Indonesian Journal of Electrical
Engineer
ing and Computer Scien
ce
V
o
l. 9, N
o
. 2
,
Febr
u
ar
y 201
8, pp
.
30
2
~
30
5
ISSN: 2502-4752, DOI: 10.
11591/ijeecs
.v9.
i
2
.pp302-305
3
02
Jo
urn
a
l
h
o
me
pa
ge
: http://iaescore.c
om/jo
urnals/index.php/ijeecs
Explanatory Server Protect
io
n
Pr
o
b
le
m
fo
r
A
u
toma
te
d
Wire
le
ss Sy
ste
m
Singh
P
o
ja
R
amesh
1
, S
an
th
osh Ku
mar
Sin
g
h
2
1
Res
ear
ch S
cho
l
ar, AM
E
T Unive
r
s
i
t
y
, Ch
e
nnai
2
As
s
i
s
t
ant P
r
ofe
s
s
o
r,Tagore
Coll
ege of
S
ci
enc
e
&
Com
m
e
rce,
M
um
b
ai
Article Info
A
B
STRAC
T
Article histo
r
y:
Received Oct 19, 2017
Rev
i
sed
D
ec 24
, 20
17
Accepte
d Ja
n 9, 2018
Man
y
s
orts
o
f
servers
exists
w
hich
i
ncorporates
b
oth
openly
ava
i
l
a
ble
s
e
rv
ers
and
ins
i
de
s
erv
e
rs
,
for
exam
pl
e,
m
ai
l
s
e
rv
ers
,
w
eb
s
ervers
,
app
li
cat
ion
s
e
r
v
e
r
s
,
a
s
s
e
m
b
l
e
a
n
d
t
e
s
t
s
e
r
v
e
r
s
a
n
d
s
o
f
o
r
t
h
.
,
t
h
a
t
s
t
o
r
e
n
u
mer
ous
p
rivate
and
delicate
data.
Giving
s
ecurity
t
o
such
s
ervers
h
as
t
urned
o
ut
t
o
be
o
n
e
o
f
the
cent
e
r
n
eces
sities
in
t
his
d
a
y
and
age
as
t
h
e
y
are
under
d
a
nger
of
a
ssault.
The
inform
at
ion
put
a
wa
y
on
th
e
s
e
rver
can
go
from
hierarch
ica
l
d
at
a,
f
o
r
exam
ple,
c
l
a
s
s
i
fi
ed
c
l
i
ent
rel
a
ted
records
,
e
xtend
s
ubtle
e
lem
e
nts,
c
ompan
y
'
s
product
source
code
t
o
private
me
dia
data,
indivi
dual
informati
on,
n
ation
a
l
s
ecurit
y
r
e
l
at
ed
d
ata
,
p
ati
e
nts
database,
address
papers
o
f
the
f
ocused
e
xams
and s
o
forth. On
the off ch
anc
e
th
a
t s
u
ch de
lic
at
e i
n
form
ation
gets into wrong
hands,
it
can
be
a
bused.
Along
thes
e
lin
es
t
he
b
usiness
and
the
notoriety
o
f
the
association
would
beat
s
tak
e
.
It
c
an
lik
ewise
posture
r
isk
to
c
ountries
.
The
fundam
e
nta
l
r
easons
o
f
se
curit
y
b
re
ak
i
n
servers
is
b
ecause
o
f
t
h
e
utili
zat
ion
of
v
ersatil
e
stockpili
ng
gadgets,
for
exam
ple,
p
en
drives,
hard
circ
les,
a
nd
so
on.,
which
can
b
e
potentia
l
tr
ansporters
o
f
mal
ware
a
nd
Trojans.
A
t
th
e
point
w
hen
tainted
b
y
s
uch
infection,
t
h
e
se
c
om
pact
stockpiling
gadg
ets
can
b
ring
ab
out
s
e
r
i
o
u
s
h
a
r
m
.
P
h
y
s
i
c
a
l
l
y
k
e
eping
up
and
securing
servers
would
be
e
xtremely
t
roub
leso
me
a
nd
can
lik
ewis
e
prompt
tremendous
a
uthoritativ
e
overhead.
Hencefo
r
th
t
he
r
equir
e
ment
f
or
computerized
s
ecurity
s
y
stem
t
o distinguish,
keep
a
nd
shield
t
h
e
servers
fro
m
the
aggres
s
o
rs
.
S
ecurit
y
s
trat
egi
e
s
as
s
u
m
e
a
c
ritical
p
ar
t
in
k
eepi
ng
the
trad
e
off of s
y
s
tem security
which wou
ld inf
luence the server securit
y.
