Mobile Code for Distributed Applications/Systems

Size: px
Start display at page:

Download "Mobile Code for Distributed Applications/Systems"

Transcription

1 Mobile Code for Distributed Applications/Systems Koo Lee Chun School of Computing University Utara Malaysia, Kedah, Malaysia Abstract Traditional technologies exhibited many limitation and drawback to support dynamic and large scale of the distributed system such as Internet. This leads to the researchers on finding the innovative approach. One of the innovative and promising approaches is mobile code which has the ability to dynamically relocate the code during execution. This has made it sound powerful to support the designing and constructing of scalable, pervasive and massively distributed application. The understanding of mobile code is important to practitioners in mobile code exploitation. This paper aims to provide valuable information about mobile code in distributed system in term of its technologies, paradigms, applications and issues. Keywords mobile code; distributed application, design paradigms; security. I. INTRODUCTION The pervasiveness and ubiquity of inter-connected computers creates new challenges and opportunities in designing and constructing the distributed system or application. The most challenging issue is scalability to link the huge amount of computers and devices dynamically. Even though there are many traditional technologies and methodologies used to develop the conventional distributed systems (like client-server) in small network are proven working, but their solution faced a lot of limitation and drawback to support dynamic and large scale of the distributed system in the larger network such as Internet [1]. There have been many research works done to attempt addressing this problem. One of the innovative approaches is code mobility - mobile code. It has become popular in development of distributed application/system due to its capability to relocate and transfer executable content across the network to be executed in another host. This powerful feature is promising to increase system flexibility, scalability and reliability [2]. An understanding of mobile code in distributed system is essential to provide valuable information for the practitioners opportunities in exploitation of mobile code in their software development. Therefore, this paper is aim to provide understanding about mobile code in distributed system included its technologies, paradigms, applications and issues. The paper is organized as follows. A brief overview of mobile code included definition, technology and paradigms will be provided in next Section. Section III explains the application of mobile code in distributed system/application. Next, Section IV provides examples of system or applications that used mobile code. In Section V, issues in mobile code especially security challenge will be discussed. The paper ended in Section VI with concluding remark. II. WHAT IS MOBILE CODE Mobile code has been defined informally as the ability for an application to dynamically binding the execution code fragments, during run time, to their physical location where the code will be executed within a computer network [3]. Mobile code is different from mobile computing. Mobile computing moves the hardware whereas mobile code changes the hardware where the program executes [4]. Basically, the concept of code mobility is to transfer the execution code to the nearest available resources to effectively perform a task [5]. A. Mobile Code Technology Categories Mobile code technology can be classified based on their capability to transfer the execution state to another location. The mobile code technology is considered has strong mobility if it has the ability to relocate the program code and execution state to another location while execution. In contrast, weak mobility will has capability to transfer limited initialization data but not execution state to another location [4,5]. Machine code language (MCL) that support strong mobility included Agent Tcl, Ara, Facile and Sumatra. However Java, M0, Mole and TACOMA are some examples of MCLs that support weak mobility [5]. B. Mobile Code Paradigms Mobile Code paradigms were first proposed in [1] was extended from classic client-server paradigms. Each paradigms is distinguished from each other based on location of each components (know how-to and resource) before and after execution, and process which in charge of the execution as listed in Figure 1. It is based on the principle that to complete a task, a process required resource and knowledge of how to perform a task. Below explains each paradigm included the traditional client-server paradigm: Client-server paradigm (CS) : located in node A, lack of resources and knowledge on how to perform a task, which can be found in remote site, node B. requests a service to the process B in node B. Then, process B executed the task in node B and sends the result back to the process A in nodea.

