphouse.com /ijict.htm Effective

More information

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent? What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters

More information

Challenges in Android Application Development: A Case Study

Challenges in Android Application Development: A Case Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.294

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

The Use of DNS Resource Records

The Use of DNS Resource Records International Journal of Advances in Electrical and Electronics Engineering 230 Available online at www.ijaeee.com & www.sestindia.org/volume-ijaeee/ ISSN: 2319-1112 Simar Preet Singh Systems Engineer,

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

Evaluation Guide. Powerful & Immediate Business Web Security via the Cloud

Evaluation Guide. Powerful & Immediate Business Web Security via the Cloud Evaluation Guide Powerful & Immediate Business Web Security via the Cloud Contents 1 Introduction & Product highlights 2 Set up & Configuration 3 Managing your WebTitan Cloud Service 4 Reporting 5 Support

More information

Internet Safety for Kids and Adults

Internet Safety for Kids and Adults Net@office Net@office differs from Proxy in two significant areas: features & configurability. Net@office has advanced features like web page caching, site filtering, privacy options, traffic logging and

More information

Safe internet for business use: Getting Started Guide

Safe internet for business use: Getting Started Guide Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial

More information

Web Load Stress Testing

Web Load Stress Testing Web Load Stress Testing Overview A Web load stress test is a diagnostic tool that helps predict how a website will respond to various traffic levels. This test can answer critical questions such as: How

More information

Cyber Essentials Questionnaire

Cyber Essentials Questionnaire Cyber Essentials Questionnaire Introduction The Cyber Essentials scheme is recommended for organisations looking for a base level Cyber security test where IT is a business enabler rather than a core deliverable.

More information

DNS, CDNs Weds March 17 2010 Lecture 13. What is the relationship between a domain name (e.g., youtube.com) and an IP address?

DNS, CDNs Weds March 17 2010 Lecture 13. What is the relationship between a domain name (e.g., youtube.com) and an IP address? DNS, CDNs Weds March 17 2010 Lecture 13 DNS What is the relationship between a domain name (e.g., youtube.com) and an IP address? DNS is the system that determines this mapping. Basic idea: You contact

More information

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 1.0 Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Unified Monitoring Portal Online Help List Viewer

Unified Monitoring Portal Online Help List Viewer Unified Monitoring Portal Online Help List Viewer This PDF file contains content from the Unified Monitoring Portal (UMP) Online Help system. It is intended only to provide a printable version of the topics.

More information

Web Tap: Detecting Covert Web Traffic. Presented By: Adam Anthony

Web Tap: Detecting Covert Web Traffic. Presented By: Adam Anthony Web Tap: Detecting Covert Web Traffic Presented By: Adam Anthony Outline Problem Description Web Tap's Goals Web Tap's Significance Threat Model Implementation Evaluation Future Work Conclusion Typical

More information

SonicWALL Global Management System Reporting User Guide. Version 2.5

SonicWALL Global Management System Reporting User Guide. Version 2.5 SonicWALL Global Management System Reporting User Guide Version 2.5 Copyright Information 2003 SonicWALL, Inc. All rights reserved. Under the copyright laws, this manual or the software described within,

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection

More information

Docufide Client Installation Guide for Windows

Docufide Client Installation Guide for Windows Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is

More information

CHAPTER 4 PERFORMANCE ANALYSIS OF CDN IN ACADEMICS

CHAPTER 4 PERFORMANCE ANALYSIS OF CDN IN ACADEMICS CHAPTER 4 PERFORMANCE ANALYSIS OF CDN IN ACADEMICS The web content providers sharing the content over the Internet during the past did not bother about the users, especially in terms of response time,

More information

LANCOM Techpaper Content Filter

LANCOM Techpaper Content Filter The architecture Content filters can be implemented in a variety of different architectures: 11 Client-based solutions, where filter software is installed directly on a desktop computer, are suitable for

More information

W3Perl A free logfile analyzer

W3Perl A free logfile analyzer W3Perl A free logfile analyzer Features Works on Unix / Windows / Mac View last entries based on Perl scripts Web / FTP / Squid / Email servers Session tracking Others log format can be added easily Detailed