K
eyw
ords
:
Aut
o
m
a
ted
Security Break and Sec
urity
Server
Copyright ©
201
8 Institut
e
o
f
Ad
vanced
Engin
eer
ing and S
c
i
e
nce.
All rights re
se
rve
d
.
Co
rresp
ond
i
ng
Autho
r
:
Si
ng
h
Po
ja R
a
m
esh,
Research Sc
h
olar,
AM
ET
Uni
v
er
sity
,
Ch
enn
a
i.
1.
INTRODUCTION
The
sna
p
py
i
m
p
rovem
e
nt
o
f
PC
s
y
s
t
e
m
s
h
as
g
i
v
en
i
nc
r
e
di
bl
e
com
f
o
rt
a
nd
al
so
p
res
e
nt
ed
s
ec
uri
t
y
d
a
ng
ers
i
n
t
h
e
f
igu
r
e
and
capacity
c
o
n
d
itio
n.
S
in
ce
w
e
are
co
ns
tan
tly
a
sso
c
iated
with
I
ntern
e
t
we
a
t
no
ti
me
in
t
he
f
uture
can
b
e
guara
n
teed
o
f
t
h
e
i
n
fo
rm
ati
on
bei
ng
secu
re
.
A
sum
m
ary
of
a
t
t
ack
m
et
hods
a
n
d
co
nfid
en
tiality
p
ro
tectio
n m
e
a
s
u
r
es fo
r
fu
lly au
t
o
m
ated
remo
t
e
an
alysis sy
s
te
m
s
is illu
strated
in
[1
]
.
Di
ffe
re
nt
s
ort
s
o
f
i
n
fo
rm
at
i
on
are
m
oved
an
d
put
a
way
i
n
f
r
eel
y
a
vailable
syste
m
s
[2],
f
or
e
xam
p
le,
serve
r
s or di
s
t
r
i
but
ed st
o
ra
ge,
whi
c
h m
i
ght
be wr
on
g
f
ul
l
y
capt
u
red
,
cha
n
g
e
d o
r
ha
r
m
e
d b
y
assai
l
a
nt
s bri
ngi
ng
ab
ou
t th
e alterin
g
or l
o
ss o
f
inform
a
t
i
o
n
.
Servers
which
are
under
haz
a
rd
a
nd
v
ery
helpless
are
rea
l
s
ecti
on
foc
u
s
e
s
f
o
r
n
oxi
ous
c
l
i
e
nt
s.
[
3]
Di
ve
rse
s
o
rt
s
o
f
s
ec
uri
t
y
c
om
po
ne
nt
s
have
b
een
c
reat
ed
t
o
shi
e
l
d
t
h
e
se
r
v
ers
fr
om
d
i
ffer
e
nt
s
ort
s
o
f
ass
a
ul
t
s
.
Security
i
n
s
tru
m
en
t
i
m
p
l
e
m
e
n
ts
a
ll
th
e
req
u
i
red
secu
rity
s
trate
gi
es
[
4]
.
On
t
he
o
ff
c
h
ance
t
h
at
a
ny
bo
dy
figures
out
h
ow
t
o
disc
over
a
ny
e
scape
cla
u
se
i
n
the
se
rver
w
hi
ch
c
a
n
b
e
abuse
d
,
i
t
w
o
ul
d
pr
om
pt
b
ar
gai
n
o
f
serve
r
a
n
d
i
n
f
orm
a
t
i
on
[
5
]
.
O
nce
t
h
e
hel
p
l
e
ssness
has
be
en
f
o
u
n
d
t
h
e
i
n
fl
uence
d
fra
m
e
wor
k
s
m
u
st
b
e
fi
xe
d
Evaluation Warning : The document was created with Spire.PDF for Python.
In
d
onesi
a
n
J
E
l
ec En
g &
C
o
m
p
Sci
ISS
N
:
2
5
0
2
-
47
52
Exp
l
ana
to
ry
S
e
rver Pro
t
ectio
n Prob
lem fo
r Au
toma
ted
Wireless S
y
stem (S
i
n
gh
Po
j
a
Ra
mesh
)
30
3
qui
c
k
l
y
e
l
s
e
t
h
e
ha
rm
c
oul
d
be
t
rem
e
nd
ou
s
.
A
p
o
r
t
a
bl
e
m
obi
l
e
-
b
a
sed
com
p
le
te
b
loo
d
c
o
u
n
t
(
CBC)
a
nalysis
fram
e
wor
k
w
i
t
h
t
h
e
ai
d
of
m
i
c
rosc
ope
i
s
p
r
op
ose
d
,
an
d
t
h
e
sm
art
pho
ne
c
am
era
i
s
m
ount
ed
t
o
t
h
e
vi
e
w
i
n
g
po
rt
o
f
t
h
e
l
i
g
ht
m
i
c
rosc
ope
b
y
ad
di
n
g
a
s
m
a
rt
ph
one
s
u
p
p
o
r
t
.