2 Paradigm Client- Server Remote Evaluation Code on Demand Before After node A node B node A node B * * * Mobile Agent Instruction how-to - * Fig. 1: Classic client-server paradigms and Mobile Code Paradigms Component state before and after execution. * indicate process that responsible on the execution (Adopted from [1]) Remote evaluation (REV): located in node A knows how to complete a task, but it lacks of the resources, which located in remote site node B. Therefore, process A interacts with process B and transfers the instruction code containing how-to from node A to node B. Once the instruction how-to received, the execution performed by process B in node B. Result will be send to process A in node A. One of the examples will be rsh command in the UNIX. It allows user send some script code to be executed in remote host. Code on demand (COM): has the resources in node A, but it lack of knowledge how to perform the task, which can be found in remote site node B. Therefore, process A interacts with process B to transfer the know howto from node B to node A. Then, process A perform the task once instruction how-to received, in node A. The most widespread paradigm used nowadays in Internet applications such as Applet. Mobile Agent (MA) has knowledge how to perform a task in node A, but it lacks of resources, which located in remote site node B. migrates itself together with the know how-to (and others relevant intermediate data) to node B and complete the task by itself in node B. This is the most elegant paradigm that produces autonomous component in the network. It is used to produce general tools such as help on network administration. III. APPLICATION OF MOBILE CODE IN DISTRIBUTED SYSTEM/APPLICATIONS Classical distributed application always assumes that host and programming code are binding statically. In converse, the innovation of mobile code allows more dynamic solution in distributed system. Mobile code design paradigm allows new form of interaction and movement among components within source and target host in the distributed environment. Therefore, there are many scenarios that mobile code can be exploited to provide more elegant and effective way to cope in the current trend of distributed system which are heterogeneous and dynamic. Following section discuss some scenarios suggested in [1,3,5,7]on how mobile code can be applied in the distributed applications or system to gain great benefits out of it. A. Deployment and Upgrade of Distributed Application Rebuilding and installation at the distributed environment still need to perform individually with the human interaction locally. Mobile code could be exploited to help perform these tasks effectively and efficiently. Automate the installation process could be performed with the mobile code REV and MA design paradigm. The installation steps could be included in the program code which traverses from node to node. On each node, the features of local hardware and software platform will be analyzed by the program. Then, the program could perform the installation step based on the correct configuration. Besides that, the use of mobile code could be extended to support upgrading job as well. For instance, a new feature has been introduced in the existing software. To reflect the new feature in conventional distributed environment, each site is required to perform reinstalling and patching of the software. This will take long time. Upgrading job can be performed in a lazy way by use of the mobile code COD design paradigm that can support dynamically link the program code. First of all, the latest code with the new feature included shall be placed in a

