Full Doc Security Evaluation
Full Doc Security Evaluation
Full Doc Security Evaluation
TABLE OF CONTENTS
1. Abstract
2. Introduction
Organization Profile
3. System Analysis
Existing system
Proposed System
Requirement Analysis
Requirement Specifications
Feasibility study
4. System Design
4.1 Project Modules
4.2 Data Dictionary
4.3 Hardware And Software Requirements
5. System Testing
6. Software Tools Used
7 Technical Notes
7.1 Introduction To Real-time programming
7.2 Introduction to OOPS and Windows
7.3 Introduction to Java
8. Screens
9. Conclusion
10. Bibliograph
Abstract
1. INTRODUCTION
The main theme of this project is to develop a system that can handle all
the details Pattern classification systems are commonly used in adversarial
applications, like biometric authentication, network intrusion detection, and
spam filtering, in which data can be purposely manipulated by humans to
undermine their operation. As this adversarial scenario is not taken into
account by classical design methods, pattern classification systems may
exhibit vulnerabilities, whose exploitation may severely affect their
performance, and consequently limit their practical utility. Extending pattern
classification theory and design methods to adversarial settings is thus a
novel and very relevant research direction, which has not yet been pursued
in a systematic way. In this paper, we address one of the main open issues:
evaluating at design phase the security of pattern classifiers, namely, the
performance degradation under potential attacks they may incur during
operation. We propose a framework for empirical evaluation of classifier
security that formalizes and generalizes the main ideas proposed in the
literature, and give examples of its use in three real applications. Reported
results show that security evaluation can provide a more complete
understanding of the classifier’s behavior in adversarial environments, and
lead to better design choices
EXISTING SYSTEM:
Pattern classification systems based on classical theory and design methods
do not take into account adversarial settings; they exhibit vulnerabilities to
several potential attacks, allowing adversaries to undermine their
effectiveness. A systematic and unified treatment of this issue is thus needed
to allow the trusted adoption of pattern classifiers in adversarial
environments, starting from the theoretical foundations up to novel design
methods, extending the classical design cycle of. In particular, three main
open issues can be identified: (i) analyze the vulnerabilities of classification
algorithms, and the corresponding attacks. (ii) Developing novel methods to
assess classifier security against these attacks, which are not possible using
classical performance evaluation methods. (iii) Developing novel design
methods to guarantee classifier security in adversarial environments.
PROPOSED SYSTEM:
In this work we address issues above by developing a framework for the
empirical evaluation of classifier security at design phase that extends the
model selection and performance evaluation steps of the classical design
cycle .We summarize previous work, and point out three main ideas that
emerge from it. We then formalize and generalize them in our framework.
First, to pursue security in the context of an arms race it is not sufficient to
react to observed attacks, but it is also necessary to proactively anticipate the
adversary by predicting the most relevant, potential attacks through a what-if
analysis; this allows one to develop suitable countermeasures before the
attack actually occurs, according to the principle of security by design.
Second, to provide practical guidelines for simulating realistic attack
scenarios, we define a general model of the adversary, in terms of her goal,
knowledge, and capability, which encompass and generalize models
proposed in previous work. Third, since the presence of carefully targeted
attacks may affect the distribution of training and testing data separately, we
propose a model of the data distribution that can formally characterize this
behaviour, and that allows us to take into account a large number of potential
attacks; we also propose an algorithm for the generation of training and
testing sets to be used for security evaluation, which can naturally
accommodate application-specific and heuristic techniques for simulating
attacks.
MODULES:
1. Attack Scenario and Model of the Adversary
2. Pattern Classification
3. Adversarial classification:
4. Security modules
MODULES DESCRIPTION:
Attack Scenario and Model of the Adversary:
Although the definition of attack scenarios is ultimately an application-
specific issue, it is possible to give general guidelines that can help the
designer of a pattern recognition system. Here we propose to specify the
attack scenario in terms of a conceptual model of the adversary that
encompasses, unifies, and extends different ideas from previous work. Our
model is based on the assumption that the adversary acts rationally to attain
a given goal, according to her knowledge of the classifier, and her capability
of manipulating data. This allows one to derive the corresponding optimal
attack strategy.