T
h
en
,
t
h
e
num
ber
of
c
o
rres
p
on
di
n
g
c
e
l
l
s
a
re
co
un
ted using
t
o
po
log
i
cal structu
ral a
n
alysis, and the
cells in
clu
m
p
ed
reg
io
n is estim
a
t
ed
u
sing
Ho
ugh
Circle
T
r
a
n
s
f
o
r
m
(
H
C
T
)
p
r
o
c
e
d
u
r
e
.
A
f
t
e
r
t
h
a
t
,
t
h
e
a
n
a
l
y
s
i
s
r
e
s
u
l
t
s
a
r
e
s
ave
d
i
n
t
h
e
dat
a
base,
and
sh
o
w
n
i
n
t
he
u
ser
in
terface of th
e sm
artp
h
o
n
e
app
licatio
n
[6
].
2.
PROP
OSE
D
M
ETHO
D
Th
is
p
ap
er
p
ro
po
ses
a
stru
ctu
r
e
th
at
w
o
u
l
d
facilitate
t
h
e
w
ork
of
a
n
oversee
r
.
It
c
oncentrates
o
n
pl
an
ni
n
g
a
m
echani
ze
d
de
vi
ce
w
h
i
c
h
w
oul
d
pl
ay
o
ut
a
r
e
v
i
e
w
o
f
t
h
e
s
e
r
v
e
r
s
a
n
d
c
h
e
c
k
i
n
t
h
e
e
v
e
n
t
t
h
a
t
i
t
i
s
agreea
ble
to
a
ll
the
recommende
d
secu
rity
a
rrang
em
en
ts.
As
t
h
e
r
e
are
num
erous
s
t
a
ges
w
h
ere
u
po
n
t
h
e
serve
r
s
r
u
n
, t
he
ap
p
arat
us i
s i
n
t
e
nde
d t
o
ad
j
us
t
t
o
het
e
r
o
g
e
n
e
o
u
s
co
n
d
itio
n.
The sec
u
ri
t
y
ar
r
an
gem
e
nt
s wh
i
c
h we
re t
ri
e
d
i
nco
r
po
rat
e
d t
h
e acc
om
pany
i
n
g:
-
Ch
eck
i
n
g if
t
he W
indo
ws serv
e
r is run
n
i
n
g
th
e
en
dor
sed cuttin
g
-
e
dge
agai
n
st
m
al
ware ar
r
an
gem
e
nt
.
Ch
eck
i
n
g if
t
he end
or
sed
an
tiv
iru
s
sh
i
eld
is fo
und
in th
e task
b
a
r
f
o
r
a
f
ram
e
wo
r
k
r
u
nni
ng
W
i
n
do
ws
.
List
t
h
e
r
en
d
itio
n
of
t
h
e
A
n
ti-Ma
lware
run
n
i
n
g
o
n
th
e
framework
s
for
Linu
x
and
W
i
ndow
s
w
o
r
k
i
ng
fram
e
wor
k
.
M
e
di
a
Access
D
e
l
a
y
and
Th
ro
ug
h
put
A
nal
y
s
i
s
of
V
oi
ce
Co
d
ec
with
S
ilen
ce
Supp
ressio
n
on
W
i
rel
e
ss
A
d
H
oc
N
et
w
o
rk
i
s
descri
bed
i
n
[
7
]
.
C
h
eck
i
f
an
y
i
ndi
v
i
d
ual
re
m
ovabl
e
m
e
di
a
i
n
t
r
o
duce
f
o
r
bot
h
Li
nu
x
an
d
W
i
nd
o
w
s
Se
rve
r
,
i
f
s
o
l
i
s
t
t
h
ei
r
nam
e
s
and
t
i
m
est
a
m
p
of
t
h
e
g
ad
get
ad
di
t
i
on.
K
-
s
t
r
an
ge
poi
nt
s
clu
s
tering
al
g
orith
m
. In
C
o
mp
u
t
ation
a
l In
tellig
en
ce i
n
Data Min
i
n
g i
s
d
et
erm
i
ned i
n
[
8]
.
List all th
e secu
rity p
atch
es co
n
n
ected to
t
h
e W
i
ndo
ws w
ork
i
ng
fram
e
wor
k
.