3 code repository server. Instead of having the operator proactively perform the patching, the client application itself can re-actively automatically download from the repository server and perform the upgrading job. Thus, the program can be installed in the lazy way and yet only based on the need basic. This approach has been implemented by Microsoft to promptly distribute software patches to their clients [4]. Besides that, some web browsers such as Firefox also use this technique to provide automatically upgrade over internet. B. Service Customization Code mobility can help to provide service customization. The conventional distributed system which use client-server design paradigm, the server provides several numbers of services with static interface accessible by client. It is always happen that the available services are limited to provide unforeseen client need. The only solution to this problem is to upgrade the server with more new services to handle the client demand. Consequently, the server s complexity and size increase, but without increase the flexibility. Mobile code REV paradigm that supports code execution remotely could help to solve this problem more efficiently. With the remote code execution, this paradigm not only can increase the flexibility of the server, but also do not require the server to increase its complexity and size. Importantly, server has to maintain a set of unique services that allow remote code execution. Then, the client will request the service by submitting the customized code. Consequences, it helps to provide customized service to meet client s need. Certain fields in computer sciences are well-know of this approach. For instance, the way distributed databases handle the customization SQL. The DBMS server did not provide all the specific results, but allow only provide the SQL execution services in the server, which allow program to submit the SQL code for remote execution. C. Support for Disconnected Operations Mobile code with the properties of autonomy could help to support disconnected operations. In distributed system environment, each node is connected with one another by a variety of the physical link. The performance of these physical links must take into consideration in the earlier of design stage. Indeed, the characteristics of the physical link are crucial to determine the most suitable design paradigm for an application. For instances, a new design methodologies required to support mobile computing which executed in the low bandwidth and low-reliability communication channels. Frequency disconnections and traffic generation in the low bandwidth is one of the challenge in heterogeneous communication with difference performance. The only solution CS paradigm can provide would be increased the services granularity level offered by server. With this, a single interaction within client and server will enable the server to perform several numbers of low level operations locally without required both parties maintain the communication. Unfortunately, no all the requirements can meet in this design. Furthermore, the complexity and size of the server will increase and reduced flexibility in the server to support the requirement. Mobile code with REV and MA paradigm could help to solve limitation and drawback discussed above. Mobile code enables the complex execution/computation traverse around the network. In this case, the services that must to be performed by a server locating in a portion of the network that only accessible via slow and unreliable connection could be describe in a program. This should only pass once through this connection and injected into the reliable network. There, it could execute autonomously and freely. Besides that, it is not required to maintain connection with the node that sent it, except for sending the result of its computation. D. Improved Fault Tolerance In classic client-server architecture, the state of computation was spread between client and server. A client program will consists of statements required for local execution and interweaved with statements needed for remote invocation. The latter will contain client environment data, and eventually will be overwrite by the result return from the server. This type of structure will lead to the existence of partial failure, because it would be very hard to trace where and how to responds in order to restructure the consistent state. Partial failure could be solved by the mobile code with MA paradigms. This is because all the distributed computation state will be encapsulated by an autonomous component. Without global state, the information can be easily traced, check pointed and even recovered locally. IV. EXAMPLE OF SYSTEM/APPLICATIONS USE MOBILE CODE The systems or applications that exploit mobile code can range from low-level system level, middleware until the userlevel applications. Their designs are based on various paradigms as discuss earlier in Section II (b). Below discuss some of them. One of the prominent examples of mobile code is webbased interactive application build with Java applets or Adobe ActionScript for Flash. The program code is residing in the web server. Client sends a request to a web page that contains a link to this code using user s web browser. The web page and program are transported to the client s machine. The code is executed locally in the web browser once the page is displayed. It helps to produce dynamically loaded interactive web applications and web content. Google Doc is one of the examples that provide rich internet application (RIA) such as reader, calendar, work processor and spreadsheet. All these applications use code on demand paradigm of mobile code extensively. Another obvious example application of mobile code would be the query execution on a database server which discussed earlier in SECTION II. User supplies the customized SQL code statement to the database server across the network. Database server will provide the data as return to the user [5].

