This document describes a Firewall Log Status Reporter (SRr) tool developed using Perl that analyzes firewall logs and generates summary reports. SRr takes a flat text file as input, reads the file line by line, and stores the values in arrays. It generates four reports based on different attributes in the log: source addresses, destination addresses, service usage, and network interfaces. SRr provides flexibility to generate individual reports or all reports together. It uses modular programming with subroutines to generate each type of report. The reports display attributes like frequency and percentage of occurrences to help administrators analyze firewall activity and issues.
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
Big Data Security Analytic Solution using SplunkIJERA Editor
Over the past decade, usage of online applications is experiencing remarkable growth. One of the main reasons for the success of web application is its “Ease of Access” and availability on internet. The simplicity of the HTTP protocol makes it easy to steal and spoof identity. The business liability associated with protecting online information has increased significantly and this is an issue that must be addressed. According to SANSTop20, 2013 list the number one targeted server side vulnerability are Web Applications. So, this has made detecting and preventing attacks on web applications a top priority for IT companies. In this paper, a rational solution is brought to detect events on web application and provides Security intelligence, log management and extensible reporting by analyzing web server logs.
The cyber threat landscape is becoming more dangerous and challenging all the time. Here, you’ll find a practical, expert-crafted resource to help keep your enterprise secure and successful for the long-term. It’s our way to help you get informed -- and stay safe.
Protection API
-Transforms your existing devices into a complete APT solution
-Complements current network security
-Enhances perimeter defenses
This document provides an overview of the Apache Axis2 web services framework. It discusses the pre-Axis2 era, the motivation for Axis2's architecture, and its key features. These include a high-performance XML processing model, extensible messaging engine, pluggable modules, and easy deployment. Axis2 uses AXIOM for its XML object model and supports features like WS-Addressing, reliable messaging, and security. The document also outlines how Axis2 projects fit together and provides resources for using Axis2 in applications and learning more.
This document discusses Apache Storm, an open-source distributed real-time computation system. Storm allows for real-time stream processing of vast amounts of data. It is fault tolerant, flexible, reliable, and supports multiple programming languages. The document describes using Storm for real-time analysis of sensor data from the Internet of Things. It presents two approaches: REST-based and WebSocket-based. The REST approach uses a Spout to retrieve sensor data and a Bolt to process and classify the data using machine learning. The WebSocket approach uses a publisher-subscriber model with a broker to stream sensor data to a centralized controller for storage and analysis using Storm.
SureLog leverage automated behavioral profiling to automatically detect anomalies and autonomously define rules on the data, to discover security events that require investigation. Behavior analysis and profiling relies on statistical modeling and data science in SureLog in order to identify patterns of behavior and compare them against other human or machine activities. The Profiler is a feature extraction mechanism that can generate a profile describing the behavior of an entity. An entity might be an any field of message like protocol used in communication as well as a server, user, subnet or application. Once a profile has been generated defining what normal behavior looks-like, models can be built that identify anomalous behavior.
A SERIAL COMPUTING MODEL OF AGENT ENABLED MINING OF GLOBALLY STRONG ASSOCIATI...ijcsa
The intelligent agent based model is a popular approach in constructing Distributed Data Mining (DDM) systems to address scalable mining over large scale and ever increasing distributed data. In an agent based
distributed system, variety of agents coordinate and communicate with each other to perform the various
tasks of the Data Mining (DM) process. In this study a serial computing mode of a multi-agent system
(MAS) called Agent enabled Mining of Globally Strong Association Rules (AeMGSAR) is presented based
on the serial itinerary of the mobile agents. A Running environment is also designed for the implementation and performance study of AeMGSAR system.
This document discusses a report generation system using JasperReports and SQL stored procedures. JasperReports is an open-source reporting tool that can generate dynamic and reusable reports. Stored procedures are used to retrieve data from the database. The separation of report templates from report data in JasperReports allows for easier development and maintenance of reports. This reporting system integrated with Spring framework provides a Java environment and can generate dynamic reports to improve system reusability and maintainability.
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
Big Data Security Analytic Solution using SplunkIJERA Editor
Over the past decade, usage of online applications is experiencing remarkable growth. One of the main reasons for the success of web application is its “Ease of Access” and availability on internet. The simplicity of the HTTP protocol makes it easy to steal and spoof identity. The business liability associated with protecting online information has increased significantly and this is an issue that must be addressed. According to SANSTop20, 2013 list the number one targeted server side vulnerability are Web Applications. So, this has made detecting and preventing attacks on web applications a top priority for IT companies. In this paper, a rational solution is brought to detect events on web application and provides Security intelligence, log management and extensible reporting by analyzing web server logs.
The cyber threat landscape is becoming more dangerous and challenging all the time. Here, you’ll find a practical, expert-crafted resource to help keep your enterprise secure and successful for the long-term. It’s our way to help you get informed -- and stay safe.
