Performance Evaluation of SIP Server under Virtualization Environment Along with the Most Common Security Threats

10.11591/534 ◽  
2016 ◽  
Vol 5 (2) ◽  
Author(s):  
Manjur Kolhar ◽  
Mosleh M Abualhaj ◽  
Abdullah Alameen
Author(s):  
Jibril Adamu ◽  
Raseeda Hamzah ◽  
Marshima Mohd Rosli

The electronic medical record has been more widely accepted due to its unarguable benefits when compared to a paper-based system. As electronic medical record becomes more popular, this raises many security threats against the systems. Common security vulnerabilities, such as weak authentication, cross-site scripting, SQL injection, and cross-site request forgery had been identified in the electronic medical record systems. To achieve the goals of using EMR, attaining security and privacy is extremely important. This study aims to propose a web framework with inbuilt security features that will prevent the common security vulnerabilities in the electronic medical record. The security features of the three most popular and powerful PHP frameworks Laravel, CodeIgniter, and Symfony were reviewed and compared. Based on the results, Laravel is equipped with the security features that electronic medical record currently required. This paper provides descriptions of the proposed conceptual framework that can be adapted to implement secure EMR systems.


Author(s):  
Ida Wahidah ◽  
Yudha Purwanto ◽  
Aditya Kurniawan

<p>Internet of things (IoT) is an emerging topic in so many aspects nowadays. The integration between devices and human itself is currently in large scale development. With the continuous applications of the IoT, the hidden problems such as security threats become one of the key considerations. Furthermore, limited power and computational capability of the devices in the system make it more challenging.Therefore, the needs of reliable and effective security system throughout the networks are highly needed. This research proposed a collaborative system based on JADE that consists of 3 types of agent, which are IoT server, controller, and node. Every agents will collaborate each other in terms of exchanging the intrusion detection results. The collaboration between the agents will provide more efficient and good performance. Four classification algorithms were used to model IDS functions. Then, the performance evaluation was done on the system with several parameters such as cost loss expectation, energy consumption, and metric of IDS efficiency. The result shows that the number of reports sent by IoT controller were decreased up to 80% while preserving the security aspect.</p>


Author(s):  
Carl Malings ◽  
Rebecca Tanzer ◽  
Aliaksei Hauryliuk ◽  
Provat K. Saha ◽  
Allen L. Robinson ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document