NETWORK DEFENSE SYSTEM MONITORING THROUGH A MOBILE APPLICATION
Abstract
paper proposed a way to secure and protect pc or laptop remotely via mobile device. These two device communicate by exchanging information or data using database connection. There will be two applications that are developed, windows-based application and mobile application. The proposed scheme used some firewall configuration and log management to complete the process. The firewall configuration will block computer attacks such as Denial of Service. Log management is to generate a specific log file if there is a possible threat. It will then invoke. the windows application to update the database which is regularly accessed by mobile application. It then alerts user on possible attack or threat.
Full Text:
PDFReferences
Khaled M. Elleithy, "Denial of Service Attack Techniques: Analysis, Implementation and Comparison". SYSTEMICS, CYBERNETICS AND INFORMATICS, VOLUME 3 - NUMBER 1
Qijun Gu, PhD., Peng Liu, PhD. , “Denial of Service Attacks”
Mohammad Imran, Dr.AbdulrahmanA.Algamdi, Bilal Ahmad, “Role of firewall Technology in Network Security” International Journal of Innovations & Advancement in Computer
DOI: http://dx.doi.org/10.33021/itfs.v4i2.1185
Refbacks
- There are currently no refbacks.
Copyright (c) 2020 IT for Society
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
All articles in this journal are indexed in:
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.