Pattern Classification:
malicious activities. The main drawback is that they are not able to detect
never-before-seen malicious activities, or even variants of known ones. To
overcome this issue, anomaly-based detectors have been proposed. They
build a statistical model of the normal traffic using machine learning
techniques, usually one-class classifiers, and raise an alarm when anomalous
traffic is detected. Their training set is constructed, and periodically updated
to follow the changes of normal traffic, by collecting unsupervised network
traffic during operation, assuming that it is normal (it can be filtered by a
misuse detector, and should)
2.2Feasibility study
FEASIBILITY STUDY
ECONOMICAL FEASIBILITY
TECHNICAL FEASIBILITY
SOCIAL FEASIBILITY
This study is carried out to check the technical feasibility, that is, the
technical requirements of the system. Any system developed must not have
a high demand on the available technical resources. This will lead to high
demands on the available technical resources. This will lead to high
demands being placed on the client. The developed system must have a
modest requirement, as only minimal or null changes are required for
implementing this system.
This study is carried out to check the economic impact that the
system will have on the organization. The amount of fund that the company
can pour into the research and development of the system is limited. The
expenditures must be justified. Thus the developed system as well within the
budget and this was achieved because most of the technologies used are
freely available. Only the customized products had to be purchased.
3. SYSTEM ANALYSIS
Security Evaluation of Pattern Classifiers under Attack Page 9
Security Evaluation of Pattern Classifiers under Attack
Hardware Requirements:
The selection of hardware is very important in the existence and
proper working of any software. In the selection of hardware, the size and
the capacity requirements are also important.
The Web Based Manufacturing System can be efficiently run on
Pentium system with at least 128 MB RAM and Hard disk drive having 20
GB. Floppy disk drive of 1.44 MB and 14 inch Samsung color monitor suits
the information system operation.(A Printer is required for hard copy
output).
Pentium processor -------- 233 MHZ or above
RAM Capacity -------- 256MB
Hard Disk -------- 20GB
Floppy disk -------- 1.44 MB
CD-ROM Drive -------- 32 HZ
Software Requirements:
One of the most difficult tasks is that, the selection of the software,
once system requirement is known is determining whether a particular
software package fits the requirements. After initial selection further
security is needed to determine the desirability of particular software
4. SYSTEM DESIGN
Design Description
Data flow diagram is a structure analysis tool that is used for graphical
representation of Data processes through any organization. The data flow
DFD symbols
square
Arrow
Circle or Bubble
Open Rectangle
DATA FLOW
DATA STRUCTURE
EXTERNAL ENTITY
OR DATA LINK
PROCESS
DATA BASE
DATA FLOW
DATA STRUCTURE
EXTERNAL ENTITY
OR DATA LINK
PROCESS
DATA BASE
ENTITY-RELATIONSHIP DIAGRAMS
SYMBOL PURPOSE
Represent attributes.
Login
Check
Biometric Authendication
Admin
user
view attackers
download file
UMLDIAGRAMS
INTRODUCTION
2.class diagrams
3.Sequence diagrams
4.Statechart diagrams
5.Activity diagrams
Register
activate user
Login
user
upload file
download file
view attackers
CLASS DIAGRAM:
In software engineering, a class diagram in the Unified Modeling Language
(UML) is a type of static structure diagram that describes the structure of a
system by showing the system's classes, their attributes, operations (or
Security Evaluation of Pattern Classifiers under Attack Page 23
Security Evaluation of Pattern Classifiers under Attack
methods), and the relationships among the classes. It explains which class
contains information.
Admin
User
Attacker;
Register
newusers
Login
blockeduser
File
Filetype
Spamfileter
uploadfile()
activate();
download()
activities();
spamfilter()
viewattacker():
SEQUENCE DIAGRAM:
A sequence diagram in Unified Modeling Language (UML) is a kind of
interaction diagram that shows how processes operate with one another and
in what order. It is a construct of a Message Sequence Chart. Sequence
diagrams are sometimes called event diagrams, event scenarios, and timing
diagrams.
Data base
User Admin
Registration
activate user
upload file
download file
find attacker
ACTIVITY DIAGRAM:
Login
Activate users
user
yes
apply spam filter
Download file
A
Component Diagram
Deployment Diagram
Technologies Used
HTML
HTML, an initialism of Hypertext Markup Language, is the predominant
markup language for web pages. It provides a means to describe the
structure of text-based information in a document — by denoting certain text
as headings, paragraphs, lists, and so on — and to supplement that text with
interactive forms, embedded images, and other objects. HTML is written in
the form of labels (known as tags), surrounded by angle brackets. HTML can
also describe, to some degree, the appearance and semantics of a document,
and can include embedded scripting language code which can affect the
behavior of web browsers and other HTML processors.
