Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

828 Full-Text Articles 987 Authors 640,886 Downloads 98 Institutions

All Articles in Systems Architecture

Faceted Search

828 full-text articles. Page 1 of 28.

Automated Extraction Of Key Words And Abstract, Oluwadarasimi Temitope Ogunshote Mr. 2021 Western University

Automated Extraction Of Key Words And Abstract, Oluwadarasimi Temitope Ogunshote Mr.

Undergraduate Student Research Internships Conference

An application/program that automates the extraction of key words and abstracts from documents.


Interdomain Route Leak Mitigation: A Pragmatic Approach, Benjamin Tyler McDaniel 2021 University of Tennessee, Knoxville

Interdomain Route Leak Mitigation: A Pragmatic Approach, Benjamin Tyler Mcdaniel

Doctoral Dissertations

The Internet has grown to support many vital functions, but it is not administered by any central authority. Rather, the many smaller networks that make up the Internet - called Autonomous Systems (ASes) - independently manage their own distinct host address space and routing policy. Routers at the borders between ASes exchange information about how to reach remote IP prefixes with neighboring networks over the control plane with the Border Gateway Protocol (BGP). This inter-AS communication connects hosts across AS boundaries to build the illusion of one large, unified global network - the Internet. Unfortunately, BGP is a dated protocol that allows ASes ...


Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, Igor Korkin 2021 Independent Researcher

Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, Igor Korkin

Journal of Digital Forensics, Security and Law

The security of a computer system depends on OS kernel protection. It is crucial to reveal and inspect new attacks on kernel data, as these are used by hackers. The purpose of this paper is to continue research into attacks on dynamically allocated data in the Windows OS kernel and demonstrate the capacity of MemoryRanger to prevent these attacks. This paper discusses three new hijacking attacks on kernel data, which are based on bypassing OS security mechanisms. The first two hijacking attacks result in illegal access to files open in exclusive access. The third attack escalates process privileges, without applying ...


Witness For Two-Site Enabled Coordination, Sriram Priyatham Siram 2021 San Jose State University

Witness For Two-Site Enabled Coordination, Sriram Priyatham Siram

Master's Projects

Many replicated data services utilize majority quorums to safely replicate data changes in the presence of server failures. Majority quorum-based services require a simple majority of the servers to be operational for the service to stay available. A key limitation of the majority quorum is that if a service is composed of just two servers, progress cannot be made even if a single server fails because the majority quorum size is also two. This is called the Two-Server problem. A problem similar to the Two-Server problem occurs when a service’s servers are spread across only two failure domains. Servers ...


Machine Learning Using Serverless Computing, Vidish Naik 2021 San Jose State University

Machine Learning Using Serverless Computing, Vidish Naik

Master's Projects

Machine learning has been trending in the domain of computer science for quite some time. Newer and newer models and techniques are being developed every day. The adoption of cloud computing has only expedited the process of training machine learning. With its variety of services, cloud computing provides many options for training machine learning models. Leveraging these services is up to the user. Serverless computing is an important service offered by cloud service providers. It is useful for short tasks that are event-driven or periodic. Machine learning training can be divided into short tasks or batches to take advantage of ...


Introduction To Assembly Language Programming: From Soup To Nuts: Arm Edition, Charles W. Kann 2021 Gettysburg College

Introduction To Assembly Language Programming: From Soup To Nuts: Arm Edition, Charles W. Kann

Open Textbooks

This is an ARM Assembly Language Textbook designed to be used in classes such as Computer Organization, Operating Systems, Compilers, or any other class that needs to provide the students with a overall of Arm Assembly Language. As with all Soup to Nuts books, it is intended to be a resource where each chapter builds on the material from previous chapters, and leads the reader from a rudimentary knowledge of assembly language to a point where they can use it in their studies.


Analysis Of Theoretical And Applied Machine Learning Models For Network Intrusion Detection, Jonah Baron 2021 Dakota State University

Analysis Of Theoretical And Applied Machine Learning Models For Network Intrusion Detection, Jonah Baron

Masters Theses & Doctoral Dissertations

Network Intrusion Detection System (IDS) devices play a crucial role in the realm of network security. These systems generate alerts for security analysts by performing signature-based and anomaly-based detection on malicious network traffic. However, there are several challenges when configuring and fine-tuning these IDS devices for high accuracy and precision. Machine learning utilizes a variety of algorithms and unique dataset input to generate models for effective classification. These machine learning techniques can be applied to IDS devices to classify and filter anomalous network traffic. This combination of machine learning and network security provides improved automated network defense by developing highly-optimized ...


