A Framework includes Path based Method and Sandbox

International Journal of Computer Applications (0975 – 8887)
Volume 74– No.10, July 2013
A Framework includes Path based Method and Sandbox
Techniques for Effective Communication System
S.Sandhiya
S.Prakasam, Ph.D
M.Phil (CS) Research Scholar
SCSVMV University
Enathur, Kanchipuram
Asst .Professor
Department of CSA, SCSVMV University
Enathur, Kanchipuram
ABSTRACT
The aim of thesis is to implement the embedded sandbox
techniques with32 bit RAM processor. Nowadays, many
security methods are depends on a effective method in which
each issues of attack is countered by a custom-made approach
to eliminate the incident. Conventionally access control
models are depend on the paradigm of restricting the
functions of users that makes protecting users from each
other or protecting system resources from users.
Heterogeneous network causes some difficulties to maintain,
so sandbox method is used to reduce the delay and bandwidth
usage. In the proposed method, the memory allocation is
required with some shape and approaches all the applications
in sequence manner to store. This minimizes the delay in
deleting and updating the response data‟s and makes the
system more efficiently. This paper describes solution for
these problems through path based approach and sandboxing
provides security environment to the data( or information) on
Heterogeneous network services.
dynamic behavior. An individual wireless channel is subject
to path loss, fading, and environmental interference. Together,
these can have a significant impact on the performance of the
channel. Further, overlay networks arrange wireless coverage
as a set of overlapping technologies, each providing a
different tradeoff between bandwidth, coverage, cost, and
reliability.
Keywords
Communication path, Sandbox techniques, Heterogeneous
Network services, etc.
1. INTRODUCTION
Recently computer security schemes are failed to save users.
Protection consists of cost corporations billions by directly
affecting business and by affecting share values ,usage
ordinary users of privacy, and expose users to individual
system behavior such as aimed adds , loss of data, refusal of
service, and the use of systems to bring out volunteer illegal
activities such as sending spam, hosting contraband, and
mounting attacks opposite to other systems .These consists to
become so general that the regular discovery of new
difficulties and danger software that allows hackers to bring
control of computers is general place.
Difficulties in usages are countered by “patching” or
updating the wrong software to fix that possible problem,
while anti-malware software exactly works by searching for
and eliminating known examples of malware.
A typical communication path between a client application
and the visited server, one can observe that the path usually
involves multiple links. These links can have very different
bandwidth, delay, and error characteristics, ranging from
serial links to wireless to broadband to fiber link. In a network
links, the nodes along the path can also have very different
capabilities. When running in such heterogeneous and
constantly changing environments, applications require
quality guarantees in data communication for delivering
satisfactory user experiences. There are many reasons for this
Figure 1.1 Heterogeneous Network
Environment
1.1 Access Controls
General access controls are not enough stops some
applications. Access control methods stops what subjects are
permitted to do. For instance, the common discretionary
access control (DAC) method permits users to save
themselves and their resources from other users, while a
important access control (MAC) model permits a system
administrator to stop which system resources each user can
access . Executed programs are thus essentially allowed nonstoppable access to a user‟s status .Own security models of
modern operating systems such as Linux 2.6, Mac OS X and
Microsoft Windows 7 are user-oriented and are firstly depend
on the common methods. Even though user-oriented access
controls are not enough , as a process is not necessarily acting
on behalf of the user whose identity it is associated with these
methods are unable to differentiate between justify actions,
and behavior that is beyond the expectation of the functions
the application is suppose to function. A process can act
outside the behavior the user scopes of the application and
build the user‟s authority maliciously.