HTML is also often used to refer to content of the MIME type text/html or
even more broadly as a generic term for HTML whether in its XML-descended
form (such as XHTML 1.0 and later) or its form descended directly from
SGML
Hyper Text Markup Language
Advantages
A HTML document is small and hence easy to send over the net.
It is small because it does not include formatted information.
HTML is platform independent.
HTML tags are not case-sensitive.
JavaScript
JavaScript is a script-based programming language that was developed by
Netscape Communication Corporation. JavaScript was originally called Live
Script and renamed as JavaScript to indicate its relationship with Java.
JavaScript supports the development of both client and server components of
Web-based applications. On the client side, it can be used to write programs
that are executed by a Web browser within the context of a Web page. On
the server side, it can be used to write Web server programs that can
process information submitted by a Web browser and then update the
browser’s display accordingly
Even though JavaScript supports both client and server Web programming,
we prefer JavaScript at Client side programming since most of the browsers
supports it. JavaScript is almost as easy to learn as HTML, and JavaScript
statements can be included in HTML documents by enclosing the statements
between a pair of scripting tags
<SCRIPTS>.. </SCRIPT>.
<SCRIPT LANGUAGE = “JavaScript”>
JavaScript statements
</SCRIPT>
Here are a few things we can do with JavaScript:
Validate the contents of a form and make calculations.
Add scrolling or changing messages to the Browser’s status line.
Animate images or rotate images that change when we move
the mouse over them.
Detect the browser in use and display different content for
different browsers.
Detect installed plug-ins and notify the user if a plug-in is
required.
JavaScript Vs Java
JavaScript and Java are entirely different languages. A few of the most
glaring differences are:
There are many other differences but the important thing to remember is
that JavaScript and Java are separate languages. They are both useful for
different things; in fact they can be used together to combine their
advantages.
Advantages
Java Technology
Initially the language was called as “oak” but it was renamed as “Java” in
1995. The primary motivation of this language was the need for a platform-
independent (i.e., architecture neutral) language that could be used to create
software to be embedded in various consumer electronic devices.
Java is a programmer’s language.
Java is cohesive and consistent.
Except for those constraints imposed by the Internet environment,
Java gives the programmer, full control.
Finally, Java is to Internet programming where C was to system
programming.
Java has had a profound effect on the Internet. This is because; Java expands
the Universe of objects that can move about freely in Cyberspace. In a
network, two categories of objects are transmitted between the Server and
the Personal computer. They are: Passive information and Dynamic active
programs. The Dynamic, Self-executing programs cause serious problems in
the areas of Security and probability. But, Java addresses those concerns and
by doing so, has opened the door to an exciting new form of program called
the Applet.
Every time you that you download a “normal” program, you are risking a
viral infection. Prior to Java, most users did not download executable
programs frequently, and those who did scan them for viruses prior to
execution. Most users still worried about the possibility of infecting their
systems with a virus. In addition, another type of malicious program exists
that must be guarded against. This type of program can gather private
information, such as credit card numbers, bank account balances, and
passwords. Java answers both these concerns by providing a “firewall”
between a network application and your computer.
When you use a Java-compatible Web browser, you can safely download Java
applets without fear of virus infection or malicious intent.
Portability
The key that allows the Java to solve the security and portability problems is
that the output of Java compiler is Byte code. Byte code is a highly optimized
set of instructions designed to be executed by the Java run-time system,
which is called the Java Virtual Machine (JVM). That is, in its standard form,
the JVM is an interpreter for byte code.
Translating a Java program into byte code helps makes it much easier to run
a program in a wide variety of environments. The reason is, once the run-
time package exists for a given system, any Java program can run on it.
Beyond the language, there is the Java virtual machine. The Java virtual
machine is an important element of the Java technology. The virtual machine
can be embedded within a web browser or an operating system. Once a piece
of Java code is loaded onto a machine, it is verified. As part of the loading
process, a class loader is invoked and does byte code verification makes sure
that the code that’s has been generated by the compiler will not corrupt the
machine that it’s loaded on. Byte code verification takes place at the end of
the compilation process to make sure that is all accurate and correct. So byte
code verification is integral to the compiling and executing of Java code.
Overall Description
Java .Class
Picture showing the development process of JAVA Program
Java programming uses to produce byte codes and executes them. The first
box indicates that the Java source code is located in a. Java file that is
processed with a Java compiler called javac. The Java compiler produces a
file called a. class file, which contains the byte code. The .Class file is then
loaded across the network or loaded locally on your machine into the
execution environment is the Java virtual machine, which interprets and
executes the byte code.