Protection API
-Transforms your existing devices into a complete APT solution
-Complements current network security
-Enhances perimeter defenses
This document provides an overview of the Apache Axis2 web services framework. It discusses the pre-Axis2 era, the motivation for Axis2's architecture, and its key features. These include a high-performance XML processing model, extensible messaging engine, pluggable modules, and easy deployment. Axis2 uses AXIOM for its XML object model and supports features like WS-Addressing, reliable messaging, and security. The document also outlines how Axis2 projects fit together and provides resources for using Axis2 in applications and learning more.
This document discusses Apache Storm, an open-source distributed real-time computation system. Storm allows for real-time stream processing of vast amounts of data. It is fault tolerant, flexible, reliable, and supports multiple programming languages. The document describes using Storm for real-time analysis of sensor data from the Internet of Things. It presents two approaches: REST-based and WebSocket-based. The REST approach uses a Spout to retrieve sensor data and a Bolt to process and classify the data using machine learning. The WebSocket approach uses a publisher-subscriber model with a broker to stream sensor data to a centralized controller for storage and analysis using Storm.
SureLog leverage automated behavioral profiling to automatically detect anomalies and autonomously define rules on the data, to discover security events that require investigation. Behavior analysis and profiling relies on statistical modeling and data science in SureLog in order to identify patterns of behavior and compare them against other human or machine activities. The Profiler is a feature extraction mechanism that can generate a profile describing the behavior of an entity. An entity might be an any field of message like protocol used in communication as well as a server, user, subnet or application. Once a profile has been generated defining what normal behavior looks-like, models can be built that identify anomalous behavior.
A SERIAL COMPUTING MODEL OF AGENT ENABLED MINING OF GLOBALLY STRONG ASSOCIATI...ijcsa
The intelligent agent based model is a popular approach in constructing Distributed Data Mining (DDM) systems to address scalable mining over large scale and ever increasing distributed data. In an agent based
distributed system, variety of agents coordinate and communicate with each other to perform the various
tasks of the Data Mining (DM) process. In this study a serial computing mode of a multi-agent system
(MAS) called Agent enabled Mining of Globally Strong Association Rules (AeMGSAR) is presented based
on the serial itinerary of the mobile agents. A Running environment is also designed for the implementation and performance study of AeMGSAR system.
This document discusses a report generation system using JasperReports and SQL stored procedures. JasperReports is an open-source reporting tool that can generate dynamic and reusable reports. Stored procedures are used to retrieve data from the database. The separation of report templates from report data in JasperReports allows for easier development and maintenance of reports. This reporting system integrated with Spring framework provides a Java environment and can generate dynamic reports to improve system reusability and maintainability.
This document presents a study on using a custom-built Apriori algorithm for web mining and discovering frequent patterns in web log data. The key steps are: (1) preprocessing a 70MB web log file, (2) developing a custom Apriori algorithm that prunes candidate itemsets of size >2 and only considers transactions of size >=k, (3) identifying frequent patterns using the custom algorithm, (4) analyzing the discovered patterns, and (5) developing a software tool to implement the custom algorithm. Experiments show the custom algorithm takes less time than the classical Apriori algorithm. The study aims to efficiently mine useful knowledge from web data.
Storm is open source, robust, and user friendly. It could be utilized in small companies as well as large corporations.
Storm is fault tolerant, flexible, reliable, and supports any programming language.
Allows real-time stream processing.
Storm provides guaranteed data processing even if any of the connected nodes in the cluster die or messages are lost.
The document discusses AppArmor, a security framework that protects Linux systems and applications from external threats by enforcing good program behavior and access privileges. It can generate profiles for individual programs that define allowed system resources and privileges. Profiles include rules for filesystem access, capabilities, and network access. The document provides an example profile and discusses profile types, generation, and modes like enforce and complain that are used to test and implement profiles.
This is a presentation that identifies the various components of the 11i technology stack and how to generate log files for them for troubleshooting and debugging.
This document discusses file handling in C++. It begins by explaining the differences between main memory and secondary memory (files on storage devices). It then discusses C++ streams and the classes used for file input/output (ifstream, ofstream, fstream). The rest of the document covers various file operations like opening, closing, reading from and writing to files. It also discusses text files versus binary files and sequential versus random file access. File pointers and associated functions like seekg(), tellg(), seekp() and tellp() are explained for navigating within files. An example program demonstrates reading from one file and writing to another.
The document discusses file handling in C++. It explains that files are used to store data permanently on storage devices like hard disks, while variables are stored temporarily in memory. It then describes C++ streams and classes used for file input and output like ifstream, ofstream, and fstream. It also covers opening, closing, reading from and writing to files, as well as checking file pointers and seeking to different positions in a file.
This document discusses embedded systems and their applications. It begins with an introduction to embedded systems, their characteristics, and deciding factors. It then covers various aspects of embedded system development including the development cycle, operating systems, real-time operating systems, firmware development, system initialization, exceptions, design problems, and applications. Key concepts discussed include threads, scheduling, semaphores, mutexes, message queues, and event registers. Common embedded system applications mentioned include automotive, telecommunications, healthcare, entertainment, and industrial automation.