4 Postscript is another successful mobile code application. Client need to send a short, device-independent representation of file to the printer. Printer will use this document to print graphic images [4,5]. Besides that, some mobile code systems were constructed based on mobile agent paradigm such as Telescript and Agent Tcl [1,4,5]. Most of these systems are general tools for realizing arbitrary distributed applications. Telescript is the first system designed to support mobile agents in commercial applications. It is used to support task such as network management. Agent Tcl is designed with primary role in information-retrieval applications [6]. Wave is another system introduced in the earlier stage that implements network-aware mobile code. It presented distributed system problem in term of graph theory elegantly. Tube is a mobile code system that generates the code on the fly [4]. V. ISSUE IN MOBILE CODE Mobile code programs are allowed to execute anywhere, no longer constrained on the nodes where they reside. Unfortunately, this has posted several security issues and concern [8, 9]. Besides that, system level issues also arise in design and development of mobile code with strong mobility mobile agent [9]. One of the issues is malicious agent. Remote host and mobile code program might belong to different administrative domains in an open network environment such as Internet. Therefore, it is high risk for a server might run into the penetration by malicious agent, Trojan horses and viruses. Malicious agent might consume the resource inordinately and cause the denied of other legitimate agent and server user. There are several security mechanisms tried by researches to combat mobile malicious agent included code signing, sandboxes and proof-carrying code (refer to [8] for the details). It is imperfect solution because all the mechanisms are prone to degrees of false positives (denied legitimate program) and false negatives (failing to detect malicious programs). The most challenging issue is protecting mobile code program from malicious host. Mobile program code traverses from one host to another to collect partial results. This exposure causes the mobile code vulnerable to the manipulation of remote host. The vulnerable degree is depends on the security requirement of the mobile code program. Below are some mobile code program vulnerabilities of the malicious host: Inspection (privacy/confidentiality) : In many applications, parts of their data or code might need to keep secret and confidential. For instance, the shopper s agent credit card number and the biding result from other host. Besides that, the algorithms used to execute the task might be proprietary. One obstacle to protect this confidentiality would be the execution must have the mobile code program exist in the host. The challenge is to develop mechanism to enforce security policy to execute one part of the mobile code and yet disallow the hosts to inspect others part. Besides that, the mechanism also need to ensure only different portion of the program code state to different host. Modification (integrity): The state of the mobile code program commonly would be updated along its journey to collect information from the server. The program must be able to loaded and executing by the remote server. There is no guarantee that no malicious alter on the mobile code program while reading the execution code and before it depart to another host. One of the suggestion from some researches discussed in [10] are using forward-integrity security policy. Another suggestion discussed in [9] is use of cryptographic mechanisms, seal or message digests. However, most of the mechanisms are toward detecting instead of preventing. Furthermore, as highlighted in [8], some mechanisms suggested is not full proofed. Authentication Another issue is authentication of the mobile agent identity is needed to enforce access control. Some cryptographers suggested the use digital signature to decide what right and privileges to grant for the host and program code. However, to avoid vulnerable to malicious host, the program code shall not carry secret or private keys [9]. Therefore, a secure mechanism required to lookup safely the keys. Besides that, there are too many identify associate mobile code program. For instance, an agent can be associated to with the agent s code designer, the agent s developer, the agent dispatches and the visited node [5]. Consequently, the overall authentication process would be complexity and error-prone. Denial of service Mobile code program also can vulnerable to the denial of service. The server host can just refuse to execute the mobile code program. Therefore, the mobile code program will be terminated. This denial of service can apply the same on agent s request to database or other external information sources. Besides security issue, there are also system level issues being discussed in [9]. These included platform compatibility of agent in heterogeneity and scale-up environment, the naming and traceability of the mobile agent and dynamic discovery of resources. VI. CONCLUSION Mobile code is a promising approach in distributed system to increase system flexibility, scalability and reliability. The program code can executed at anywhere across the wide area network without constrained on the host the program code

5 resided. Strong mobility migrate itself (include state and code) to remote host. Weak en mobility does not transfer the state information together with code. Several mobile code paradigms exist such as remote evaluation, code on demand and mobile agent. Study indicated that first two paradigms are widespread acceptance, but not the latter [5]. Consequently, the mobile code promises are only partially fully. The major obstacle of these phenomena is due to several security issues. These included penetration of system by the malicious agent, as well as converse issues of vulnerability of malicious agents at the malicious host. Furthermore some available protection and prevention mechanism are not full proofed. Therefore, subsequent work on the real understanding and research of the various security mechanisms to detect and prevent the malicious attack is essential to realize the vision of mobile code in distributed system. REFERENCES [1] A. Carzaniga, G. P. Picco, and G. Vigna, "Designing Distributed Applications with Mobile Code Paradigms," in Software Engineering, 1997., Proceedings of the 1997 International Conference on, 1997, pp [2] G. P. Picco, "Mobile Agents:An Introduction," J.Microprocessor and Microsystems, vol. 25, no. 2, pp , [3] A. Fuggetta, G. P. Picco and G. Vigna, "Understanding Code Mobility," IEEE Transaction on Software Engineering, vol. 24, no. 5, [4] R. R. Brooks, "Mobile code paradigms and security issues," Internet Computing, IEEE, vol. 8, pp , [5] A. Carzaniga, G. P. Picco, and G. Vigna, "Is Code Still Moving Around? Looking Back at a Decade of Code Mobility," in Software Engineering - Companion, ICSE 2007 Companion. 29th International Conference on, 2007, pp [6] R.R. Brooks. And N. Orr, A Model for Mobile Codes using Interacting Automata, IEEE Trans. Mobile Computing, vol 1, no.4, 2002, pp [7] R.S. Gray, D. Kotz, S. Nog, D. Rus, and G. Cybenko, Mobile Agents for Mobile Computing, Proc. Second Aizu Int l Symp. Parallel Algorithms/Architectures Synthesis, Fukushima, Japan, Mar [8] J.M. Zachary, Protecting Mobile Code in the Wild, IEEE Internet Computing, vol. 7, no. 2, Mar./Aprl. 2003, pp [9] N. M. Karnik and A. R. Tripathi. Design Issues in Mobile Agent Programming Systems. IEEE Concurrency, 6(6):52 61, [10] B. Yee, Why Secure Remote Execution, white paper, 2002; available at