Java Architecture
Compilation of code
When you compile the code, the Java compiler creates machine code (called
byte code) for a hypothetical machine called Java Virtual Machine (JVM).
The JVM is supposed to execute the byte code. The JVM is created for
overcoming the issue of portability. The code is written and compiled for
one machine and interpreted on all machines. This machine is called Java
Virtual Machine.
During run-time the Java interpreter tricks the byte code file into thinking
that it is running on a Java Virtual Machine. In reality this could be a Intel
Pentium Windows 95 or SunSARC station running Solaris or Apple
Macintosh running system and all could receive code from any computer
through Internet and run the Applets.
Simple
Java was designed to be easy for the Professional programmer to learn and
to use effectively. If you are an experienced C++ programmer, learning Java
will be even easier. Because Java inherits the C/C++ syntax and many of the
object oriented features of C++. Most of the confusing concepts from C++
are either left out of Java or implemented in a cleaner, more approachable
manner. In Java there are a small number of clearly defined ways to
accomplish a given task.
Object-Oriented
What Is JDBC?
JDBC is a Java API for executing SQL statements. (As a point of interest,
JDBC is a trademarked name and is not an acronym; nevertheless, JDBC is
often thought of as standing for Java Database Connectivity. It consists of a
set of classes and interfaces written in the Java programming language.
JDBC provides a standard API for tool/database developers and makes it
possible to write database applications using a pure Java API.
Using JDBC, it is easy to send SQL statements to virtually any relational
database. One can write a single program using the JDBC API, and the
program will be able to send SQL statements to the appropriate database.
The combinations of Java and JDBC lets a programmer write it once and run
it anywhere.
What Does JDBC Do?
The JDBC API supports both two-tier and three-tier models for database
access.
JAVA
Application Client machine
JDBC
DBMS-proprietary protocol
Java applet or
Html browser Client machine
(GUI)
HTTP, RMI, or
CORBA calls
Application
Server (Java)
JDBC Server machine
DBMS-proprietary
(business Logic)
protocol
Database server
DBMS
sends them to the user. MIS directors find the three-tier model very
attractive because the middle tier makes it possible to maintain control over
access and the kinds of updates that can be made to corporate data. Another
advantage is that when there is a middle tier, the user can employ an easy-
to-use higher-level API which is translated by the middle tier into the
appropriate low-level calls. Finally, in many cases the three-tier architecture
can provide performance advantages.
Until now the middle tier has typically been written in languages such as C or
C++, which offer fast performance. However, with the introduction of
optimizing compilers that translate Java byte code into efficient machine-
specific code, it is becoming practical to implement the middle tier in Java.
This is a big plus, making it possible to take advantage of Java's robustness,
multithreading, and security features. JDBC is important to allow database
access from a Java middle tier.
The JDBC drivers that we are aware of at this time fit into one of four
categories:
JDBC-ODBC Bridge
If possible, use a Pure Java JDBC driver instead of the Bridge and an ODBC
driver. This completely eliminates the client configuration required by ODBC.
It also eliminates the potential that the Java VM could be corrupted by an
error in the native code brought in by the Bridge (that is, the Bridge native
library, the ODBC driver manager library, the ODBC driver library, and the
database client library).
JDBC connectivity
Database:
A database management system (DBMS) is computer software designed for
the purpose of managing databases, a large set of structured data, and run
operations on the data requested by numerous users. Typical examples of
DBMSs include Oracle, DB2, Microsoft Access, Microsoft SQL Server, Firebird,
PostgreSQL, MySQL, SQLite, FileMaker and Sybase Adaptive Server
Enterprise. DBMSs are typically used by Database administrators in the
creation of Database systems. Typical examples of DBMS use include
accounting, human resources and customer support systems.
Originally found only in large companies with the computer hardware needed
to support large data sets, DBMSs have more recently emerged as a fairly
standard part of any company back office.
Description
The DBMS accepts requests for data from the application program and
instructs the operating system to transfer the appropriate data.
Organizations may use one kind of DBMS for daily transaction processing and
then move the detail onto another computer that uses another DBMS better
suited for random inquiries and analysis. Overall systems design decisions
are performed by data administrators and systems analysts. Detailed
database design is performed by database administrators.
Database servers are specially designed computers that hold the actual
databases and run only the DBMS and related software. Database servers are
usually multiprocessor computers, with RAID disk arrays used for stable
storage. Connected to one or more servers via a high-speed channel,
hardware database accelerators are also used in large volume transaction
processing environments.