Schema-based multi-tenant architecture using Quarkus & Hibernate-ORM.pdfseo18
Architecture design is a must while developing a SaaS application to ensure its scalability and optimising infrastructure costs. In this blog, Lets discuss the implementation of one such architecture with Quarkus java framework and Hibernate ORM
Apache Eagle: Architecture Evolvement and New FeaturesHao Chen
Apache Eagle is a distributed real-time monitoring framework for Hadoop clusters. It analyzes data activities, applications, metrics, and logs to identify security breaches, performance issues, and provide insights. The architecture uses streaming ingestion of data, processing, alerting through complex event processing and machine learning, and storage and dashboards for insights. New features include support for additional data sources, applications for specific use cases, and evolving the architecture for improved scalability and flexibility.
The goal of this report is to focus on one particular aspect of malware: the Command & Control (aka C&C or C2C) infrastructure; in other words, the set of servers and other kind technical infrastructure used to control malware in general and, in particular, botnets. For this purpose, two malicious samples have been analyzed in this work, by means of state-of-the-art static and dynamic analysis tools, also described at high level in this report; the achieved goal was to understand their networking behaviour and to derive the techniques used by those to hide their malicious traffic to unaware users, with the goal of staying as long as possible in the system and keeping their malicious business going.
This document provides an overview of XML (eXtensible Markup Language). It discusses how XML is used to store structured data, compares XML to databases and HTML, and outlines the basic structure and syntax of XML documents. Key points covered include XML tags, elements, attributes, namespaces, parsing XML with PHP, and manipulating XML data using DOM and SimpleXML extensions.
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELSIJCNCJournal
We introduce a family of authenticated data structures — Ordered Merkle Trees (OMT) — and illustrate
their utility in security kernels for a wide variety of sub-systems. Specifically, the utility of two types of
OMTs: a) the index ordered merkle tree (IOMT) and b) the range ordered merkle tree (ROMT), are
investigated for their suitability in security kernels for various sub-systems of Border Gateway Protocol
(BGP), the Internet’s inter-autonomous system routing infrastructure. We outline simple generic security
kernel functions to maintain OMTs, and sub-system specific security kernel functionality for BGP subsystems
(like registries, autonomous system owners, and BGP speakers/routers), that take advantage of
OMTs.
The document provides an agenda for a MuleSoft meetup in Baltimore. It includes an introduction, a discussion on JSON logging and frameworks in MuleSoft, a demo, and a Q&A section. It also outlines a trivia/quiz with a prize for winners and seeks feedback on upcoming events. The meetup speaker is introduced and their experience shared.
The document discusses the structure and components of an Android application. It describes the AndroidManifest.xml file which contains configuration settings and metadata. It also describes resources like layouts, strings and images which are externalized. Alternative resources can be provided for different configurations like screen sizes or languages. The document outlines how to access resources in code and XML. It also discusses using assets to include external files like HTML pages and images that are not given a resource ID.
The document discusses system requirements specification and modeling techniques. It covers topics like requirements engineering tasks, system modeling using data flow diagrams and entity relationship diagrams, behavior modeling using state transition diagrams, and combining information flow and behavior using use cases. It also discusses the characteristics of a good software requirements specification based on the IEEE 830 standard, including expressing requirements through input/output specifications, representative examples, and models. The typical contents of a software requirements specification document are also outlined.
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET Journal
This document presents a key-policy attribute-based temporary keyword search scheme for secure cloud storage. It introduces a new cryptographic primitive called key-policy attribute-based temporary keyword search (KP-ABTKS) that allows authorized users to generate search tokens to search for ciphertexts encrypted within a specified time interval that contain a given keyword. The proposed scheme is constructed using bilinear pairing and is proven to be secure against selectively chosen keyword attacks under the decisional Diffie-Hellman assumption. It consists of five algorithms: setup, key generation, encryption, token generation, and search. The performance evaluation shows the scheme is practical in terms of computational complexity and execution time.
The document discusses a software development team called Team-9 at SoftCorp that is developing a mobile email client application. The team wants to develop an email client that supports multimedia emails to address a limitation in their competitor's product, and covers topics like identifying security requirements and vulnerabilities. The team finds issues in code fragments that could lead to security threats and proposes solutions to address them. Design patterns like thin client and protected process are identified that could enhance security for the product.
The document describes how ASP pages are displayed and processed. It involves the following steps:
1) The browser requests the file from the server.
2) The server searches for and retrieves the file from its hard drive. If there is ASP code, it is processed.
3) The server returns the file to the browser.
4) The browser interprets the ASP file and displays it.
This document describes CrowdSource, a system that uses natural language processing to infer high-level malware capabilities based on low-level strings extracted from malware binaries. It trains a machine learning model on millions of technical documents from StackExchange to map low-level strings to high-level capabilities. The system was evaluated on 1,457 malware samples and shown to detect 14 capabilities with an average F1-score of 0.86 and can analyze tens of thousands of samples per day.