Reflections about Mobile Agents and Software Engineering

Reflections about Mobile Agents and Software Engineering Reflections about Mobile gents and Software Engineering Gian Pietro Picco Dipartimento di Elettronica e Informazione Politecnico, Italy [email protected] http://www.elet.polimi.it/~picco Motivation

More information

The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions

The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions The evolution of virtual endpoint security Comparing vsentry with traditional endpoint virtualization security solutions Executive Summary First generation endpoint virtualization based security solutions

More information

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, 2014. Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, 2014. Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661 Adobe ColdFusion Secure Profile Web Application Penetration Test July 31, 2014 Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661 Chicago Dallas This document contains and constitutes the

More information

Keyword: Cloud computing, service model, deployment model, network layer security.

Keyword: Cloud computing, service model, deployment model, network layer security. Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging

More information

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,[email protected]

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

Distributed Systems Lecture 1 1

Distributed Systems Lecture 1 1 Distributed Systems Lecture 1 1 Distributed Systems Lecturer: Therese Berg [email protected]. Recommended text book: Distributed Systems Concepts and Design, Coulouris, Dollimore and Kindberg. Addison

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems

More information

Security Issues with Integrated Smart Buildings

Security Issues with Integrated Smart Buildings Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern

More information

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration

More information

AN OVERVIEW OF VULNERABILITY SCANNERS

AN OVERVIEW OF VULNERABILITY SCANNERS AN OVERVIEW OF VULNERABILITY SCANNERS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole

More information

THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005

THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005 THE IMPORTANCE OF CODE SIGNING TECHNICAL NOTE 02/2005 13 DECEMBER 2005 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS

A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 [email protected] Mohamed E. Fayad Computer Engineering

More information

6WRUP:DWFK. Policies for Dedicated SQL Servers Group

6WRUP:DWFK. Policies for Dedicated SQL Servers Group OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific

More information

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining

More information

Executable Integrity Verification

Executable Integrity Verification Executable Integrity Verification Abstract Background Determining if a given executable has been trojaned is a tedious task. It is beyond the capabilities of the average end user and even many network

More information

Network and Host-based Vulnerability Assessment

Network and Host-based Vulnerability Assessment Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:

More information

Data Storage Security in Cloud Computing

Data Storage Security in Cloud Computing Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT

More information

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS

More information

Threat Modeling. Frank Piessens ([email protected] ) KATHOLIEKE UNIVERSITEIT LEUVEN

Threat Modeling. Frank Piessens (Frank.Piessens@cs.kuleuven.be ) KATHOLIEKE UNIVERSITEIT LEUVEN Threat Modeling Frank Piessens ([email protected] ) Secappdev 2007 1 Overview Introduction Key Concepts Threats, Vulnerabilities, Countermeasures Example Microsoft s Threat Modeling Process

More information

Symantec Endpoint Protection Analyzer Report

Symantec Endpoint Protection Analyzer Report Symantec Endpoint Protection Analyzer Report For Symantec Customer Table of Contents Statement of Confidentiality... 3 1. Introduction... 4 2. Environmental Analysis Overview... 5 2.1 Findings Overview...