Li
st
t
he
i
nt
r
o
d
u
ced
f
orm
s
o
f
pr
o
g
ram
m
i
ng
r
u
n
n
i
n
g
o
n
t
he
W
i
n
do
ws
S
yste
m
and
C
h
eck
i
f
the
occasion
l
ogs
have
b
ee
n
em
p
o
we
re
d
o
r
c
ri
p
p
l
e
d.
A
s
u
r
vey
of
b
i
g
d
at
a
a
n
al
y
t
i
c
s
i
n
heal
t
h
care
a
nd
g
o
v
e
rnm
e
nt
i
s
descri
b
e
d
in
[
9].
T
h
e
se
curity
d
evice
would
help
t
he
ove
rseer
t
o
check
t
h
e
ass
e
m
b
le
a
nd
tes
t
s
erver
for
se
curity
co
nsisten
ce and
en
su
ring
t
h
a
t it
stick
s
to
all th
e ch
aracterize
d sec
u
ri
t
y
ar
r
a
ngem
e
nt
s.
3.
RESULT
AND
D
IS
CUSSI
ON
C
ont
ai
ner
t
echnol
o
g
y
sol
v
es
a
num
ber
of
p
robl
em
s
for
any
soft
wa
re
bus
i
n
ess
i
n
cl
udi
ng
i
m
p
rove
d
co
st efficien
cy,
d
a
ta iso
latio
n
, i
m
p
ro
v
e
d
d
a
ta p
o
r
tab
ility, an
d
v
ersatili
ty.
Fi
gu
re
1
.
C
o
nt
ai
ner Te
ch
n
o
l
o
gy
Evaluation Warning : The document was created with Spire.PDF for Python.
ISS
N
:
2502-
4
752
In
d
onesi
a
n
J
E
l
ec En
g &
C
o
m
p
Sci
, Vol
.
9
,
N
o.
2
,
Fe
br
uar
y
20
1
8
:
x
x
–
xx
30
4
F
i
g
u
r
e
2
.
S
t
r
a
tu
s5
St
rat
u
s
5
a
ut
om
at
es
m
ost
of
t
he
p
r
o
cesses
re
qui
red
t
o
m
anage
D
o
c
ke
r
co
n
t
ai
ners
a
n
d
c
l
o
ud
se
rve
r
s
,
as well as i
n
c
lud
i
ng
ad
d
ition
a
l
bu
sin
e
ss serv
i
ce au
to
m
a
tio
n
for
s
oft
w
are
as
a service c
o
mpanies
.
Fi
gu
re
3
.
B
e
ne
fi
t
s
o
f
Aut
o
m
a
ti
on
The
p
r
i
m
ary
benefi
t
s
o
f
ope
r
a
t
i
ons
a
ut
om
ati
on
ci
t
e
d
m
o
st
o
ft
en
were
c
ost
red
u
c
tion
,
p
rodu
ctiv
ity,
av
ailab
ility,
reliab
ility,
an
d
p
e
rfo
r
m
a
n
ce.
E
very
b
u
s
in
ess
face
s
g
l
ob
al
p
ressu
r
e
t
o
i
n
c
rease
th
eir
p
r
o
f
itabilit
y.
On
e
app
r
o
a
ch
i
s
to
r
edu
ce
costs.
B
u
t
,
redu
cin
g
t
h
e
capab
ilities
o
f
the
c
o
mpute
r
cente
r
ne
gatively
im
pacts
the
entire c
o
m
p
any.
4.
CO
NCL
USI
O
N
Asso
ciatio
n
s
m
u
s
t
u
tilize
sta
n
d
a
rd
s
ecu
r
ity
s
tan
d
a
rds
an
d
m
u
st
guara
nt
ee
t
he
c
hec
k
i
n
g
o
f
t
he
l
o
g
s
so
th
at
a
n
y
f
o
llo
ws
l
eft
b
y
a
n
i
n
terlop
er
c
an
b
e fo
llowed
and
t
h
e
s
e
cu
r
ity
d
ang
e
r
s
c
an
b
e
f
o
u
nd be
fo
re t
hey
m
a
ke
any
real
h
a
r
m
t
h
e
or
ga
ni
zat
i
o
n
.
T
he
d
a
nge
rs
m
ust
be
b
r
o
ke
d
o
w
n
a
n
d
t
h
eir
e
x
am
ple
m
u
st
b
e
rec
o
rded
t
o
Evaluation Warning : The document was created with Spire.PDF for Python.