SQL
Data definition: Defining tables and structures in the database (DDL used
to create, alter and drop schema objects such as tables and indexes).
List of SQL statements that can be issued against an Oracle database schema
are:
SERVLETS
Introduction
The Java web server is JavaSoft's own web Server. The Java web server is
just a part of a larger framework, intended to provide you not just with a web
server, but also with tools. To build customized network servers for any
Internet or Intranet client/server system. Servlets are to a web server, how
applets are to the browser.
About Servlets
Attractiveness of Servlets
There are many features of Servlets that make them easy and attractive to
use. These include:
Easily configured using the GUI-based Admin tool
Can be loaded and invoked from a local disk or remotely across
the network.
Can be linked together, or chained, so that one Servlets can call
another Servlets, or several Servlets in sequence.
Can be called dynamically from within HTML pages, using
server-side include tags.
Are secure - even when downloading across the network, the
Servlets security model and Servlets sandbox protect your
system from unfriendly behavior.
It’s extensible - you can inherit all your functionality from the base
classes made available to you.
It’s simple, small, and easy to use.
Features of Servlets:
Servlets are persistent. Servlet are loaded only by the web server
and can maintain services between requests.
Servlets are fast. Since Servlets only need to be loaded once, they
offer much better performance over their CGI counterparts.
Servlets are platform independent.
Servlets are extensible. Java is a robust, object-oriented
programming language, which easily can be extended to suit your
needs
Servlets are secure.
Servlets can be used with a variety of clients.
Loading Servlets:
From a remote location, for this a code base like http: // nine.eng / classes /
foo / is required in addition to the Servlets class name. Refer to the admin
GUI docs on Servlet section to see how to set this up.
Invoking Servlets
The client (browser) can invoke the Servlet directly using a URL, once
it has been mapped using the Servlet Aliases section of the admin GUI.
The Servlet can be invoked through server side include tags.
The Servlet can be invoked by placing it in the Servlets/ directory.
The Servlet can be invoked by using it in a filter chain.
Java server Pages is a simple, yet powerful technology for creating and
maintaining dynamic-content web pages. Based on the Java programming
language, Java Server Pages offers proven portability, open standards,
and a mature re-usable component model .The Java Server Pages
architecture enables the separation of content generation from content
presentation. This separation not eases maintenance headaches; it also
allows web team members to focus on their areas of expertise. Now, web
page designer can concentrate on layout, and web application designers
on programming, with minimal concern about impacting each other’s
work.
Features of JSP
Portability:
Java Server Pages files can be run on any web server or web-enabled
application server that provides support for them. Dubbed the JSP engine,
this support involves recognition, translation, and management of the
Java Server Page lifecycle and its interaction components.
Components
It was mentioned earlier that the Java Server Pages architecture can
include reusable Java components. The architecture also allows for the
embedding of a scripting language directly into the Java Server Pages file.
The components current supported include Java Beans, and Servlets.
Processing
Access Models:
A Java Server Pages file may be accessed in at least two different ways. A
client’s request comes directly into a Java Server Page. In this scenario,
suppose the page accesses reusable Java Bean components that perform
particular well-defined computations like accessing a database. The result
of the Beans computations, called result sets is stored within the Bean as
properties. The page uses such Beans to generate dynamic content and
present it back to the client.
In both of the above cases, the page could also contain any valid Java
code. Java Server Pages architecture encourages separation of content
from presentation.
1. The client sends a request to the web server for a JSP file by giving the
name of the JSP file within the form tag of a HTML page.
the server side. This Servlet is loaded in the memory and then it is
executed and the result is given back to the JavaWebServer and then
Eclipse IDE
Eclipse is an open-source software framework written primarily in Java. In its
default form it is an Integrated Development Environment (IDE) for Java
developers, consisting of the Java Development Tools (JDT) and the Eclipse
Compiler for Java (ECJ). Users can extend its capabilities by installing plug-
ins written for the Eclipse software framework, such as development toolkits
for other programming languages, and can write and contribute their own
plug-in modules. Language packs are available for over a dozen languages.