Brave New World Reboot: Technology’S Role In Consumer Manipulation And Implications For Privacy And Transparency, Allie Mertensotto 2021 University of Arkansas, Fayetteville

Brave New World Reboot: Technology’S Role In Consumer Manipulation And Implications For Privacy And Transparency, Allie Mertensotto

Marketing Undergraduate Honors Theses

Most consumers are aware that our data is being obtained and collected through the use of our devices we keep in our homes or even on our person throughout the day. But, it is understated how much data is being collected. Conversations you have with your peers – in a close proximity of a device – are being used to tailor advertising. The advertisements you receive on your devices are uniquely catered to your individual person, due to the fact it consistently uses our data to produce efficient and personal ads. On the flip side, our government is also tapping into our ...


Characteristic Reassignment For Hardware Trojan Detection, Noah Waller 2021 University of Arkansas, Fayetteville

Characteristic Reassignment For Hardware Trojan Detection, Noah Waller

Graduate Theses and Dissertations

With the current business model and increasing complexity of hardware designs, third-party Intellectual Properties (IPs) are prevalently incorporated into first-party designs. However, the use of third-party IPs increases security concerns related to hardware Trojans inserted by attackers. A core threat posed by Hardware Trojans is the difficulty in detecting such malicious insertions/alternations in order to prevent the damage. This thesis work provides major improvements on a soft IP analysis methodology and tool known as the Structural Checking tool, which analyzes Register-Transfer Level (RTL) soft IPs for determining their functionalities and screening for hardware Trojans. This is done by breaking ...


Network-Based Detection And Prevention System Against Dns-Based Attacks, Yasir Faraj Mohammed 2021 University of Arkansas, Fayetteville

Network-Based Detection And Prevention System Against Dns-Based Attacks, Yasir Faraj Mohammed

Graduate Theses and Dissertations

Individuals and organizations rely on the Internet as an essential environment for personal or business transactions. However, individuals and organizations have been primary targets for attacks that steal sensitive data. Adversaries can use different approaches to hide their activities inside the compromised network and communicate covertly between the malicious servers and the victims. The domain name system (DNS) protocol is one of these approaches that adversaries use to transfer stolen data outside the organization's network using various forms of DNS tunneling attacks. The main reason for targeting the DNS protocol is because DNS is available in almost every network ...


Trust Models And Risk In The Internet Of Things, Jeffrey Hemmes 2021 Regis University

Trust Models And Risk In The Internet Of Things, Jeffrey Hemmes

Regis University Faculty Publications

The Internet of Things (IoT) is envisaged to be a large-scale, massively heterogeneous ecosystem of devices with varying purposes and capabilities. While architectures and frameworks have focused on functionality and performance, security is a critical aspect that must be integrated into system design. This work proposes a method of risk assessment of devices using both trust models and static capability profiles to determine the level of risk each device poses. By combining the concepts of trust and secure device fingerprinting, security mechanisms can be more efficiently allocated across networked IoT devices. Simultaneously, devices can be allowed a greater degree of ...


Non-Hazardous Industrial Solid Waste Tracking System, Justin Tank 2021 Dakota State University

Non-Hazardous Industrial Solid Waste Tracking System, Justin Tank

Masters Theses & Doctoral Dissertations

The Olmsted Non-Hazardous Industrial Solid Waste Tracking System allows waste generators of certain materials to electronically have their waste assessments evaluated, approved, and tracked through a simple online process. The current process of manually requesting evaluations, prepopulating tracking forms, and filling them out on triplicate carbonless forms is out of sync with other processes in the department. Complying with audit requirements requires pulling physical copies and providing them physically to fulfill information requests.

Waste generators in Minnesota are required to track their waste disposals for certain types of industrial waste streams. This ensures waste is accounted for at the point ...


Iot Based Agriculture 4.0: Challenges And Opportunities, Halimjon Khujamatov, Temur Toshtemirov Mr., Doston Turayevich Khasanov Mr., Nasiba Saburova Ms., Ilhom Ikromovich Xamroyev Mr. 2021 Tashkent University of Information Technologies

Iot Based Agriculture 4.0: Challenges And Opportunities, Halimjon Khujamatov, Temur Toshtemirov Mr., Doston Turayevich Khasanov Mr., Nasiba Saburova Ms., Ilhom Ikromovich Xamroyev Mr.

Bulletin of TUIT: Management and Communication Technologies

In recent years, the world's population growth has been intensifying, resulting in specific problems related to the depletion of natural resources, food shortages, declining fertile lands, and changing weather conditions. This paper has been discussed the use of IoT technology as a solution to such problems.

At the same time, the emergence of IoT technology has given rise to a new research direction in agriculture. Soil analysis and monitoring using Zigbee wireless sensor network technology, which is part of the IoT, will enable the creation of an IoT ecosystem as well as the development of smart agriculture. In addition ...