This document presents a study on using a custom-built Apriori algorithm for web mining and discovering frequent patterns in web log data. The key steps are: (1) preprocessing a 70MB web log file, (2) developing a custom Apriori algorithm that prunes candidate itemsets of size >2 and only considers transactions of size >=k, (3) identifying frequent patterns using the custom algorithm, (4) analyzing the discovered patterns, and (5) developing a software tool to implement the custom algorithm. Experiments show the custom algorithm takes less time than the classical Apriori algorithm. The study aims to efficiently mine useful knowledge from web data.
Storm is open source, robust, and user friendly. It could be utilized in small companies as well as large corporations.
Storm is fault tolerant, flexible, reliable, and supports any programming language.
Allows real-time stream processing.
Storm provides guaranteed data processing even if any of the connected nodes in the cluster die or messages are lost.
The document discusses AppArmor, a security framework that protects Linux systems and applications from external threats by enforcing good program behavior and access privileges. It can generate profiles for individual programs that define allowed system resources and privileges. Profiles include rules for filesystem access, capabilities, and network access. The document provides an example profile and discusses profile types, generation, and modes like enforce and complain that are used to test and implement profiles.
This is a presentation that identifies the various components of the 11i technology stack and how to generate log files for them for troubleshooting and debugging.
This document discusses file handling in C++. It begins by explaining the differences between main memory and secondary memory (files on storage devices). It then discusses C++ streams and the classes used for file input/output (ifstream, ofstream, fstream). The rest of the document covers various file operations like opening, closing, reading from and writing to files. It also discusses text files versus binary files and sequential versus random file access. File pointers and associated functions like seekg(), tellg(), seekp() and tellp() are explained for navigating within files. An example program demonstrates reading from one file and writing to another.
The document discusses file handling in C++. It explains that files are used to store data permanently on storage devices like hard disks, while variables are stored temporarily in memory. It then describes C++ streams and classes used for file input and output like ifstream, ofstream, and fstream. It also covers opening, closing, reading from and writing to files, as well as checking file pointers and seeking to different positions in a file.
This document discusses embedded systems and their applications. It begins with an introduction to embedded systems, their characteristics, and deciding factors. It then covers various aspects of embedded system development including the development cycle, operating systems, real-time operating systems, firmware development, system initialization, exceptions, design problems, and applications. Key concepts discussed include threads, scheduling, semaphores, mutexes, message queues, and event registers. Common embedded system applications mentioned include automotive, telecommunications, healthcare, entertainment, and industrial automation.
Schema-based multi-tenant architecture using Quarkus & Hibernate-ORM.pdfseo18
Architecture design is a must while developing a SaaS application to ensure its scalability and optimising infrastructure costs. In this blog, Lets discuss the implementation of one such architecture with Quarkus java framework and Hibernate ORM
Apache Eagle: Architecture Evolvement and New FeaturesHao Chen
Apache Eagle is a distributed real-time monitoring framework for Hadoop clusters. It analyzes data activities, applications, metrics, and logs to identify security breaches, performance issues, and provide insights. The architecture uses streaming ingestion of data, processing, alerting through complex event processing and machine learning, and storage and dashboards for insights. New features include support for additional data sources, applications for specific use cases, and evolving the architecture for improved scalability and flexibility.
The goal of this report is to focus on one particular aspect of malware: the Command & Control (aka C&C or C2C) infrastructure; in other words, the set of servers and other kind technical infrastructure used to control malware in general and, in particular, botnets. For this purpose, two malicious samples have been analyzed in this work, by means of state-of-the-art static and dynamic analysis tools, also described at high level in this report; the achieved goal was to understand their networking behaviour and to derive the techniques used by those to hide their malicious traffic to unaware users, with the goal of staying as long as possible in the system and keeping their malicious business going.
This document provides an overview of XML (eXtensible Markup Language). It discusses how XML is used to store structured data, compares XML to databases and HTML, and outlines the basic structure and syntax of XML documents. Key points covered include XML tags, elements, attributes, namespaces, parsing XML with PHP, and manipulating XML data using DOM and SimpleXML extensions.
OMT: A DYNAMIC AUTHENTICATED DATA STRUCTURE FOR SECURITY KERNELSIJCNCJournal
We introduce a family of authenticated data structures — Ordered Merkle Trees (OMT) — and illustrate
their utility in security kernels for a wide variety of sub-systems. Specifically, the utility of two types of
OMTs: a) the index ordered merkle tree (IOMT) and b) the range ordered merkle tree (ROMT), are
investigated for their suitability in security kernels for various sub-systems of Border Gateway Protocol
(BGP), the Internet’s inter-autonomous system routing infrastructure. We outline simple generic security
kernel functions to maintain OMTs, and sub-system specific security kernel functionality for BGP subsystems
(like registries, autonomous system owners, and BGP speakers/routers), that take advantage of
OMTs.
The document provides an agenda for a MuleSoft meetup in Baltimore. It includes an introduction, a discussion on JSON logging and frameworks in MuleSoft, a demo, and a Q&A section. It also outlines a trivia/quiz with a prize for winners and seeks feedback on upcoming events. The meetup speaker is introduced and their experience shared.
