volume-03
Latest Articles
Configuring Snort as a Firewall on Windows 7 Environment
JUSPN, volume-03 , Issue 2 (2011), PP 73 - 77
Published: 27 Aug 2011
DOI: 10.5383/JUSPN.03.02.006
by Moath Hashim Alsafasfeh, Abdel Ilah Noor Alshbatat from National University of Malaysia, Selengor, Malaysia. Tafila Technical University, Tafila, Jordan, 66110.
Abstract: Nowadays, computer networks play an important role in our daily live, and the widely use of computer networks are for accessing the internet. The network administrator has a full ability to control all access types to network, and tasked to allow or discard some of the connections. By using Snort Intrusion Detection System (IDS), the network administrator can monitor network access from the sender to the receiver. Snort is one of the IDS, and it is difficult to configure it with closed source operating systems for the purpose of accessing and terminating connections. Moreover, it needs more requirements to work with windows operating system. Snort is compatible with open source operating systems such as Linux but there is a need to configure it with closed source operating systems such as windows operating system. In this paper, Snort is configured with windows 7 operating system so that it will work as a firewall to monitor and terminate connections. This configuration is successfully achieved by identifying new rules in snort package. Using snort IDS, network administrator is able to monitor, allow, and block any accessing to the web with the ability to get alerts containing information related to the connection such as IP address and port numbers. Moreover, a Graphical User Interface (GUI) has been developed to allow end user to configure new snort rules with a user friendly interface depending on snort user requirements. The results indicate that the Snort can be configured with Windows 7 by creating new snort rules to monitor network traffic and terminate connection between two entities. In addition, they show how a GUI allows snort user to create new rules based on him/her requirements. read more... read less...
Keywords: Intrusion Detection System, Intrusion Prevention System, Snort, Monitoring, and Blocking.
Implementation of Decoders for LTE Interface Messages
JUSPN, volume-03 , Issue 2 (2011), PP 55 - 58
Published: 27 Aug 2011
DOI: 10.5383/JUSPN.03.02.003
by Manjula M, G. Varaprasad from Department of Computer Science and Engineering, B.M.S.College of Engineering, Bangalore560 019, India.
Abstract: Long-term evolution is the next-generation network beyond 3G. In order to initiatively imitate and improve network performance, by research and analysis of signaling message which is transmitted in the LTE network architecture, a decoder module is needed. In this paper, the decoding modules for decoding S3, S4, S5/S8, S10 and S11 interfaces, which use GTPv2 protocol to transmit the messages between the various entities such as SGSN – MME, SGSN - SGW, SGW - PGW, MME – MME, MME - SGW and MME – EIR, respectively are explained. Further, in LTE architecture, there is another interface S1MME which uses S1AP protocol between the eNB and MME entities; in similar way interfaces S13(MME to EIR), S6a (MME to HSS), Gx (PCRF to PCEF), and SGi (between PGW & PDN) which uses diameter protocol, need to be decoded. Hence, to incorporate the decoding of message fields of above said interfaces in the proposed system, the existing Alcatel-Lucent framework LTEPA is enhanced as the project work. read more... read less...
Keywords: LTE; GTPv2; Diameter; S1ap;
PISC: A Portable Interactive Surface Computer
JUSPN, volume-03 , Issue 2 (2011), PP 41 - 46
Published: 28 Aug 2011
DOI: 10.5383/JUSPN.03.02.001
by Sherenaz Al-Haj Baddar, Naser Al Madi from Department of Computer Science, University of Jordan, Amman, Jordan, 11942
Abstract: We describe a Portable Interactive Surface Computer(PISC) which utilizes a customized pointing device. PISC is a full-fledged portable computer that presents an appealing user experience at a significantly low cost. This surface computer is the first of its kind that features automatic switching between two projection modes: horizontal(i.e. table mode) and vertical(i.e. wall mode). Using this surface computer, users can interact with any digital content like: movies; web pages; and any conventional computer software. PISC also features a Graphical User Interface(GUI) that provides a set of custom-tailored applications mainly oriented towards multimedia and web services. This computer’s software is designed so as to smoothly integrate with distributed systems. Here we introduce the PISC model and describe a PISC prototype that we implemented. read more... read less...
Keywords: Surface Computing, Human Computer Interaction, User Experience, Ubiquitous Computing.
