Abstract : Now a day's most of the people are using the web-applications irrespective of their educational status. As the number of persons are increasing the number and types of attacks are also increasing. It is the responsibility of the web-application developers to ensure the users security i.e., their information is secured when accessing their web-sites. There are different types of attacks that are targeting web users. They include sql-injection, denial of service, Cross-site...
1. Title Network Router Simulation2. KeywordsLocal Area Network Routers Internet Protocol Addressing Data Packets Client/Server Maximum Transfer Unit3. Problems DefinitionThe main problem of our project is to maximize the efficiency of the routing process by suggesting the potential user a better algorithm. While sending data packet from one Local Area Network to another Local Area Network, mainly we must consider the shortest path routing algorithm for finding the destination. Then we must...
The first step is to import the weblog. So, Weblog is the input of the experiment. The next step is to filter the weblog to remove irrelevant information. Then the resulting weblog is input to either threshold based algorithm or clustering algorithm for the purpose of session identification. The output of the experiment is the session details such as Toff, Ton, Tarr and number of connections etc. The experiment is done using the following developing technologies: Languages: C# Front end:...
Over 15 years ago scientists at CERN research center in Switzerland developed a new use for the Internet called the World Wide Web. The three major standards that support web use are URL, HTTP and HTML. These standards create a decentralized structure that produces an environment for content sharing. It is becoming easier and easier for people to tap into the web thus creating the growing network effects of the web (Raman, 52). These standards have produced the web's exponential increase in...
Generally a programmer writes a program using a particular programming language. When the programmer writes the program, it was in source code most probably High Level Language (HLL). This source code is the only language that is readable by human. Besides that, source code or programming language is easy to write and maintain. As a final stage, the written code or program has to compile so that it will convert to machine readable form or more generically machine language (often having...
MS WINDOWS is a series of software OS and graphical user interfaces which is produced by MICROSOFT. The term WINDOWS, in all describes any or all of the generations of MICROSOFT OS products. The early versions of WINDOWS were often as a simple GUI because it ran over MS-Dos and used it for file system services. However even then WINDOWS versions already assumed many costumed OS functions such as having their own executable file format and their own device drivers for timer, graphics,...
DDoS is an attack in which a multitude of compromised systems attack a single target, thereby causing DoS for users of the targeted system. There have been a lot of methodologies and tools devised to detect DDoS attacks and reduce the damage they cause. In this journal, I am going to explain how the DDoS attack is established and the possible ways of tracing the attacker and the types of connections between various levels of DDoS attack.OVERVIEW:Consider an attacker using a network of zombie...
E-ticketing in Airlines is a method of booking tickets for different airlines services available through online. Booking tickets through existing system is the manual system where the user information is recorded manually. Database maintenance became difficult for the large data storage and it is time consuming. And loss of data is unavoidable due to manual maintenance. To overcome problems in the manual method E-Ticketing is introduced. It came with solutions that have created in manual...
A Virtual machine monitor (VMM) allows multiple virtual platforms to share the same physical machine safely and fairly. VMM provides separation among the virtual machines and manages their access to hardware resources [1]. The disk scheduler within the VMM plays a very important role in determining the overall fairness and performance characteristics of the virtualized system. The disk is a resource which is shared by different applications. Thus, there must be some scheduling criteria to use...
Introduction: As we all aware very well with telephony traditional voice communication, because these systems was running circuit switching techniques that's why system used to have limited functionalities. In traditional networks or data network architecture we used to send data (email, messages) across the network and every service used to have different network e.g. voice, video etc. Traditional WAN communication and data communication was just transmission of data (just text...