More information

A Study of Network Security Systems

A Study of Network Security Systems A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya

More information

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],

More information

ICTN 4040. Enterprise Database Security Issues and Solutions

ICTN 4040. Enterprise Database Security Issues and Solutions Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of

More information

LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages

LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,

More information

Virtual machine interface. Operating system. Physical machine interface

Virtual machine interface. Operating system. Physical machine interface Software Concepts User applications Operating system Hardware Virtual machine interface Physical machine interface Operating system: Interface between users and hardware Implements a virtual machine that

More information

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY) E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system

More information

MEGA Web Application Architecture Overview MEGA 2009 SP4

MEGA Web Application Architecture Overview MEGA 2009 SP4 Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

Last Updated: July 2011. STATISTICA Enterprise Server Security

Last Updated: July 2011. STATISTICA Enterprise Server Security Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...

More information

Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems

Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Appendix to; Assessing Systemic Risk to Cloud Computing Technology as Complex Interconnected Systems of Systems Yacov Y. Haimes and Barry M. Horowitz Zhenyu Guo, Eva Andrijcic, and Joshua Bogdanor Center

More information

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Recommended Practice Case Study: Cross-Site Scripting. February 2007 Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber

More information

Distribution transparency. Degree of transparency. Openness of distributed systems

Distribution transparency. Degree of transparency. Openness of distributed systems Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science [email protected] Chapter 01: Version: August 27, 2012 1 / 28 Distributed System: Definition A distributed

More information

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Ensuring Security in Cloud with Multi-Level IDS and Log Management System Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,

More information

A Comparative Study of cloud and mcloud Computing

A Comparative Study of cloud and mcloud Computing A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. [email protected]

More information

Distributed System Principles

Distributed System Principles Distributed System Principles 1 What is a Distributed System? Definition: A distributed system consists of a collection of autonomous computers, connected through a network and distribution middleware,

More information

IY2760/CS3760: Part 6. IY2760: Part 6

IY2760/CS3760: Part 6. IY2760: Part 6 IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily

More information

INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY

INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY Asst.Prof. S.N.Wandre Computer Engg. Dept. SIT,Lonavala University of Pune, [email protected] Gitanjali Dabhade Monika Ghodake Gayatri

More information

6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access

6WRUP:DWFK. Policies for Dedicated IIS Web Servers Group. V2.1 policy module to restrict ALL network access OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated IIS Web Servers Group The policies shipped with StormWatch address both application-specific

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents

An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology

More information

CLOUD COMPUTING IN HIGHER EDUCATION

CLOUD COMPUTING IN HIGHER EDUCATION Mr Dinesh G Umale Saraswati College,Shegaon (Department of MCA) CLOUD COMPUTING IN HIGHER EDUCATION Abstract Technology has grown rapidly with scientific advancement over the world in recent decades. Therefore,

More information

REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES

REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES Miss.Monali K.Narse 1,Chaitali S.Suratkar 2, Isha M.Shirbhate 3 1 B.E, I.T, JDIET, Yavatmal, Maharashtra, India, [email protected] 2 Assistant

More information

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription

More information

An Oracle White Paper May 2012. Oracle Database Cloud Service

An Oracle White Paper May 2012. Oracle Database Cloud Service An Oracle White Paper May 2012 Oracle Database Cloud Service Executive Overview The Oracle Database Cloud Service provides a unique combination of the simplicity and ease of use promised by Cloud computing

More information

Mobile Software Agents: an Overview

Mobile Software Agents: an Overview Mobile Software Agents: an Overview Authors : From: Vu Anh Pham and Ahmed Karmouch University of Ottawa, Ontario Presented by: Luba Sakharuk Agenda for the Overview of Mobile Agents Abstract The Mobile

More information

Efficient Detection of Ddos Attacks by Entropy Variation

Efficient Detection of Ddos Attacks by Entropy Variation IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,

More information

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure

More information

What is Web Security? Motivation

What is Web Security? Motivation [email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information

