unix system
Recently Published Documents


TOTAL DOCUMENTS

99
(FIVE YEARS 0)

H-INDEX

7
(FIVE YEARS 0)

2020 ◽  
Vol 17 (4A) ◽  
pp. 662-670
Author(s):  
Huthifh Al-Rushdan ◽  
Mohammad Shurman ◽  
Sharhabeel Alnabelsi

Networks attacker may identify the network vulnerability within less than one day; this kind of attack is known as zero-day attack. This undiscovered vulnerability by vendors empowers the attacker to affect or damage the network operation, because vendors have less than one day to fix this new exposed vulnerability. The existing defense mechanisms against the zero-day attacks focus on the prevention effort, in which unknown or new vulnerabilities typically cannot be detected. To the best of our knowledge the protection mechanism against zero-day attack is not widely investigated for Software-Defined Networks (SDNs). Thus, in this work we are motivated to develop a new zero-day attack detection and prevention mechanism for SDNs by modifying Cuckoo sandbox tool. The mechanism is implemented and tested under UNIX system. The experiments results show that our proposed mechanism successfully stops the zero-day malwares by isolating the infected clients, in order to prevent the malwares from spreading to other clients. Moreover, results show the effectiveness of our mechanism in terms of detection accuracy and response time


A secure approach of UNIX system positive identification systems is to store the hash1 of the positive identification within the positive identification file instead of storing it as a noticeable text. The most purpose of this report is to investigate these positive identification systems that use hash functions like MD5, SHA256 and SHA512. The stress is set on the positive identification strength provided by applying these hash functions. We tend to conjointly analyze this approach by making an attempt to crack the passwords, with package tool ‘John the Ripper’. The strength of the passwords used can vary from easy to advance. This report analyzes that hash operate would be best to yield a sturdy and secure positive identification system.


2014 ◽  
Vol 644-650 ◽  
pp. 4088-4091
Author(s):  
Jin Hai Zhang

This article on inter-process communication mechanism has conducted in-depth research and analysis of traditional UNIX system under the environment of the inter process communication mechanism and existing mechanisms for process communication in distributed environment. And on that basis propose new interprocess communication mechanism in distributed environment. Given interprocess communication semaphores and Message Queuing design ideas and implementation details, and compare it with the traditional way, we concluded that in the case of performance does not deteriorate, provides better user interfaces and location transparency and access higher transparency.


2014 ◽  
pp. 72-78
Author(s):  
Rachid Beghdad

We introduce a new intrusion detection method based on the Hierarchical Clustering Algorithm (HCA), to detect anomalous user’s profiles. In the Unix system, a simple user has only some privileges (can access to some resources), but the root user has more privileges. So, we can speak here about hierarchy of users. By the same way, we can use a hierarchy of users in intrusion detection field, to distinguish between the normal user and suspicious user. Many data mining methods were already used in previous works in intrusion detection. Even if some of them led to interesting results, but they still suffer from some weaknesses. This is the reason why we focused in this study on the use of the HCA to detect anomalous profiles. A survey of intrusion detection methods is presented. The HCA procedure is described in detail. Our simulation results demonstrate the robustness of our approach in comparison to some previous used methods.


2013 ◽  
Vol 02 (01) ◽  
pp. 1350002 ◽  
Author(s):  
T. R. HUNTER ◽  
R. W. WILSON ◽  
R. KIMBERK ◽  
P. S. LEIKER ◽  
N. A. PATEL ◽  
...  

We describe the design and performance of the digital servo and motion control system for the 6-meter parabolic antennas of the Submillimeter Array (SMA) on Mauna Kea, Hawaii. The system is divided into three nested layers operating at a different, appropriate bandwidth. (1) A rack-mounted, real-time Unix system runs the position loop which reads the high resolution azimuth and elevation encoders and sends velocity and acceleration commands at 100 Hz to a custom-designed servo control board (SCB). (2) The microcontroller-based SCB reads the motor axis tachometers and implements the velocity loop by sending torque commands to the motor amplifiers at 558 Hz. (3) The motor amplifiers implement the torque loop by monitoring and sending current to the three-phase brushless drive motors at 20 kHz. The velocity loop uses a traditional proportional-integral-derivative (PID) control algorithm, while the position loop uses only a proportional term and implements a command shaper based on the Gauss error function. Calibration factors and software filters are applied to the tachometer feedback prior to the application of the servo gains in the torque computations. All of these parameters are remotely adjustable in the software. The three layers of the control system monitor each other and are capable of shutting down the system safely if a failure or anomaly occurs. The Unix system continuously relays the antenna status to the central observatory computer via reflective memory. In each antenna, a Palm Vx hand controller displays the complete system status and allows full local control of the drives in an intuitive touchscreen user interface. The hand controller can also be connected outside the cabin, a major convenience during the frequent reconfigurations of the interferometer. Excellent tracking performance (~ 0.3′′ rms) is achieved with this system. It has been in reliable operation on 8 antennas for over 10 years and has required minimal maintenance.


2013 ◽  
Vol 321-324 ◽  
pp. 2923-2926
Author(s):  
Shi Yu Huan

With the development of computer technology, people are no longer satisfied with a single operating system. More and more people like to use UNIX system because of its high reliability, good open, and powerful network features. The design of this telecommunications billing system is based on Browser / Server model using the java language for the UNIX platforms laboratory environment. The system can accurately time and automatically charge according to the business types when the user rents the server, and to complete information management of the server and user. This system is simple, friendly interface. It reduces operating costs of the telecommunications operators and improves productivity of them.


Sign in / Sign up

Export Citation Format

Share Document