Efforts to act maliciously can be stopped. In common the task
of restricting applications includes finding the high level
security aims – that is, showing the behavior that should be
permissible and finding all the low-level rules details needed
to enforce these goals. As a response, in addition to being
44
International Journal of Computer Applications (0975 – 8887)
Volume 74– No.10, July 2013
complex for users to generate lawful separate policies, rule is
exactly difficult to maintain and comprehend because of the
detail and complexity of the policy associated with each
individual application. Most application-oriented access
control models simply explain a list of privileges directly with
an application. Rest brings policy abstractions that group
privileges and which can be reused to a limited extent.
frequently provide ways of overcome this isolation in order to
copy data into and out of sandboxes. The drawbacks of
isolation-based restrictions are discussed that follows this
exist.
With the help of isolation sandboxes, the only rule abstraction
available is an separate container that groups subjects with the
objects they can interact with. While models that stop access
to shared resources are commonly either devoid of policy
abstraction (privileges are listed for each application), or are
stored in terms of large monolithic self-contained policy
abstractions, such as is the case with DTE domains and RC
roles. These rules abstractions exactly have limited reusability
as they authorized control has been almost exclusively
considered in terms of user confinement.
Access control methods were generated to note exactly what
each user could do with shared resources (based on the user‟s
clearance or roles) and to save users from each other (based
on the identity of the user) . Significantly the aim has been to
protect the confidentiality, integrity, and availability (CIA) of
the system‟s resources from malicious users. With the help of
user-oriented access control it is typical for active entities
within the system (known as „subjects‟) to have permits to all
the user‟s privileges with depend of the actual program that is
running. In most access control methods in the survey ,
subjects are considered to act on behalf of users and are thus
confined based on the find of the user .
1.2 Role based access control
Role-based access control (RBAC) is an access control model
(or class of models) that depends on users with status through
semantic constructs called roles. Hereafter, practically
designed and generally used as a non-discretionary model,
RBAC has been shown to be ability for
modeling
discretionary controls . Primarily, RBAC has created as an
alternative model for user-oriented access control, and is
individually useful in companies where users are given
duties or responsibilities needs individual privileges. Access
decisions are then made depend on the access based on the
roles the user is given.
1.3 Isolation Sandboxes and Virtualization
An effective method to reducing the risk associated with
untrusted software is to stop each program‟s permission to
access resources. Another way to stop programs is running
them in a sandboxed environment, where each application can
only access objects within their sandbox. Therefore the terms
in use changes , in common a sandbox is separate from the
controls given to all running programs. Commonly sandboxes
only apply to programs externally applied into or from within
a sandbox. In many of the cases no security meaning varies
take place when a new process is started, and all programs in
a individual sandbox run with the same set of data‟s.
Sandboxes can and effective be permanent where resource
varies withstands after the programs complete running, or
transient where variations are eliminated after the sandbox is
no longer in use. Therefore discussions are based on
terminology and the fact that sandbox survey is frequently
considered separate from access control literature.
Many sandboxes gives an separated -based method where the
effect of programs run inside a sandbox is completely
separated from resources outside the sandbox‟s access. Even
though , because of practical necessities, sandboxing methods
Figure 1.2 Sandbox architecture
2. RESEARCH METHODOLOGY
A heterogeneous network is a network that combines
computers and other devices with different operating systems
and protocols. In those cases the network services does not
able to give in the regular manner/ the network services are
breaks due to different reasons (i.e, bandwidth, delay, error
connections, etc.,) In this proposed method , path based
approach is a technique that brings dynamic reconfiguration
of the network services. Path based method is used,
1. To provide automatic creation of network path,
2. To dynamic reconfigure that network path and ,
3. To manage such network path when network
changes and delays.
In addition with this path based technique, SANDBOX
technique plays a significant role in bringing secured path to
the network services. Path based approach and sandboxing act
as a framework that gives secured and effective
communication path to the network environment to share the
secured data.
Sandboxing is the testing environment that separates unique
code varies and outright evaluations from the production
environment in the meaning of the software development
Sandboxing save the living servers and their information‟s
about source code distributions and other collection of code,
data and content , public from variations that could be
affecting to which simply be different to return.
