oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Blue Screen of Death Observed for Microsoft Windows Server 2012 R2 under DDoS Security Attack  [PDF]
Koushicaa Sundar, Sanjeev Kumar
Journal of Information Security (JIS) , 2016, DOI: 10.4236/jis.2016.74018
Abstract: Microsoft server Operating Systems are considered to have in-built, host based security features that should provide some protection against Distributed Denial of Service (DDoS) attacks. In this paper, we presented results of experiments that were conducted to test the security capability of the latest server Operating System from Microsoft Inc., namely Windows Server 2012 R2. Experiments were designed to evaluate its in-built security features in defending against a common Distributed Denial of Service (DDoS) attack, namely the TCP-SYN based DDoS attack. Surprisingly, it was found that the Windows Server 2012 R2 OS lacked sufficient host-based protection and was found to be unable to defend against even a medium intensity3.1 Gbps-magnitude of TCP-SYN attack traffic. The server was found to crash within minutes after displaying a Blue Screen of Death (BSoD) under such security attacks.
Effectiveness of Built-in Security Protection of Microsoft’s Windows Server 2003 against TCP SYN Based DDoS Attacks  [PDF]
Hari Krishna Vellalacheruvu, Sanjeev Kumar
Journal of Information Security (JIS) , 2011, DOI: 10.4236/jis.2011.23013
Abstract: Recent DDoS attacks against several web sites operated by SONY Playstation caused wide spread outage for several days, and loss of user account information. DDoS attacks by WikiLeaks supporters against VISA, MasterCard, and Paypal servers made headline news globally. These DDoS attack floods are known to crash, or reduce the performance of web based applications, and reduce the number of legitimate client connections/sec. TCP SYN flood is one of the common DDoS attack, and latest operating systems have some form of protection against this attack to prevent the attack in reducing the performance of web applications, and user connections. In this paper, we evaluated the performance of the TCP-SYN attack protection provided in Microsoft’s windows server 2003. It is found that the SYN attack protection provided by the server is effective in preventing attacks only at lower loads of SYN attack traffic, however this built-in protection is found to be not effective against high intensity of SYN attack traffic. Measurement results in this paper can help network operators understand the effectiveness of built-in protection mechanism that exists in millions of Windows server 2003 against one of the most popular DDoS attacks, namely the TCP SYN attack, and help enhance security of their network by additional means.
Evaluation of Microsoft Windows Servers 2008 & 2003 against Cyber Attacks  [PDF]
Sanjeev Kumar, Senior Member, Raja Sekhar Reddy Gade
Journal of Information Security (JIS) , 2015, DOI: 10.4236/jis.2015.62016
Abstract: Distributed Denial of Service (DDoS) is known to compromise availability of Information Systems today. Widely deployed Microsoft’s Windows 2003 & 2008 servers provide some built-in protection against common Distributed Denial of Service (DDoS) attacks, such as TCP/SYN attack. In this paper, we evaluate the performance of built-in protection capabilities of Windows servers 2003 & 2008 against a special case of TCP/SYN based DDoS attack. Based on our measurements, it was found that the built-in security features which are available by default on Microsoft’s Windows servers were not sufficient in defending against the TCP/SYN attacks even at low intensity attack traffic. Under TCP/SYN attack traffic, the Microsoft 2003 server was found to crash due to processor resource exhaustion, whereas the 2008 server was found to crash due to its memory resource depletion even at low intensity attack traffic.
Security Access Control Based on Multi-user Spatial Database
多用户空间数据库的安全访问控制

ZHAO Yong,TIAN Mao,
赵勇
,田茂

计算机应用研究 , 2004,
Abstract: The environments in which Geographic Information Systems are being implemented and used are changing rapidly ,specially the development of WebGIS,thus producing a rapidly growing need for consideration of the security of the information in these systems.Spatial information is being put online where it is more readily accessible to a much larger group of people.We will set up an enterprise level GIS environment using ArcGIS~(TM) 8.1,ArcSDE~(TM) and Microsoft SQL Server,and will (develop) a security interface between ArcSDE~(TM) and SQL Server using view-based access control.
Windows Vista Kernel-Mode: Functions, Security Enhancements and Flaws  [PDF]
Mohammed D. ABDULMALIK,Shafi’i M. ABDULHAMID
Leonardo Journal of Sciences , 2008,
Abstract: Microsoft has made substantial enhancements to the kernel of the Microsoft Windows Vista operating system. Kernel improvements are significant because the kernel provides low-level operating system functions, including thread scheduling, interrupt and exception dispatching, multiprocessor synchronization, and a set of routines and basic objects.This paper describes some of the kernel security enhancements for 64-bit edition of Windows Vista. We also point out some weakness areas (flaws) that can be attacked by malicious leading to compromising the kernel.
Approaches to Definition of Security of an Enterprise  [PDF]
N. L. Gavkalova,Y. S. Chaplygina
Economics of Development , 2011,
Abstract: The basic definitions which characterize the security of the enterprise are substantiated. The category "security of the enterprise", proposed by the authors, is suggested. For the analysis of the nature of security you need to combine several approaches to determine the safety. Security is the state of immunity of the enterprise from various internal and external threats to ensure that the most productive use of enterprise resources is achieved through harmonization and mutual interests with the interests of business of the enterprise in time and space.
Implementation study of AODV for Microsoft Windows CE platform
Prinima Gupta,R. K Tuteja
International Journal of Computer Science Issues , 2012,
Abstract: The Ad hoc On-Demand Distance Vector (AODV) routing protocol is designed for use in mobile ad-hoc networks. There are a number of implementations of the Ad-hoc routing protocols available for the Linux platform, but not for any other platform. Windows CE .NET, the successor to Windows CE 3.0, combines an advanced real-time embedded operating system with the most powerful tools for rapidly creating the next generation of smart, connected, and small-footprint devices. This paper presents a design, implementation, and evaluation of AODV protocol for the Windows CE .NET operating system and describes the salient characteristics of the Windows CE platform for those unfamiliar with the system. It also focuses on the application level implementation of the algorithm and provides the framework for integrating the protocol in Windows CE .NET in form of an NDIS intermediate driver.
Apple’s Lion vs Microsoft’s Windows 7: Comparing Built-In Protection against ICMP Flood Attacks  [PDF]
Rodolfo Baez Junior, Sanjeev Kumar
Journal of Information Security (JIS) , 2014, DOI: 10.4236/jis.2014.53012
Abstract:

