期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Web Threats Detection and Prevention Framework
1
作者 Osama M. Rababah Ahmad K. Al Hwaitat +2 位作者 Saher Al Manaseer hussam n. fakhouri Rula Halaseh 《Communications and Network》 2016年第3期170-178,共9页
The rapid advancement in technology and the increased number of web applications with very short turnaround time caused an increased need for protection from vulnerabilities that grew due to decision makers overlookin... The rapid advancement in technology and the increased number of web applications with very short turnaround time caused an increased need for protection from vulnerabilities that grew due to decision makers overlooking the need to be protected from attackers or software developers lacking the skills and experience in writing secure code. Structured Query Language (SQL) Injection, cross-site scripting (XSS), Distributed Denial of service (DDos) and suspicious user behaviour are some of the common types of vulnerabilities in web applications by which the attacker can disclose the web application sensitive information such as credit card numbers and other confidential information. This paper proposes a framework for the detection and prevention of web threats (WTDPF) which is based on preventing the attacker from gaining access to confidential data by studying his behavior during the action of attack and taking preventive measures to reduce the risks of the attack and as well reduce the consequences of such malicious action. The framework consists of phases which begin with the input checking phase, signature based action component phase, alert and response phases. Additionally, the framework has a logging functionality to store and keep track of any action taking place and as well preserving information about the attacker IP address, date and time of the attack, type of the attack, and the mechanism the attacker used. Moreover, we provide experimental results for different kinds of attacks, and we illustrate the success of the proposed framework for dealing with and preventing malicious actions. 展开更多
关键词 SQL Injection XSS DDoS Attack Suspicious User Behavior Web Applications
下载PDF
A Survey about Self-Healing Systems (Desktop and Web Application) 被引量:1
2
作者 Amjad A. Hudaib hussam n. fakhouri +1 位作者 Fatima Eid Al Adwan Sandi n. fakhouri 《Communications and Network》 2017年第1期71-88,共18页
The complexity of computer architectures, software, web applications, and its large spread worldwide using the internet and the rapid increase in the number of users in companion with the increase of maintenance cost ... The complexity of computer architectures, software, web applications, and its large spread worldwide using the internet and the rapid increase in the number of users in companion with the increase of maintenance cost are all factors guided many researchers to develop software, web applications and systems that have the ability of self-healing. The aim of the self healing software feature is to fast recover the application and keep it running and available for 24/7 as optimal as possible. This survey provides an overview of self-healing software and system that is especially useful in all of those situations in which the involvement of humans is costly and hard to recover and needs to be automated with self healing. There are different aspects which will make us understand the different benefits of these self-healing systems. Finally, the approaches, techniques, mechanisms and individual characteristics of self healing are classified in different tables and then summarized. 展开更多
关键词 COMPUTER Architecture SELF-HEALING Systems SELF-HEALING PRINCIPLES Software SELF-HEALING Web-Self-Healing
下载PDF
An Automated Approach for Software Fault Detection and Recovery 被引量:2
3
作者 Amjad A. Hudaib hussam n. fakhouri 《Communications and Network》 2016年第3期158-169,共12页
Autonomic software recovery enables software to automatically detect and recover software faults. This feature makes the software to run more efficiently, actively, and reduces the maintenance time and cost. This pape... Autonomic software recovery enables software to automatically detect and recover software faults. This feature makes the software to run more efficiently, actively, and reduces the maintenance time and cost. This paper proposes an automated approach for Software Fault Detection and Recovery (SFDR). The SFDR detects the cases if a fault occurs with software components such as component deletion, replacement or modification, and recovers the component to enable the software to continue its intended operation. The SFDR is analyzed and implemented in parallel as a standalone software at the design phase of the target software. The practical applicability of the proposed approach has been tested by implementing an application demonstrating the performance and effectiveness of the SFDR. The experimental results and the comparisons with other works show the effectiveness of the proposed approach. 展开更多
关键词 Software Engineering Autonomic Software Systems Automatic Recovery Automatic Diagnosis Auto Restore
下载PDF
CACS: Cloud Environment Autonomic Computing System
4
作者 Rizik M. H. Al-Sayyed hussam n. fakhouri +1 位作者 Sharefa F. Murad Sandi n. fakhouri 《Journal of Software Engineering and Applications》 2017年第3期273-287,共15页
This work proposes the adoption of Autonomic Computing System (ACS) in Cloud environment. ACS was first introduced by IBM to create systems capable of managing automatic self-configuration, self-healing, self-optimiza... This work proposes the adoption of Autonomic Computing System (ACS) in Cloud environment. ACS was first introduced by IBM to create systems capable of managing automatic self-configuration, self-healing, self-optimization and self-protection. These systems detect errors that cause failure, and then recover and reconfigure itself. The concept is wildly adapted by many software applications that have many restoring and recovery functionality such as operating systems (e.g. Windows Server 2012). This paper proposes a cloud ACS (CACS) for cloud computing environment that monitors, diagnoses, checks and heals cloud applications automatically and immediately with almost unnoticeable recovery time. In order to evaluate CACS, an application has been developed and applied for real time cloud applications. The results of different experiments scenarios demonstrate the ability of adopting the proposed system to heal well cloud applications. CACS is also compared with Windows Server 2012 operating system in terms of healing ability, speed, cost, methodology and other informative information. CACS showed domination in almost all of these properties. 展开更多
关键词 CLOUD APPLICATIONS SELF-HEALING Auto-Restoring Auto-Backup
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部