The document discusses the structure and components of an Android application. It describes the AndroidManifest.xml file which contains configuration settings and metadata. It also describes resources like layouts, strings and images which are externalized. Alternative resources can be provided for different configurations like screen sizes or languages. The document outlines how to access resources in code and XML. It also discusses using assets to include external files like HTML pages and images that are not given a resource ID.
The document discusses system requirements specification and modeling techniques. It covers topics like requirements engineering tasks, system modeling using data flow diagrams and entity relationship diagrams, behavior modeling using state transition diagrams, and combining information flow and behavior using use cases. It also discusses the characteristics of a good software requirements specification based on the IEEE 830 standard, including expressing requirements through input/output specifications, representative examples, and models. The typical contents of a software requirements specification document are also outlined.
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET Journal
This document presents a key-policy attribute-based temporary keyword search scheme for secure cloud storage. It introduces a new cryptographic primitive called key-policy attribute-based temporary keyword search (KP-ABTKS) that allows authorized users to generate search tokens to search for ciphertexts encrypted within a specified time interval that contain a given keyword. The proposed scheme is constructed using bilinear pairing and is proven to be secure against selectively chosen keyword attacks under the decisional Diffie-Hellman assumption. It consists of five algorithms: setup, key generation, encryption, token generation, and search. The performance evaluation shows the scheme is practical in terms of computational complexity and execution time.
The document discusses a software development team called Team-9 at SoftCorp that is developing a mobile email client application. The team wants to develop an email client that supports multimedia emails to address a limitation in their competitor's product, and covers topics like identifying security requirements and vulnerabilities. The team finds issues in code fragments that could lead to security threats and proposes solutions to address them. Design patterns like thin client and protected process are identified that could enhance security for the product.
The document describes how ASP pages are displayed and processed. It involves the following steps:
1) The browser requests the file from the server.
2) The server searches for and retrieves the file from its hard drive. If there is ASP code, it is processed.
3) The server returns the file to the browser.
4) The browser interprets the ASP file and displays it.
This document describes CrowdSource, a system that uses natural language processing to infer high-level malware capabilities based on low-level strings extracted from malware binaries. It trains a machine learning model on millions of technical documents from StackExchange to map low-level strings to high-level capabilities. The system was evaluated on 1,457 malware samples and shown to detect 14 capabilities with an average F1-score of 0.86 and can analyze tens of thousands of samples per day.
Similar to On Generation of Firewall Log Status Reporter (SRr) Using Perl (20)
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
On Generation of Firewall Log Status Reporter (SRr) Using Perl
1. International Journal of Network Security & Its Applications (IJNSA), Vol 1, No 2, July 2009
On Generation of Firewall Log Status Reporter
(SRr) Using Perl
Sugam Sharma
1
, Hari Cohly
2
, and Tzusheng Pei
2
1
Department of Computer Science, Iowa State University, USA
sugam.k.sharma@gmail.com
2
Center for Bioinformatics, Jackson State University, USA
{hari.cohly, tzusheng.pei}@jsums.edu
ABSTRACT
Computer System Administration and Network Administration are few such areas where
Practical Extraction Reporting Language (Perl) has robust utilization these days apart from
Bioinformatics. The key role of a System/Network Administrator is to monitor log files. Log file are
updated every day. To scan the summary of large log files and to quickly determine if there is anything
wrong with the server or network we develop a Firewall Log Status Reporter (SRr). SRr helps to generate
the reports based on the parameters of interest. SRr provides the facility to admin to generate the
individual firewall report or all reports in one go. By scrutinizing the results of the reports admin can
trace how many times a particular request has been made from which source to which destination and
can track the errors easily. Perl scripts can be seen as the UNIX script replacement in future arena and
SRr is one development with the same hope that we can believe in. SRr is a generalized and customizable
utility completely written in Perl and may be used for text mining and data mining application in
Bioinformatics research and development too.
KEYWORDS
Perl, Sub, Html, Regexpr, File handler
1. INTRODUCTION
Practical Extraction Reporting Language (Perl) [1] has attained enormous popularity in
a very short duration in different computational areas such as Bioinformatics due to easy use of
its vast open source library available. Perl is not only helpful in Bioinformatics development but
also in core computer areas at the corporate level. Computer System/Network Administrator
generates lot of reports to get the status of different files available. More involvement is of log
files which are generated very frequently and tracking is utmost important to resolve the
involved issues. To scan the summary of large log files and to quickly determine if there is
anything wrong with the server or network, Firewall Log Status Reporter (SRr) helps to
generate the reports day to day basis based on the parameters of interest. SRr provides the
facility to administrators to generate the individual firewall report or all reports in one go.