With the increase in the number of computers connected to Internet, the number of Distributed Denial of Service (DDoS) attacks has also been increasing. A DDoS attack consumes the computing resources of a computer or a server, by degrading its computing performance or by preventing legitimate users from accessing its services. Recently, Operating Systems (OS) are increasingly deploying embedded DDoS prevention schemes to prevent computing exhaustion caused by such attacks. In this paper, we compare the effectiveness of two popular operating systems, namely the Apple’s Lion and Microsoft’s Windows 7, against DDoS attacks. We compare the computing performance of these operating systems under two ICMP based DDoS attacks. Since the role of the OS is to manage the computer or servers resources as efficiently as possible, in this paper we investigate which OS manages its computing resources more efficiently. In this paper, we evaluate and compare the built-in security of these two operating systems by using an iMac computer which is capable of running both Windows 7 and Lion. The DDoS attacks that are simulated for this paper are the ICMP Ping and Land Attack. For this experiment, we measure the exhaustion of the processors and the number of Echo Request and Echo Reply messages that were generated under varying attack loads for both the Ping and Land Attack. From our experiments, we found that both operating systems were able to survive the attacks however they reacted a bit differently under attack. The Operating System Lion was handling both the Ping and Land attack in the exactly the same way, whereas Windows 7 handled the two attacks a bit differently, resulting in different processor consumptions by two different operating systems.

СИСТЕМН ОСНОВИ ДОСЛ ДЖЕННЯ Ф НАНСОВО БЕЗПЕКИ П ДПРИ МСТВА SYSTEM FUNDAMENTALS OF FINANCIAL SECURITY ENTERPRISE СИСТЕМНЫЕ ОСНОВЫ ИССЛЕДОВАНИЯ ФИНАНСОВОЙ БЕЗОПАСНОСТИ ПРЕДПРИЯТИЯ  [cached]
?.П. МОЙСЕ?НКО
Strategy of Ukraine : Economics, Sociology, Law , 2011,
Abstract: В статт представлено основи системного формування ф нансово безпеки п дпри мства. Опи-сано механ зм управл ння ф нансовою безпекою п дпри мства зг дно вимог теор систем та теор безпеки. Фо-рмулюються основн принципи механ зму управл ння з використанням потенц алу п дпри мства, вим рювання р вня безпеки та напрямк в зм н. The article presents the fundamentals of system forming financial security company. We describe the mechanism of financial security company in accordance with requirements of systems theory and theories of security. Formulated the basic principles of the mechanism of the potential of the enterprise, measuring the level of security and direction changes. В статье представлены основы системного формирования финансовой безопасности пре-дприятия. Описан механизм управления финансовой безопасностью предприятия согласно требованиям теории систем и теории безопасности. Формулируются основные принципы механизма управления с использованием потенциала предприятия, измерение уровня безопасности и направлений изменений.
Windows And Linux Operating Systems From A Security Perspective
Youssef Bassil
Journal of Global Research in Computer Science , 2012,
Abstract: Operating systems are vital system software that, without them, humans would not be able to manage and use computer systems. In essence, an operating system is a collection of software programs whose role is to manage computer resources and provide an interface for client applications to interact with the different computer hardware. Most of the commercial operating systems available today on the market have buggy code and they exhibit security flaws and vulnerabilities. In effect, building a trusted operating system that can mostly resist attacks and provide a secure computing environment to protect the important assets of a computer is the goal of every operating system manufacturer. This paper deeply investigates the various security features of the two most widespread and successful operating systems, Microsoft Windows and Linux. The different security features, designs, and components of the two systems are to be covered elaborately, pin-pointing the key similarities and differences between them. In due course, a head-to-head comparison is to be drawn for each security aspect, exposing the advantage of one system over the other.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.