Alert Management System By:  Christopher Galinski  Uri Soloveychik Mentor:  Zeev Schneider For: Software Systems Lab in the faculty of Electrical Engineering,

Slides:



Advertisements
Similar presentations
Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
Advertisements

1 CSCI N305 C Language Programming Welcome to CSCI N305! Compiling Your First Program Using Microsoft Visual Studio 2008.
Ozeki Informatics Ltd. | | info.ozekiphone.com | Ozeki Informatics Ltd. | | +36.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
Raw Sockets CS-480b Dick Steflik Raw Sockets Raw Sockets let you program at just above the network (IP) layer You could program at the IP level using.
Network Operating System By Elena Otte Distributed Data Processing.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
Technical Brief v1.0. Communication tools that broadcast visual content directly onto the screens of computers, using multiple channels and formats Easy.
Alert Management System By:  Christopher Galinski  Uri Soloveychik Mentor:  Zeev Schneider For: Software Systems Lab in the faculty of Electrical Engineering,
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
Keeping You Connected Through Citrix Access your applications Access your network shares and documents Access your …and do it remotely!
1 Component Description Alice 3d Graphics Software Human Computer Interaction Institute Carnegie Mellon University Prepared by: Randy Pausch,
LogMeIn.com By: Casey Davidson. What is it? Free Web-based VNC Client Remotely control any PC or Mac from anywhere in the world No network configuring.
WNT Client/Server SDK Tony Vaccaro CS699 Project Presentation.
MICROSOFT ASSESSMENT AND PLANNING (MAP) TOOLKIT LAB Dev Chaudhari zevenseas India.
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to SysAid.
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
1 TCP/IP architecture A set of protocols allowing communication across diverse networks Out of ARPANET Emphasize on robustness regarding to failure Emphasize.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Untangle and OpenVPN. ‏ What is OpenVPN? Allows secure remote connection Based on SSL Uses UDP 1194 Supports – Site to Site (hardware to hardware) – Site.
Take advantage of the SMS technology in your organization today!
FTP. SMS based FTP Introduction Existing System Proposed Solution Block Diagram Hardware and Software Features Benefits Future Scope Conclusion.
2851A_C01. Microsoft Windows XP Service Pack 2 Security Technologies Bruce Cowper IT Pro Advisor Microsoft Canada.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
.NET, and Service Gateways Group members: Andre Tran, Priyanka Gangishetty, Irena Mao, Wileen Chiu.
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
Code as Communication Programming Studio Spring 2015.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Squiggle Lan Messenger.
CSCI 224 Introduction to Java Programming. Course Objectives  Learn the Java programming language: Syntax, Idioms Patterns, Styles  Become comfortable.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Design Extensions to Google+ CS6204 Privacy and Security.
OPC Database.NET. OPC Systems.NET What is OPC Systems.NET? OPC Systems.NET is a suite of.NET and HTML5 products for SCADA, HMI, Data Historian, and live.
How to Configure Informix Connect and ODBC James Edmiston Informix DBA Consultant/Quest Information Systems, Inc. Informix User Forum 2005 Moving Forward.
Remote OMNeT++ v2.0 Introduction What is Remote OMNeT++? Remote environment for OMNeT++ Remote simulation execution Remote data storage.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
IT 211 Project Integration and Deployment Lab #11.
Implementing Network Access Protection
Software Framework for Teleoperated Vehicles Team Eye-Create ECE 4007 L01 Karishma Jiva Ali Benquassmi Safayet Ahmed Armaghan Mahmud Khin Lay Nwe.
Introduction to Interactive Media Interactive Media Tools: Software.
The Microsoft Baseline Security Analyzer A practical look….
Communication Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Web Services An introduction for eWiSACWIS May 2008.
COMP1321 Digital Infrastructure Richard Henson February 2014.
CS480 Computer Science Seminar Introduction to Microsoft Solutions Framework (MSF)
BlowFish 2000 Copyright © by Gregory Braun. All rights reserved Installation and Users Guide by Robert Moncrief II.
Module 8: Configuring Network Access Protection
Chapter 11 An Introduction to Visual Basic 2008 Why Windows and Why Visual Basic How You Develop a Visual Basic Application The Different Versions of Visual.
BLU-ICE and the Distributed Control System Constraints for Software Development Strategies Timothy M. McPhillips Stanford Synchrotron Radiation Laboratory.
April 17, 2004 Prof. Paul Lin 1 CPET 355 Data Communications & Networking 7. The Application Layer: World Wide Web - Part 1 Paul I-Hai Lin, Professor Electrical.
Computer Emergency Notification System (CENS)
Module 9: Fundamentals of Securing Network Communication.
Network Monitor By Zhenhong Zhao. What is the Network Monitor? The Network Monitor is a tool that gets information off of the host on the LAN. – Enumerating.
Chapter 11 An Introduction to Visual Basic 2005 Why Windows and Why Visual Basic How You Develop a Visual Basic Application The Different Versions of Visual.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Internet Infrastructure Min Ding Smeal College of Business Administration Pennsylvania State University.
Reconfigurable Communication Interface Between FASTER and RTSim Dec0907.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Active-HDL Server Farm Course 11. All materials updated on: September 30, 2004 Outline 1.Introduction 2.Advantages 3.Requirements 4.Installation 5.Architecture.
COMP1321 Digital Infrastructure Richard Henson March 2016.
JAVA PROGRAMMING Buzzwords. Simple: Less complex syntax than C++ Not as easy to design as Visual Basic Small size of interpreter.
Software and Communication Driver, for Multimedia analyzing tools on the CEVA-X Platform. June 2007 Arik Caspi Eyal Gabay.
Module 8: Networking Services
ms vısual studıo 2008-Introductıon TUTORIAL
Radoslaw Jedynak, PhD Poland, Technical University of Radom
A GUI Based Aid for Generation of Code-Frameworks of TMOs
Instructor: Mort Anvari
Ch 1 .Installing and configuring SQL Server 2005
Presentation transcript:

Alert Management System By:  Christopher Galinski  Uri Soloveychik Mentor:  Zeev Schneider For: Software Systems Lab in the faculty of Electrical Engineering, Technion-IIT.  Project Presentation

AMS In this presentation:  The motivation for this project  System architecture  A bit about the code used  Problems and solutions  Demonstration  What it took and what it gave

Common threats  Fire  Tsunami  Conventional attack  Non-conventional attack

Siren oMay not be heard oNot informative

AMS  Applicable anywhere, where there are computers  Delivers sound alerts  Delivers text alerts and instructions  Hard to disable  Uses existing infrastructure

AMS – Cont’d AMS client:  Win32 Service  Performs WMI queries using WQL  Windows XP, 2000, NT  Installed on every PC in a LAN AMS manager:  Java application  Communicates with clients over TCP/UDP  Multiple networks  Java machine required  One per system

Architecture (high level)

Development setup and tools  Local Area Network (LAN) of WinXP machines.  Eclipse Ganymede (Manager)  MS Visual Studio 2008 (Client)

Technologies Client  C++  WinAPI  Win32 Service  WMI\WQL  MSI Manager  Java  Socket API  Multithreading  GUI (Swing)

Problems and solutions  Work coordination - Textual application protocol  Changing IPs – UDP broadcast scan  Win32 Service debugging – Using alternative data output methods: beeps, extensive logging…

Design review results  Proposed design: Using “built-in” NetSend windows service Remote WMI based control  Rejected for the sake of client based design Flexibility, extensibility No need in authorization infrastructure (but also a security potential hole…)

Client -modules  C style modules  Linked into executable which provides Windows Service required interface

Manager -important classes

Client installation  Download the AmsSetup.msi file  Double click on it  Next and confirm until it finishes

Manager setup  Download the AlertManager.jar file  Double click on it

Let’s have a demonstration

Relevant courses  Introduction to Computer Networks  Internet Networking  Managing Data on the WWW  Introduction to Software Systems Design

Goals achieved  C++/Java application  Network application  Easy to install, transparent to user  Informative – free text message  Free WQL query, requires no client update  It really works

Benefits  Improved our design/programming skills  Team working  Technologies Java/Swing WinApi/WinService TCP/IP MSI WMI/WQL

AMS v2.0  Security  Authentication  Challenge response protocol  Tests for robustness  Stress testing