In
d
onesi
a
n
J
E
l
ec En
g &
C
o
m
p
Sci
ISS
N
:
2
5
0
2
-
47
52
Exp
l
ana
to
ry
S
e
rver Pro
t
ectio
n Prob
lem fo
r Au
toma
ted
Wireless S
y
stem (S
i
n
gh
Po
j
a
Ra
mesh
)
30
5
cou
n
t
e
ract
f
ut
u
r
e
assa
ul
t
s
.
I
n
f
o
rm
at
i
on
r
upt
u
r
es
a
n
d
i
nt
e
r
r
u
pt
i
on
a
ssaults
can'
t
b
e
ceased
out
a
nd
o
ut
y
et
w
e
sho
u
l
d
m
ake
im
port
a
nt
s
t
r
i
d
es
i
n
ens
u
ring
the
servers
i
n
a
h
ete
r
oge
ne
o
u
s
d
o
m
a
i
n
.
Th
us
s
ec
uri
t
y
m
u
s
t
be
gi
ve
n
t
h
e
m
o
st
a
st
ou
ndi
ng
ne
ed
a
s
a
p
r
oce
d
ure
i
n
e
ve
ry
o
ne
o
f
t
he
a
ss
o
c
i
a
t
i
ons
a
n
d
m
ust
be
r
e
h
ea
rse
d
i
n
a
tau
g
h
t
w
ay.
Th
e
po
in
t
of
t
h
e
w
ork
was
to
o
u
tlin
e
a
co
m
p
ellin
g
s
trategy
consistence
apparat
u
s
which
would
check
i
f
the
s
e
rve
r
s
were
i
n
co
nsisten
ce
with
a
ll
th
e
reco
mmen
d
ed
a
r
r
an
gem
e
nt
s.
T
hi
s
w
o
ul
d
e
n
a
b
l
e
t
he
ex
ecu
tive to settle th
e
escap
e
REFERE
NC
ES
[1]
O'
Keef
e
C.
M
.,
“A
s
u
m
mar
y
o
f
at
tack
m
ethods
a
nd
confidentiality
p
rotection
measures
f
or
f
ully
a
utomated
r
emote
anal
ys
is
s
ys
tem
s
,”
In
ternational
Statistical Review
, vol/issue: 81
(
3), pp
. 426-455
, 2013.
[2]
S
a
bin D
.
, U
.S
.
Washington D. U
.
S, “Patent and
Trad
e
mark Offi
ce,” Patent No. 6
,981,207
, 2005
.
[3]
Bouwman
H.,
et
al
.,
“
Opportunities
a
nd
prob
lems
w
ith
a
utomated
d
ata
collection
v
ia
s
martphones,”
Mobile
m
e
dia
&
c
o
mmunication
, vol/issue: 1(1)
, pp
. 63-68
, 201
3.
[4]
Zaits
ev O
.
W
a
s
h
ington,
D
C: U
.S
,
“
P
atent
and
Tra
d
em
ark Offic
e
,
”
U.S. Patent No
. 8,776,241
, 2014
.
[5]
O
l
s
e
n T.
, “
Eu
D
ata
P
r
otec
tion
R
e
gulation and A
u
tomatic Processi
ng of Info
r
mation on Th
e In
tern
et,” 2002
.
[6]
C
.
Y
.
K
it,
et
a
l
.
,
“
Mobile
b
ased
A
utomated
C
omplet
e
Blood
Count
(
Auto-C
BC)
A
naly
s
i
s
S
y
s
t
e
m
from
Bl
ood
S
m
eared
I
m
a
ge,
”
Indonesian
Jo
urnal of Electrical
Engin
eering
and Computer S
c
ien
c
e
,
vol/issue:
7(6)
,
pp.
3020-
3029
, 2017
.
[7]
Shah
R
.
D.
a
nd
S
ingh
S.
K
.,
“Media
A
ccess
Delay
and
Thro
ughput
Anal
y
s
is
o
f
Voice
Code
c
with
S
il
en
c
e
Suppression on Wireless
Ad Ho
c
Network
,”
Pro
cedia
Computer
Scien
c
e
, vol. 79
,
pp. 940-947, 20
16.
[8]
Johnson
T.
a
nd
Singh
S.
K
.,
“K-str
ange
points
clustering
algori
thm
,
”
in
Co
mputational Int
e
llig
ence in Data
Mining
, vol. 1
, p
p. 415-425
, 201
5.
[9]
Archenaa
J
.
and
Anita
E
.
M
.
,
“
A
s
urve
y
of
b
ig
d
ata
ana
l
yti
c
s
in
h
ealthcare
a
nd
government,”
Pr
ocedia
Computer
Scien
c
e
, vol. 50
,
pp. 408-413, 20
15.
Evaluation Warning : The document was created with Spire.PDF for Python.