Search from the Journals, Articles, and Headings
Advanced Search (Beta)
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

نعت

ہنجو روواں یار دی خاطر
اس مدنی سرکارؐ دی خاطر
قاصد بنے رسولؐ پیغمبر
سوہنے اس دربار دی خاطر
ظاہر ہویا جگ تے آ کے
رب سوہنے دل دار دی خاطر
نورِ محمد ظاہر ہویا
اس دنیا گلزار دی خاطر
روندے رہے وچ غار حرا دے
اس امت گنہگار دی خاطر
دشمن دا وی پچھنا کردے
ٹُر گئے گھر بیمار دی خاطر
یار بلایا عرشاں اُتّے
اپنے خاص پیار دی خاطر
سجدے وچوں سر نہ چایا
اس حسینؑ سوار دی خاطر

مصادر قانون بطور سند اسلامی اور مغربی اصول قانون كا تحقیقی اور تقابلی جائزہ

Validity of the law depends on its derivation from legitimate sources. The term ‘source’ denotes the norm that validates a law. Western law is based on western legal tradition which is deeply rooted in Roman law and Bible. Statutes is one of the basic source of western law, however, constitution is superior source of western legal system. The sources of Islamic law, unlike to western legal system, are basically divided into primary and secondary sources. This study aims to compare the authority of sources of legal systems, Islam and western, and analyze the objections of orientalists on Islamic law and its sources.

Prevention of Dos/Ddos Attacks Through Expert Honey Mesh Security Infrastructure

Today, Denial of Service (DOS) and Distributed Denial of Service attacks (DDOS) are rapidly increasing on the Internet. DDOS attacks are used to overload the network infrastructure and services. Such kinds of attacks lead to the unavailability of services across networks. In this research, different types of DOS/DDOS attacks and prevention measures are also discussed. Honey pots can be used to ensure the continuous availability of services across networks. Honey pot is defined as a trap that mimics, notice and records overall activities of the attacker. Honey pot is used on server side, recognizes different kinds of attacks, protects user?s confidential data and records all malicious activities. Minimal computer resources are required in honey pots. These can be used as potential sources of risk for the network. Honey pots have a limited preventive character and a high degree of intrusion detection. In this research, Honey pots will be implemented in a demilitarized zone where two firewalls are used to protect internal and external traffic of the network. In suggested solution, honey pots are implemented as virtual machines (VM) which can be hosted on some physical servers. VM?s share resources, so multiple honey pots can be hosted on one server. The security mechanism of Honey pots VM is same as real servers but some vulnerability is deliberately left in order to trap the attacker. These VM?s observe the incoming traffic and notice the malicious activities continuously, once an attack is detected, all traffic from attack source will be forwarded to the honey pot VM network. In this way, malicious data will not route towards the production servers. The preventive action will be taken for a DDOS attack through the honey mesh system is based on fuzzy rules. Fuzzy control logic is used with reasoning which is approximation value rather than exact values. The purpose of this research is how to prevent different types of DOS/DDOS attacks through expert honey mesh security infrastructure. In this research, software simulation tool DDOSSim will be used to identify and simulate DDOS attacks via defense mechanism. The performance will be evaluated via taxonomy of input and output parameters in order to detect and prevent DDOS attacks.
Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.