32bit
processor
32 bit
processor
Sandbox
environment
32-bit
processor
Figure 2.1 Sandbox Framework
45
International Journal of Computer Applications (0975 – 8887)
Volume 74– No.10, July 2013
The proposed methodology presents the technique with two
32 bit RAM processor .It can be implemented by transmitting
the data from processor to processor and illustrates the
memory allocation. This can be illustrated in the above
figure2.1.The diagram includes 32bit controller, rf module
which is used to transmit the data from one controller to
another.
3. LITERATURE REVIEW
The efficient approach to access efficient network services in
different network environment is to bring network awareness
in communication paths. Network services across a world area
network still remains a valuable task and the hardly mainly
derives from the heterogeneous and constantly changing
network environment, which commonly affects undesirable
user experience for network-oblivious applications. It is used
to address this is to provide network awareness in
communication paths. Many difficult problems remain,
particularly how to create effective network paths by itself
whose performance is maintained for encountered network
conditions; how to differently reconfigure such paths when
network conditions varies and how to manage and distribute
network resources among different paths and between
different network regions. This method explains solutions for
these issues , built into a programmable network infrastructure
called Switching Network Services .The Switching Network
Services infrastructure provides applications with networkaware communication paths that are automatically generated
and dynamically changed .
Users often have to choose between functionality and
security. When running popular Web browsers or email
clients, they often detect by themselves turning off functions
such as JavaScript, only to switch them back on in order to
view a particular site or read a particular message. Internet has
undergone a transition from simply being a data repository to
one providing access to a large set of sophisticated network
accessible. A typical communication path between a client
application and the visited server, one can observe that the
path usually involves multiple links. These links can have
very different bandwidth, delay, and error characteristics,
ranging from serial links to wireless to broadband to fiber
link. In a network links, the nodes along the path can also
have very different capabilities. Data communication should
also have the knowledge of application performance
requirements, which are directly related to the way in which
data is interpreted and used by the application. Combining
these two together, a network-aware communication path
should be able to match application performance requirements
with the underlying network resource availability, and further
continually adapt to dynamic changes in the network.
Traditional data communication path that provides high-level
abstractions such as reliable byte streams, a network-aware
communication path understands application specific
performance requirements and can accordingly change its
behavior under different network conditions. Without the
support for such network awareness, either applications
themselves have to cope with the problems or the user will
end up with an unsatisfactory experience.
system can then use the access file as a pattern to queue file
access requests made by sandboxed applications. We brings
an example of how this system was used to place Netscape
changer in a sandbox.
4. RESULTS AND DISCUSSIONS
System-level sandboxes brings complete operating
environments to every applications. One way of attaining
this is via the usage of hardware-level virtual machines
(VMs). A virtual machine monitor can be used to combining
the physical hardware between multiple self-contained fully
virtualized operating environments, each consists of a
complete operating system. The results obtained from the
sandbox techniques is demonstrated in below diagram 4.1
table.
Figure 4.1 Proposed Architecture
&VALUE = 0 X 1234
1byte
103
63
2Bytes
52
1byte
VALUE=63
Figure 4.2: Existing Technique
&VALUE = 0 X 1234H
0 X 1245
1byte
79
Users of Unix (or similar) systems can create a sandbox where
such programs execute in a limited environment. Generating
such a sandbox is not trivial; one has to conclude what files or
services to place within the sandbox to make the execution of
the application. In this thesis we explain a transferrable
system that queues the file requests that made by some
running software‟s generating an access file. The similar
2Bytes
63
89
1byte
VALUE =63
0 X 1246H
Figure4.3: Proposed Sandbox Technique
46
International Journal of Computer Applications (0975 – 8887)
Volume 74– No.10, July 2013
5. CONCLUSION
Thus, It have been concluded that embedded sandbox is
implemented to reduce the delay by creating the boundary
with some matrix shape to allocate the memory for different
applications that comes from different sources such as 32 bit
processor.
The main outputs of the research are the last point approach
commonly works well with server sites that have a large
quantity of evaluation resources and for customers that
connect to the network with relatively high bandwidth links.