Current and Future Research into Network Security Prof. Madjid Merabti

Current and Future Research into Network Security Prof. Madjid Merabti Current and Future Research into Network Security Prof. Madjid Merabti School of Computing & Mathematical Sciences Liverpool John Moores University UK Overview Introduction Secure component composition

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

Homeland Security Red Teaming

Homeland Security Red Teaming Homeland Security Red Teaming Directs intergovernmental coordination Specifies Red Teaming Viewing systems from the perspective of a potential adversary Target hardening Looking for weakness in existing

More information

Security Testing & Load Testing for Online Document Management system

Security Testing & Load Testing for Online Document Management system 1 Security Testing & Load Testing for Online Document Management system Abstract The client is a leading provider of online technical documentation solutions in UK, they wanted to protect their documents

More information

Middleware and Distributed Systems. System Models. Dr. Martin v. Löwis. Freitag, 14. Oktober 11

Middleware and Distributed Systems. System Models. Dr. Martin v. Löwis. Freitag, 14. Oktober 11 Middleware and Distributed Systems System Models Dr. Martin v. Löwis System Models (Coulouris et al.) Architectural models of distributed systems placement of parts and relationships between them e.g.

More information

STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM

STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM Albert M. K. Cheng, Shaohong Fang Department of Computer Science University of Houston Houston, TX, 77204, USA http://www.cs.uh.edu

More information

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India

CLOUD COMPUTING. DAV University, Jalandhar, Punjab, India. DAV University, Jalandhar, Punjab, India CLOUD COMPUTING 1 Er. Simar Preet Singh, 2 Er. Anshu Joshi 1 Assistant Professor, Computer Science & Engineering, DAV University, Jalandhar, Punjab, India 2 Research Scholar, Computer Science & Engineering,

More information

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems

More information

Implementation of Botcatch for Identifying Bot Infected Hosts

Implementation of Botcatch for Identifying Bot Infected Hosts Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus

More information

How To Secure Cloud Computing

How To Secure Cloud Computing Next Generation Cloud Computing Issues and Solutions Jeon SeungHwan 1, Yvette E. Gelogo 1 and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeong-dong, Daeduk-gu, Daejeon,

More information

Modernizing enterprise application development with integrated change, build and release management.

Modernizing enterprise application development with integrated change, build and release management. Change and release management in cross-platform application modernization White paper December 2007 Modernizing enterprise application development with integrated change, build and release management.

More information

Security Issues In Cloud Computing and Countermeasures

Security Issues In Cloud Computing and Countermeasures Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department

More information

TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing

TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing TRUFFLE Broadband Bonding Network Appliance BBNA6401 A Frequently Asked Question on Link Bonding vs. Load Balancing LBRvsBBNAFeb15_08b 1 Question: What's the difference between a Truffle Broadband Bonding

More information

Integration of the OCM-G Monitoring System into the MonALISA Infrastructure

Integration of the OCM-G Monitoring System into the MonALISA Infrastructure Integration of the OCM-G Monitoring System into the MonALISA Infrastructure W lodzimierz Funika, Bartosz Jakubowski, and Jakub Jaroszewski Institute of Computer Science, AGH, al. Mickiewicza 30, 30-059,

More information

Analysis of advanced issues in mobile security in android operating system

Analysis of advanced issues in mobile security in android operating system Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of

More information

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou 3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University

More information

A Scheme for Implementing Load Balancing of Web Server

A Scheme for Implementing Load Balancing of Web Server Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public

More information

Tips and Best Practices for Managing a Private Cloud

Tips and Best Practices for Managing a Private Cloud Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies

More information

A Generic Database Web Service

A Generic Database Web Service A Generic Database Web Service Erdogan Dogdu TOBB Economics and Technology University Computer Engineering Department Ankara, Turkey [email protected] Yanchao Wang and Swetha Desetty Georgia State University

More information

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human

More information

A Multi-Agent Approach to a Distributed Schedule Management System

A Multi-Agent Approach to a Distributed Schedule Management System UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in