SRr needs a flat text input file to operate on. The contents of the input file should be
separated by some kind of separator e.g. white space, comma, semicolon, full stop etc. SRr
reads the input file line by line and stores the contents of that line in an array. Subsequently the
contents of that array are stored in scalar variables for further use. SRr is a customized tool and
depending of one’s requirement can be modified. In our development we use a firewall log file
in textual format and one of its attributes is message type. This attribute is of our great interest
as we deal with log files in our operation and we collect only that data from input file whose
message type is log. Though there are many attributes a file consists of, but few of them are
attributes of interest, we consider for generating the status report. In our work we consider fours
90
2. International Journal of Network Security & Its Applications (IJNSA), Vol 1, No 2, July 2009
attributes src (source), dst(destination), service, and s_port as attributes of interest out of a big
bunch of attributes the firewall log input file contains. Based on these attributes we generate
four different reports, Source addresses report, Destination addresses report, Service usage
report, Network interface report. These reports can be generated individually or all at a time.
Generation of source addresses report by SRr is based on source attribute of input file.
All the source addresses in firewall log file under log message type are collected in an array. It
depends on individual’s requirement what kind of status report it needed and based on one’s
need the contents of that array are extracted and utilized. For our requirement we want to
display the status report which consists of the name of the source address, the frequency of
request made by this source, and the percentage of request made by this source. As log files are
pretty long and updated very frequently, there may be a possibility that a generated status report
has a long list of sources and difficult to analyze even after pagination. So to analyze the status
report efficiently we sort the generated report based on percentage the request made in
decreasing order.
SRr generates the destination addresses report using destination attribute of the input
file. All elements of destination attribute in log file under log message type are collected in
an array. SRr uses this array to generate the status report in the same way as we explain
above for source attribute.
Based on our requirement we use a composite attribute consisting of protocol and
service primitive attributes of input log file. SRr uses this composite attribute to generate the
status report. We extract those two primitive attributes individually from the input file and
combine them together and store in a user defined composite attribute. All elements of the
composite attributes are stored in a user defined composite array. This is the array where SRr
operates on to generate the status report in the same fashion as explained above for source
attribute. To generate the network interface status report SRr uses a user defined composite
attribute. The composite attribute is produced by the combination of interface name attribute,
interface directory attribute, and protocol attribute of input text file we use for our purpose. The
composite attribute is further classified based on inbound and outbound request factors of
interface _dir primitive attribute of input text file. The functioning of SRr on this attribute to
generate the report is similar to that stated above for source attribute. The rest of the paper is
organized as follows.
Section 2.0 is the design section. This section details about the major contents of the
tool and its working. Each subsection describes about individual content of the tool in detail.
Section 3.0 is the result section. Section 4.0 concludes the paper. The last section 5.0 is the
reference section.
2.0 DESIGN
Firewall Log Status Reporter has three major components. The very first and essential
component is the input file. The only restriction that has been imposed on input file is that it
should be a flat file in textual format. The contents of the file should be separated by some kind
of separator such as white space, comma, semicolon, full stop etc. SRr opens the input file using
a file hander
(open ALLREPORTS, "<$prc_file" || die "Could not open file for reading.n" )
and reads the opened file one line at time. During the reading of a line, SRr splits the line
contents and stores the values in an array. In Perl split is the function which helps in splitting
(my@cur_line = split /;/, $). According to the Perl documentation if there is no explicit
declaration of an array, @_ is the default array which stores the values and $_ is the default
variable which stores a scalar value.
The next step is to assign the array values to different variables for further use. We use shift
function [2] to serve this purpose. The use of shift function very first time on an array moves
the very first element of that array to the left hand side variable. The use of next consecutive
91
3. International Journal of Network Security & Its Applications (IJNSA), Vol 1, No 2, July 2009
shift function moves the second element of the array to the left hand side scalar variable. Like
wise we proceed and store all the array elements to the different scalar variables for further
operation.
SRr is a customized tool and in our development we collect only those lines in which
the message type attribute is log ($type_of_message eq "log”). In most of the cases the type
of message is log but depending on individual’s interest the type of collection can vary.
It is recommended that each status report should contain the date the report has been
generated on. For that we use an external date module which generates the current date and
associate that with the header of the report generated.
my @day_name = ("Sun", "Mon", "Tue", "Wed", "Thu", "Fri", "Sat");
my @month_name = ("January", "February", "March", "April", "May", "June", "July",
"August", "Sept", "October", "November", "December");
my ($sec, $min, $hour, $mday, $mon, $year, $wday); ($sec, $min, $hour, $mday,
$mon, $year, $wday, undef, undef)=localtime(time()); $year+=1900;$mon++;
$report_date=sprintf("%s %s %s
%02d:%02d:%02d",$day_name[$wday],$month_name[$mon], $year, $hour, $min, $sec);
print LOGREPORTS "Report generated on:$report_date n".
In this above code snippet LOGREPORTS is the output handler which writes the data in
user defined output file.
There are numerous attributes in the text file that has been read. It depends on the
individual’s interest and requirement which attributes are used as attribute of interest to
generate the status report. In our work we consider four attributes in input text file of our
interest and generate the status reports based on them. These attributes are src (source),
dst(destination), service, and s_port. Based on these attributes we generate four different
reports. We provide a flexibility to generate a single status report as a whole consisting of all
individual reports. As mentioned earlier, we use modular programming in SRr development.
Corresponds to each individual report a subroutine has been defined. Each subroutine
governs the functioning of status report generation for SRr against one parameter of interest.