Lecture 05: The Convergence Of Big Data And Extreme Computing, David Keyes 2021 King Abdullah University of Science and Technology

Lecture 05: The Convergence Of Big Data And Extreme Computing, David Keyes

Mathematical Sciences Spring Lecture Series

As simulation and analytics enter the exascale era, numerical algorithms, particularly implicit solvers that couple vast numbers of degrees of freedom, must span a widening gap between ambitious applications and austere architectures to support them. We present fifteen universals for researchers in scalable solvers: imperatives from computer architecture that scalable solvers must respect, strategies towards achieving them that are currently well established, and additional strategies currently being developed for an effective and efficient exascale software ecosystem. We consider recent generalizations of what it means to “solve” a computational problem, which suggest that we have often been “oversolving” them at the ...


Lecture 12: Recent Advances In Time Integration Methods And How They Can Enable Exascale Simulations, Carol S. Woodward 2021 Lawrence Livermore National Laboratory

Lecture 12: Recent Advances In Time Integration Methods And How They Can Enable Exascale Simulations, Carol S. Woodward

Mathematical Sciences Spring Lecture Series

To prepare for exascale systems, scientific simulations are growing in physical realism and thus complexity. This increase often results in additional and changing time scales. Time integration methods are critical to efficient solution of these multiphysics systems. Yet, many large-scale applications have not fully embraced modern time integration methods nor efficient software implementations. Hence, achieving temporal accuracy with new and complex simulations has proved challenging. We will overview recent advances in time integration methods, including additive IMEX methods, multirate methods, and parallel-in-time approaches, expected to help realize the potential of exascale systems on multiphysics simulations. Efficient execution of these methods ...


Building And Using Digital Libraries For Etds, Edward A. Fox 2021 Virginia Tech

Building And Using Digital Libraries For Etds, Edward A. Fox

The Journal of Electronic Theses and Dissertations

Despite the high value of electronic theses and dissertations (ETDs), the global collection has seen limited use. To extend such use, a new approach to building digital libraries (DLs) is needed. Fortunately, recent decades have seen that a vast amount of “gray literature” has become available through a diverse set of institutional repositories as well as regional and national libraries and archives. Most of the works in those collections include ETDs and are often freely available in keeping with the open-access movement, but such access is limited by the services of supporting information systems. As explained through a set of ...


Towards Identity Relationship Management For Internet Of Things, Mohammad Muntasir Nur 2021 Dakota State University

Towards Identity Relationship Management For Internet Of Things, Mohammad Muntasir Nur

Masters Theses & Doctoral Dissertations

Identity and Access Management (IAM) is in the core of any information systems. Traditional IAM systems manage users, applications, and devices within organizational boundaries, and utilize static intelligence for authentication and access control. Identity federation has helped a lot to deal with boundary limitation, but still limited to static intelligence – users, applications and devices must be under known boundaries. However, today’s IAM requirements are much more complex. Boundaries between enterprise and consumer space, on premises and cloud, personal devices and organization owned devices, and home, work and public places are fading away. These challenges get more complicated for Internet ...


Efficacy Of Incident Response Certification In The Workforce, Samuel Jarocki 2021 Dakota State University

Efficacy Of Incident Response Certification In The Workforce, Samuel Jarocki

Masters Theses & Doctoral Dissertations

Numerous cybersecurity certifications are available both commercially and via institutes of higher learning. Hiring managers, recruiters, and personnel accountable for new hires need to make informed decisions when selecting personnel to fill positions. An incident responder or security analyst's role requires near real-time decision-making, pervasive knowledge of the environments they are protecting, and functional situational awareness. This concurrent mixed methods paper studies whether current commercial certifications offered in the cybersecurity realm, particularly incident response, provide useful indicators for a viable hiring candidate.

Managers and non-managers alike do prefer hiring candidates with an incident response certification. Both groups affirmatively believe ...


Block The Root Takeover: Validating Devices Using Blockchain Protocol, Sharmila Paul 2021 Dakota State University

Block The Root Takeover: Validating Devices Using Blockchain Protocol, Sharmila Paul

Masters Theses & Doctoral Dissertations

This study addresses a vulnerability in the trust-based STP protocol that allows malicious users to target an Ethernet LAN with an STP Root-Takeover Attack. This subject is relevant because an STP Root-Takeover attack is a gateway to unauthorized control over the entire network stack of a personal or enterprise network. This study aims to address this problem with a potentially trustless research solution called the STP DApp. The STP DApp is the combination of a kernel /net modification called stpverify and a Hyperledger Fabric blockchain framework in a NodeJS runtime environment in userland. The STP DApp works as an Intrusion ...


Traversing Nat: A Problem, Tyler Flaagan 2021 Dakota State University

Traversing Nat: A Problem, Tyler Flaagan

Masters Theses & Doctoral Dissertations

This quasi-experimental before-and-after study measured and analyzed the impacts of adding security to a new bi-directional Network Address Translation (NAT). Literature revolves around various types of NAT, their advantages and disadvantages, their security models, and networking technologies’ adoption. The study of the newly created secure bi-directional model of NAT showed statistically significant changes in the variables than another model using port forwarding. Future research of how data will traverse networks is crucial in an ever-changing world of technology.


Digital Commons powered by bepress