Even though, servers that have restricted to computation
capability or customers that use poor connections may affect
from poor performance using such an method. The proxy
method commonly does not have bias towards variety of
types of servers or clients. The shared resource pool at proxy
sites can provide good performance for small server sites or
clients that have poor connectivity. Though compressing the
situation only occur before the last hop can cause considerable
resource wastage in the network, in turn leading to early
saturation as load improves.
Technical help for dynamic reconfiguration is significant for
the performance of both individual paths and the whole
network. The path-based method has all the merits of both
end-point and proxy approaches. Situations can be conducted
on upstream nodes without being restricted to the node before
the last hop. With the help of effective resource management
methods, this approach provides the best and the most robust
performance under all conditions
6. ACKNOWLEDGEMENT
I Express my sincere thanks to my guide
Dr.S.Prakasam for his encouragement and Guidance, which
helped me in completing the Thesis.
And also I would like to thank to my family members and
friends who helped me in completing the template
successfully
7. REFERENCES
[1] Rakesh Kumar Singh “VI:41-No.6” Network
Awareness In Communication Path For Efficient
Support to Network Services” IJCA (March‟2012)”
[2] S. Tzu, "VI:30," in The Art of War (Translated by
Griffith, S.B. 1971): Oxford University Press, USA,
6th Century BCE.
IJCATM : www.ijcaonline.org
[3] K. Aytes, S. Byers, and M. Santhanakrishnan, "The
Economic Impact of Information Security Breaches:
Firm Value and Intra-industry Effects," in Americas
Conference on Information Systems (AMCIS)
Acapulco, Mexico, 2006, pp. 399-407.
[4] B. Cashell, W. D. Jackson, M. Jickling, and B.
Webel, Congressional Research Service, The
Library of Congress, Washington, DC, "CRS Report
for Congress RL32331: The Economic Impact of
Cyber-attacks," 2004.
[5] S. Weber, P. A. Karger, and A. Paradkar, "A
Software Flaw Taxonomy: Aiming Tools at
Security," ACM SIGSOFT Software Engineering
Notes: Software Engineering for Secure Systems
(SESS) - Building Trustworthy Applications vol.
30, 4, pp. 1-7, 2005.
[6] N. Weaver, V. Paxson, S. Staniford, and R.
Cunningham, "A Taxonomy of Computer Worms,"
in ACM Workshop on Rapid Malcode Washington,
DC, USA: ACM Press, 2003, pp. 11-18.
[7] C. E. Landwehr, A. R. Bull, J. P. McDermott, and
W. S. Choi, "A Taxonomy of Computer Program
Security Flaws," ACM Computing Surveys (CSUR),
vol. 26, 3, pp. 211-254, 1994.
[8] D. Dagon, G. Gu, C. P. Lee, and W. Lee, "A
Taxonomy of Botnet Structures," in 23rd Annual
Computer Security Applications Conference
(ACSAC) Miami Beach, FL, USA: IEEE Computer
Society, 2007, pp. 325- 339.
[9] T. F. Stafford and A. Urbaczewski, "Spyware: The
Ghost in the Machine," Communications of the
Association for Information Systems, vol. 14, pp.
291-306, 2004.
[10] E. Cooke, F. Jahanian, and D. McPherson, "The
Zombie Roundup: Understanding, Detecting, and
Disrupting Botnets," in USENIX Workshop on
Steps to Reducing Unwanted Traffic on the Internet
(SRUTI ‟05) Cambridge, MA, USA: USENIX
Association, 2005, pp. 39–44.
[11] H. Vegge, F. M. Halvorsen, R. W. Nergard, M. G.
Jaatun, and J. Jensen, "Where Only Fools Dare to
Tread: An Empirical Study on the Prevalence of
Zero-Day Malware," in 4th International
Conference on Internet Monitoring and Protection
(ICIMP 2009) Venice/Mestre, Italy: IEEE
Computer Society, 2009.
47