2.1 SOURCE_ADDRESSES_REPORT
This section describes the functioning of the SRr to generate the status report based on
source attribute of input file. In the following block of code @src_array is a filled array
consisting of the source elements of log type messages of input file. We traverse the array in
foreach loop. Though it depends on individual’s requirement what kind of status report it needs.
For our requirement we want to display the status report which consists of the name of the
source address, the frequency of request made by this source, and the percentage of request
made by this source. There may be several sources which attempt to enter the network and
succeed. As the larger percentage of occurrence contributes more significantly in analysis of
status report so we sort the report based on percentage in decreasing order in report display. In
the following segment of code
for (@src_array) { $r++ if /$item/i;
}
is responsible for the calculation of frequency of occurrence of request from a specific source
in a network. The fraction in following block sorts the array in decreasing order.
sub Source_Addresses_report{ foreach $item (@src_array)
{
for (@src_array) { $r++ if /$item/i;
}
$percent = sprintf("%.2f", ($r/$count)*100); $item_1 = substr $item, 0, 16;
92
4. International Journal of Network Security & Its Applications (IJNSA), Vol 1, No 2, July 2009
$string = $percent." ".$item_1." t".$r." t".$percent."%" ; if ( !grep( /
$string/,@string_array ) ) { $max_report_entries++;
push(@string_array,$string);
}
$r=0;
}
foreach $item_sort ( reverse sort @string_array)
{
$item_sort_sub = substr $item_sort, 5;
print LOGREPORTS " $item_sort_sub n"; $max_report_entries_1++;
}
print LOGREPORTS "n<------------------Top $max_report_entries_1 of $max_report_entries
Entries----------
-->nn"; $max_report_entries=0; $max_report_entries_1=0; }
2.2 DESTINATION_ADDRESSES_REPORT
This section describes the functioning of the SRr to generate the status report based
on destination attribute of input file. In the following block of code @dest_array is a filled
array consisting of the source elements of log type messages of input file. The description of
the code in this section is resembled to that of Source_Addresses_report section except that
we use @dest_array. If this block of code is chosen to generate the status report, the
generated report will display the name of destination, the frequency of request sent to this
destination, the percentage of occurrence of request to this destination.
sub Destination_Addresses_report{ foreach $item (@dest_array)
......................
……………..
……………..
To avoid the redundancy of code, we replace the duplicate code by dotted line in the above
code block for writing purpose.
2.3 SERVICE_USAGE_REPORT
This section describes the functioning of SRr to generate the status report based on
protocol (proto) attribute and service attributes of input file. In the following block of code
@protocol_service is a filled array consisting of $proto_service. $proto_service is the
composite attribute of protocol and service attributes ("$protocol"."__"."$service") of log
type messages of input file. The status report generated by this section displays the name of
the protocol combined with service used by it, the frequency of the usages of the service, and
the percentage of usage of the service. This report helps the System/Network administrator to
analyze the protocol used and the service used by it.
sub Service_Usage_report{ foreach $item (@protocol_service)
……………
……………
……………
93
5. International Journal of Network Security & Its Applications (IJNSA), Vol 1, No 2, July 2009
2.4 NETWORK_INTERFACE_REPORT
This section describes the functioning of SRr to generate status report based on
interface name attribute, interface directory attribute and protocol attribute of input text file.
@intf_array is an array filled by $intf_name_dir composite attribute of log type message of
input file. $intf_name_dir attribute consists of $originate_devices, $interface_name, and
$interface_dir concrete attributes of input text file. The status report generated in this section
displays the composite attribute name, frequency of involvement of the interface, percentage.
Inbound and outbound are two main factors of interface _dir primitive attribute. Based on the
report generated System/Network administrator can analyze the origin of request, interface
associated and whether the request is inbound or outbound.
sub Network_Interface_report{ foreach $item (@intf_array)
......................
……………..
……………..
2.5 ALL_REPORTS
This section is important when the administrator is keen to display all status reports in
one go. When this segment of code is encountered in processing, the status reports are started to
be generated one by one. We try to implement modular programming where ever possible. In
this section under the subroutine All_reports, we call different subroutines. Each subroutine
represents a module.
This section is important to consider if administrator wants a quick look on all reports to
analyze.
sub All_reports{ Source_Addresses_report(); print".n";
Destination_Addresses_report();print".n"; Service_Usage_report();print".n";
Network_Interface_report();print"n";
}
2.6 HELP_SCREEN
This section is the help section. SRr requires a command line argument to select a type
of status report to be generated. This is user’s responsibility to supply that command line
argument based on her/his requirement. In the following code snippet we provide six options
available for user. We provide a helping hand to the user, if a user misses to supply the
command line argument, the help screen will be displayed always.
sub Help_Screen{
print" You need to pass command line argument: Following options are available nn".
"s - Create the Source Addresses reportn".
"d - Create the Destination Address reportn".
"u - Create the Service Usage reportn".
"i - Create the Network Interface reportn".
"a - Create all reportsn".