Trigger-based Intelligent Controller for Distributed SCADA Systems
JUSPN, volume-03 , Issue 1 (2011), PP 19 - 22
Published: 27 Aug 2011
DOI: 10.5383/JUSPN.03.01.004
by Majdi Khalel, Ahmad Aljaafreh from Tafila Technical University, Tafila, Jordan, 66110
Abstract: In this paper, we take advantage of the power of database-triggers in industrial field to build a trigger-based Intelligent Controller for Distributed SCADA Systems to provide fast response and intelligent system. In addition to utilizing HTTP protocol as a communications infrastructure to exchange data between distributed stations and main servers. The system provides monitoring solution compatible with Personal computers, Phones, PDA's. This paper discusses a new Web Distributed SCADA approach that matches contemporary needs and requirements using open and proven database triggers technology. It completely eliminates many of the existing concerns and costs associated with IP technology. This paper proposes a new solution for world-wide remote industrial control and monitoring. This solution is cost-less, efficient, and highly fast. This new solution provides a smart controller using a neuro-fuzzy algorithm. This solution provides interoperability with industrial related applications such as supervisory control and data acquisition (SCADA) systems. This system uses the power of the database triggers and the flexibility of HTTP protocol as a communications infrastructure. It also uses normal web-hosting service that supports MySQL database and server-based scripting language such as PHP. A database trigger is generated by an interpreter based on conditions set by an administrator. Multiple mirror servers are used as redundant servers and one core server. read more... read less...
Keywords: Distributed SCADA, Web SCADA, Intelligent Web Controller.
An Automated System for Irrigation and Frost Protection
JUSPN, volume-03 , Issue 1 (2011), PP 13 - 17
Published: 25 Aug 2011
DOI: 10.5383/JUSPN.03.01.003
by Mohammad Alzorgana, Abdel Rahman Alzorgan, Ahmad Aljaafreh from Electrical Engineering Department, Tafila Technical University, Tafila, Jordan, 66110 Electrical Engineering Department, Tafila Technical University, Tafila, Jordan, 66110 Electrical Engineering Department, Tafila Technical University, Tafila, Jordan, 66110
Abstract: This paper describes details of the design and instrumentation of an automated system for irrigation and frost protection, comprising a soil moisture sensor and a temperature sensor, two water tanks wherein one of them is connected to a heating system, two water level sensors; one in each tank, a pump with automated switching system, two solenoid valves between the pump and each of the tanks, a control unit, an array of sprinklers and at least one solenoid valve between the pump and the sprinklers. The system is also provided with means for emitting acoustical and visual alarms. read more... read less...
Keywords: Automation, Irrigation, Frost protection.
Signal-Layer Security and Trust-Boundary Identification based on Hardware-Software Interface Definition
JUSPN, volume-03 , Issue 1 (2011), PP 00 - 00
Published: 09 Jan 2018
DOI: 10.5383/JUSPN.03.01.000
by Georg MACHER, Harald SPORER, Eugen BRENNER, Christian KREINER from AVL List GmbH, Graz, AUSTRIA, 8010 TÜV Austria, Vienna, AUSTRIA, 1010 Graz University of Technology, Graz, AUSTRIA, 8010
Abstract: An important trend in the automotive domain is to adapt established functional safety processes and methods for security engineering. Although functional safety and cyber-security engineering have a considerable overlap, the trend of adapting methods from one domain to the other is often challenged by non-domain experts. Just as safety became a critical part of the development in the late 20th century, modern vehicles are now required to become resilient against cyber-attacks. As vehicle providers gear up for this challenge, they can capitalize on experiences from many other domains, but must also face several unique challenges. Such as, that cyber-security engineering will now join reliability and safety as a cornerstone for success in the automotive industry and approaches need to be integrated into the mainly safety oriented development lifecycle of the domain. The recently released SAE J3061 guidebook for cyber-physical vehicle systems focus on designing cyber-security aware systems in close relation to the automotive safety standard ISO 26262. The key contribution of this paper is to analyse a method to identify attack vectors on complex automotive systems via signal interfaces and propose a security classification scheme and protection mechanisms on signal layer. To that aim, the hardware-software interface (HSI), a central development artefact of the ISO 26262 functional safety development process, is used and extended to support the cyber-security engineering process and provide cyber-security countermeasures on signal layer. read more... read less...
Keywords: ISO26262, SAE J3061, automotive systems, hardware-software interfaces, cyber-security, functional safety