NETWORK DEFENSE SYSTEM MONITORING THROUGH A MOBILE APPLICATION

Lalu Muhammad Aryandi Azrin, Abdul Ghofir

Abstract


paper proposed a way to secure and protect pc or laptop remotely via mobile device. These two device communicate by exchanging information or data using database connection. There will be two applications that are developed, windows-based application and mobile application. The proposed scheme used some firewall configuration and log management to complete the process. The firewall configuration will block computer attacks such as Denial of Service. Log management is to generate a specific log file if there is a possible threat. It will then invoke. the windows application to update the database which is regularly accessed by mobile application. It then alerts user on possible attack or threat.

Full Text:

PDF

References


Khaled M. Elleithy, "Denial of Service Attack Techniques: Analysis, Implementation and Comparison". SYSTEMICS, CYBERNETICS AND INFORMATICS, VOLUME 3 - NUMBER 1

Qijun Gu, PhD., Peng Liu, PhD. , “Denial of Service Attacks”

Mohammad Imran, Dr.AbdulrahmanA.Algamdi, Bilal Ahmad, “Role of firewall Technology in Network Security” International Journal of Innovations & Advancement in Computer




DOI: http://dx.doi.org/10.33021/itfs.v4i2.1185

Refbacks

  • There are currently no refbacks.


Copyright (c) 2020 IT for Society

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


All articles in this journal are indexed in:

  


 Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.