"h - Display the help screen";
}
We use switch statement to switch to different section based on the command line input
94
6. International Journal of Network Security & Its Applications (IJNSA), Vol 1, No 2, July 2009
supplied. The below code segment is self explanatory.
switch ($ARGV[0]) {
case "s" { Source_Addresses_report()}
case "d" { Destination_Addresses_report()}
case "u" { Service_Usage_report()}
case "i" { Network_Interface_report()}
case "a" { All_reports()}
case "h" { Help_Screen()}
else { Help_Screen()}
}
3.0 RESULTS
3.1 Input file snippet
In this section we show the curtailed sample input text file we use for our development.
The first line is the attribute name and rest of the lines represents the values of these attributes.
num;date;time;orig;type;action;alert;i/f_name;i/f_dir;proto;src;d t;service;s_port;len;rule;icmp-
type;icmp-code;h_len;ip_vers;sys_msgs
1;20Oct2006;17:30:36;192.1.28.3;control;ctl;;daemon;inbound;;;;;;;;;;;;started sending log to
localhost
2;3Nov2006;13:13:53;192.1.28.3;control;ctl;;daemon;inbound;;;;;;;;;;;;started sending log to
localhost
3;3Nov2006;13:52:59;fwfoomain01.foo.com;control;ctl;;daemo n;inbound;;;;;;;;;;;;started
sending log to localhost
4;3Nov2006;14:11:40;fwfoomain01.foo.com;control;ctl;;daemo n;inbound;;;;;;;;;;;;started
sending log to localhost
5;3Nov2006;14:17:59;fwfoomain01-2;control;ctl;;daemon;inbound;;;;;;;;;;;;started sending
log to localhost
6;4Nov2006; 8:42:14;fwfoomain01.foo.com;control;ctl;;daemon;inbound;;;;;;
;;;;;;started sending log to localhost
17;17Nov2006;14:02:59;fwfoomain01.foo.com;control;ctl;;dae mon;inbound;;;;;;;;;;;;started
sending log to localhost
18;17Nov2006;14:03:01;fwfoomain01.foo.com;control;ctl;;lo0;i nbound;;;;;;;;;;;;installed
Standard
19;17Nov2006;14:10:24;fwfoomain01.foo.com;control;ctl;;lo0;i nbound;;;;;;;;;;;;installed
EDT
20;17Nov2006;14:10:43;fwfoomain01.foo.com;log;drop;;hme0;
inbound;tcp;gwt.lab.foo.com;corelinkmain01.foo.com;45;22619 ;44;3;;;;;
21;17Nov2006;14:10:58;fwfoogw02.foo.com;log;accept;;hme1;
inbound;udp;corelinkmain01.foo.com;ns4.foo.net.nz;ntp-udp;ntp-udp;76;2;;;;;
3.2 Figures
Figure 1 shows the help screen options available. If a user forgets to supply or a naïve
user who does not have any guess about the option available to run SRr, then instead of
throwing an error a message is displayed instructing the user to supply a command line input
out of available options. In figure 2 the status report generated by SRr against source attribute
is displayed. Figure 3 shows the status report generated by SRr against destination attribute.
Figure 4 shows the generated status report against service attribute. Figure 5 shows the
generated status report against the user defined composite attribute consisting of primitive
attribute interface_name, interface_directory. Figures 6 depict the progress of status report
generation and figure 7 shows the status report generated as a whole.
95
7. International Journal of Network Security & Its Applications (IJNSA), Vol 1, No 2, July 2009
Figure 1. Help Screen Display
Figure 2. Status report generated for source attribute
96
8. International Journal of Network Security & Its Applications (IJNSA), Vol 1, No 2, July 2009
Figure 3. Status report generated for destination attribute
Figure 4. Status report generated for service attribute
97
9. International Journal of Network Security & Its Applications (IJNSA), Vol 1, No 2, July 2009
Figure 5. Status report generated for network interface attribute
Figure 6. Screen shot showing the progress of report generation
98
10. International Journal of Network Security & Its Applications (IJNSA), Vol 1, No 2, July 2009
Figure 6. Screen shot showing all status report as a whole
4. CONCLUSION
There are six reports generated using SRr in this research paper. The functioning of
SRr is not confined till here. SRr is a customizable tool and can be applied to other
applications as well where one reads an input file. The only requirement to use SRr is the
input file in textual format. The use of Perl in Computer Science application is gaining
immense popularity rapidly and our work is one more milestone in the same arena. We have
developed SRr primarily considering System/ Network/ Database administrator’s role in
view. SRr provides direct benefits to those guys who read input file in textual format and
want to play with that as per their requirement. Our work is among very few research works
where Perl provides helping hand in System/Network/Database administration. We believe
that our work will help communities, academia and industry and prove itself as life saver.
REFERENCE
[1]. www.cpan.org
[2]. Sugam Sharma, Tzusheng Pei, and HHP Cohly, Raphael Isokpehi, and N
Meghanathan(2007), “To Access PubMed Database to Extract Articles Using Perl_Su,”
International Journal of Computer Science and Network Security (IJCSNS).
99