Latest Entries
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Explore Further
نعت
ہنجو روواں یار دی خاطر
اس مدنی سرکارؐ دی خاطر
قاصد بنے رسولؐ پیغمبر
سوہنے اس دربار دی خاطر
ظاہر ہویا جگ تے آ کے
رب سوہنے دل دار دی خاطر
نورِ محمد ظاہر ہویا
اس دنیا گلزار دی خاطر
روندے رہے وچ غار حرا دے
اس امت گنہگار دی خاطر
دشمن دا وی پچھنا کردے
ٹُر گئے گھر بیمار دی خاطر
یار بلایا عرشاں اُتّے
اپنے خاص پیار دی خاطر
سجدے وچوں سر نہ چایا
اس حسینؑ سوار دی خاطر
مصادر قانون بطور سند اسلامی اور مغربی اصول قانون كا تحقیقی اور تقابلی جائزہ
Validity of the law depends on its derivation from legitimate sources. The term ‘source’ denotes the norm that validates a law. Western law is based on western legal tradition which is deeply rooted in Roman law and Bible. Statutes is one of the basic source of western law, however, constitution is superior source of western legal system. The sources of Islamic law, unlike to western legal system, are basically divided into primary and secondary sources. This study aims to compare the authority of sources of legal systems, Islam and western, and analyze the objections of orientalists on Islamic law and its sources.Prevention of Dos/Ddos Attacks Through Expert Honey Mesh Security Infrastructure
Today, Denial of Service (DOS) and Distributed Denial of Service attacks (DDOS) are rapidly increasing on the Internet. DDOS attacks are used to overload the network infrastructure and services. Such kinds of attacks lead to the unavailability of services across networks. In this research, different types of DOS/DDOS attacks and prevention measures are also discussed. Honey pots can be used to ensure the continuous availability of services across networks. Honey pot is defined as a trap that mimics, notice and records overall activities of the attacker. Honey pot is used on server side, recognizes different kinds of attacks, protects user?s confidential data and records all malicious activities. Minimal computer resources are required in honey pots. These can be used as potential sources of risk for the network. Honey pots have a limited preventive character and a high degree of intrusion detection. In this research, Honey pots will be implemented in a demilitarized zone where two firewalls are used to protect internal and external traffic of the network. In suggested solution, honey pots are implemented as virtual machines (VM) which can be hosted on some physical servers. VM?s share resources, so multiple honey pots can be hosted on one server. The security mechanism of Honey pots VM is same as real servers but some vulnerability is deliberately left in order to trap the attacker. These VM?s observe the incoming traffic and notice the malicious activities continuously, once an attack is detected, all traffic from attack source will be forwarded to the honey pot VM network. In this way, malicious data will not route towards the production servers. The preventive action will be taken for a DDOS attack through the honey mesh system is based on fuzzy rules. Fuzzy control logic is used with reasoning which is approximation value rather than exact values. The purpose of this research is how to prevent different types of DOS/DDOS attacks through expert honey mesh security infrastructure. In this research, software simulation tool DDOSSim will be used to identify and simulate DDOS attacks via defense mechanism. The performance will be evaluated via taxonomy of input and output parameters in order to detect and prevent DDOS attacks.Journals by Discipline
Journals by Language
Journals by Starting Year
Journal by Frequency
Journals by Cities
Journals by Provinces
Journals by Countries
Recent Searches
النهضة العربية Gender Roles Peningkatan+Kompetensi حکومت Disability النهضة qira’at e mutawatirah and Shaẓah Urban Studies The Satanic Bible motivasi belajar Physicians Entrepreneurship Zoom Application Sliding-model control الشعر Peningkatan Kompetensi burka Gout Late Payments urine commerce Foster Mother Participation Nonnative النهضة المعاصرة Offences. الإصلاح therapeutic Educational Research Depression Discovery Learning Model Orthoghraphy of Arabic Words in Urud Hadees e taqreeri examples مهدي النُهيْريّ اللون Engineering Generation Y the deniers Plant Protection Behavior عبد الكريم بن Ù…Øب الدين الحاد Extremism القصه آلقرآنیہ Patient+Satisfaction سیرت طیبہ Kaum Nabi Luth a.s spiritual Patient Satisfaction Ibn al JawzÄ«