More information

Manifest for Big Data Pig, Hive & Jaql

Manifest for Big Data Pig, Hive & Jaql Manifest for Big Data Pig, Hive & Jaql Ajay Chotrani, Priyanka Punjabi, Prachi Ratnani, Rupali Hande Final Year Student, Dept. of Computer Engineering, V.E.S.I.T, Mumbai, India Faculty, Computer Engineering,

More information

Taking the Open Source Road

Taking the Open Source Road The National Security Agency s Review of Emerging Technologies Taking the Open Source Road Raising the Bar in Operating System Security Cryptographic Binding of Metadata Providing a Secure Foundation with

More information

Base One's Rich Client Architecture

Base One's Rich Client Architecture Base One's Rich Client Architecture Base One provides a unique approach for developing Internet-enabled applications, combining both efficiency and ease of programming through its "Rich Client" architecture.

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

Globule: a Platform for Self-Replicating Web Documents

Globule: a Platform for Self-Replicating Web Documents Globule: a Platform for Self-Replicating Web Documents Guillaume Pierre Maarten van Steen Vrije Universiteit, Amsterdam Internal report IR-483 January 2001 Abstract Replicating Web documents at a worldwide

More information

CloudCheck Compliance Certification Program

CloudCheck Compliance Certification Program CloudCheck Compliance Certification Program Ensure Your Cloud Computing Environment is Secure with CloudCheck Certification Organizations today are increasingly relying on a combination of private and/or

More information

Information Security for Modern Enterprises

Information Security for Modern Enterprises Information Security for Modern Enterprises Kamal Jyoti 1. Abstract Many enterprises are using Enterprise Content Management (ECM) systems, in order to manage sensitive information related to the organization.

More information

Introduction to Mobile Middleware. Introduction Mobile Middleware

Introduction to Mobile Middleware. Introduction Mobile Middleware CPET 565/CPET 499 Mobile Computing Systems Lecture 8 Introduction to Mobile Middleware Fall 2012 A Specialty Course for Purdue University s M.S. in Technology Graduate Program Paul I-Hai Lin, Professor

More information

A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture

A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture , March 12-14, 2014, Hong Kong A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture Abdulsalam Ya u Gital, Abdul Samad Ismail, Min Chen, and Haruna Chiroma, Member,

More information

Using Social Networking Sites as a Platform for E-Learning

Using Social Networking Sites as a Platform for E-Learning Using Social Networking Sites as a Platform for E-Learning Mohammed Al-Zoube and Samir Abou El-Seoud Princess Sumaya University for Technology Key words: Social networks, Web-based learning, OpenSocial,

More information

The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA

The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Guidance Regarding Skype and Other P2P VoIP Solutions

Guidance Regarding Skype and Other P2P VoIP Solutions Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,

More information

WIND RIVER SECURE ANDROID CAPABILITY

WIND RIVER SECURE ANDROID CAPABILITY WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion

More information

Tracking Anti-Malware Protection 2015

Tracking Anti-Malware Protection 2015 Tracking Anti-Malware Protection 2015 A TIME-TO-PROTECT ANTI-MALWARE COMPARISON TEST Dennis Technology Labs www.dennistechnologylabs.com Follow @DennisTechLabs on Twitter.com This report aims to measure

More information

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter

More information

Web Engineering Web Application Security Issues

Web Engineering Web Application Security Issues Security Issues Dec 14 2009 Katharina Siorpaes Copyright 2009 STI - INNSBRUCK www.sti-innsbruck.at It is NOT Network Security It is securing: Custom Code that drives a web application Libraries Backend

More information

Inmagic Content Server v9 Standard Configuration Technical Guidelines

Inmagic Content Server v9 Standard Configuration Technical Guidelines Inmagic Content Server v9.0 Standard Configuration Technical Guidelines 5/2006 Page 1 of 15 Inmagic Content Server v9 Standard Configuration Technical Guidelines Last Updated: May, 2006 Inmagic, Inc. All

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure [email protected] DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information