More information

Proxy Server, Network Address Translator, Firewall. Proxy Server

Proxy Server, Network Address Translator, Firewall. Proxy Server Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as

More information

Check Point submitted the SWG-12600 Secure Web Gateway for

Check Point submitted the SWG-12600 Secure Web Gateway for Key findings and conclusions: Lab Testing Summary Report September 213 Report 1382 Product Category: Web Security Gateway Vendors/Products Tested: Secure Web Gateway BlueCoat Proxy SG3-5 Appliance Websense

More information

Are you getting the speed that you pay for? Understanding Internet Speeds

Are you getting the speed that you pay for? Understanding Internet Speeds Screamin Fast Broadband and Great Sounding ephone Service January, 2015 Rev: 01.00 Are you getting the speed that you pay for? Understanding Internet Speeds Table of Contents Change Log... 2 Overview...

More information

Chapter 3 Restricting Access From Your Network

Chapter 3 Restricting Access From Your Network Chapter 3 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the RangeMax Dual Band Wireless-N Router WNDR3300 to protect your network.

More information

Basheer Al-Duwairi Jordan University of Science & Technology

Basheer Al-Duwairi Jordan University of Science & Technology Basheer Al-Duwairi Jordan University of Science & Technology Outline Examples of using network measurements /monitoring Example 1: fast flux detection Example 2: DDoS mitigation as a service Future trends

More information

Snapt Balancer Manual

Snapt Balancer Manual Snapt Balancer Manual Version 1.2 pg. 1 Contents Chapter 1: Introduction... 3 Chapter 2: General Usage... 4 Configuration Default Settings... 4 Configuration Performance Tuning... 6 Configuration Snapt

More information

Modeling and Performance Analysis of Telephony Gateway REgistration Protocol

Modeling and Performance Analysis of Telephony Gateway REgistration Protocol Modeling and Performance Analysis of Telephony Gateway REgistration Protocol Kushal Kumaran and Anirudha Sahoo Kanwal Rekhi School of Information Technology Indian Institute of Technology, Bombay, Powai,

More information

A Vague Improved Markov Model Approach for Web Page Prediction

A Vague Improved Markov Model Approach for Web Page Prediction A Vague Improved Markov Model Approach for Web Page Prediction ABSTRACT Priya Bajaj and Supriya Raheja Department of Computer Science & Engineering, ITM University Gurgaon, Haryana 122001, India Today

More information

Second-generation (GenII) honeypots

Second-generation (GenII) honeypots Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. b.zdrnja@auckland.ac.nz Abstract Honeypots are security resources which trap malicious activities, so they

More information

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...

More information

A Critical Investigation of Botnet

A Critical Investigation of Botnet Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11 Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes

More information

ECE 578 Term Paper Network Security through IP packet Filtering

ECE 578 Term Paper Network Security through IP packet Filtering ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon

More information

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial

More information

SonicWALL Global Management System Reporting Guide Standard Edition

SonicWALL Global Management System Reporting Guide Standard Edition SonicWALL Global Management System Reporting Guide Standard Edition Version 2.9.4 Copyright Information 2005 SonicWALL, Inc. All rights reserved. Under the copyright laws, this manual or the software described

More information

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management

More information

Liferay Portal Performance. Benchmark Study of Liferay Portal Enterprise Edition

Liferay Portal Performance. Benchmark Study of Liferay Portal Enterprise Edition Liferay Portal Performance Benchmark Study of Liferay Portal Enterprise Edition Table of Contents Executive Summary... 3 Test Scenarios... 4 Benchmark Configuration and Methodology... 5 Environment Configuration...

More information

Trend Micro KASEYA INTEGRATION GUIDE

Trend Micro KASEYA INTEGRATION GUIDE Trend Micro KASEYA INTEGRATION GUIDE INTRODUCTION Trend Micro Worry-Free Business Security Services is a server-free security solution that provides protection anytime and anywhere for your business data.

More information

Performance Comparison of Server Load Distribution with FTP and HTTP

Performance Comparison of Server Load Distribution with FTP and HTTP Performance Comparison of Server Load Distribution with FTP and HTTP Yogesh Chauhan Assistant Professor HCTM Technical Campus, Kaithal Shilpa Chauhan Research Scholar University Institute of Engg & Tech,

More information