Architecture
The basis for Eclipse is the Rich Client Platform (RCP). The following
components constitute the rich client platform:
OSGi - a standard bundling framework
Core platform - boot Eclipse, run plug-ins
the Standard Widget Toolkit (SWT) - a portable widget toolkit
JFace - viewer classes to bring model view controller programming to
SWT, file buffers, text handling, text editors
the Eclipse Workbench - views, editors, perspectives, wizards
Eclipse's widgets are implemented by a widget toolkit for Java called SWT,
unlike most Java applications, which use the Java standard Abstract Window
Toolkit (AWT) or Swing. Eclipse's user interface also leverages an
intermediate GUI layer called JFace, which simplifies the construction of
applications based on SWT.
The key to the seamless integration of tools with Eclipse is the plugin. With
the exception of a small run-time kernel, everything in Eclipse is a plug-in.
This means that a plug-in you develop integrates with Eclipse in exactly the
same way as other plug-ins; in this respect, all features are created equal.
The Eclipse SDK includes the Eclipse Java Development Tools, offering an IDE
with a built-in incremental Java compiler and a full model of the Java source
files. This allows for advanced refactoring techniques and code analysis. The
IDE also makes use of a workspace, in this case a set of metadata over a flat
filespace allowing external file modifications as long as the corresponding
workspace "resource" is refreshed afterwards. The Visual Editor project
allows interfaces to be created interactively, hence allowing Eclipse to be
used as a RAD tool.
The following is a list of notable projects and plugins for the Eclipse IDE.
These projects are maintained by the Eclipse community and hosted by the
Eclipse Foundation.
1. Core projects
Rich Client Platform (Platform) is the core framework that all other Eclipse
projects are built on.
Java Development Tools (JDT) provides support for core Java SE. This
includes a standalone fast incremental compiler.
Tools projects
Web projects
J2EE Standard Tools (JST) extends the core JDT to include support for Java
EE projects. This includes EJBs, JSPs and Servlets.
Modelling projects
Other projects
Test and Performance Tools Platform (TPTP) which provides a platform that
allows software developers to build test and performance tools, such as
debuggers, profilers and benchmarking applications.
Applications Server
Common features
Java EE Servers
Following the success of the Java platform, the term application server
sometimes refers to a Java Platform--Enterprise Edition (J2EE) or Java EE 5
application server. Among the better known Java Enterprise Edition
application servers are WebLogic Server (BEA), JBoss (Red Hat), WebSphere
(IBM), JRun (Adobe), Apache Geronimo (Apache Foundation, based on IBM
WebSphere), Oracle OC4J (Oracle Corporation), Sun Java System Application
Server (Sun Microsystems) and Glassfish Application Server (based on Sun
Java System Application Server).
JOnAS application server was the first open source application server to have
achieved official compliance with the Java Enterprise Specification. BEA
delivered the first Java EE 5 certified application server followed by Sun
Microsystems' reference implementation GlassFish.
The Web modules are servlets and JavaServer Pages, and business logic is
built into Enterprise JavaBeans (EJB-3 and later). The Hibernate project
offers an EJB-3 container implementation for the JBoss Application server.
Tomcat from Apache and JOnAS from ObjectWeb are typical of containers
into which these modules can be put.
A Java Server Page (JSP) is a servlet from Java that executes in a Web
container—the Java equivalent of CGI scripts. JSPs are a way to create HTML
pages by embedding references to the server logic within the page. HTML
coders and Java programmers can work side by side by referencing each
other's code from within their own. JavaBeans are the independent class
components of the Java architecture from Sun Microsystems.
JBOSS
JBoss Application Server (or JBoss AS) is a free software / open source Java
EE-based application server. Because it is Java-based, JBoss AS is cross-
platform, usable on any operating system that Java supports.
Environment
JBoss AS 4.0 is a J2EE 1.4 application server, with embedded Tomcat 5.5.
Any JVM between 1.4 and 1.5 is supported. JBoss can run on numerous
operating systems including Windows, Mac OS X, many POSIX platforms, and
others, as long as a suitable JVM is present.
JBoss AS 4.2 is also a J2EE 1.4 application server, but EJB 3 is deployed by
default. It requires JDK 5. Tomcat 6 is bundled with it.
Product features
Clustering
Load balancing
Screens
SCREEN SHOTS
Coding
DbConnection.java
package pack;
import java.sql.Connection;
import java.sql.DriverManager;
Activate.java:-
/*
* To change this template, choose Tools | Templates
* and open the template in the editor.
*/
package action;
import java.io.IOException;
import java.io.PrintWriter;
import java.sql.Connection;
import java.sql.ResultSet;
import java.sql.Statement;
import javax.mail.Session;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpSession;
import pack.Dbconnection;
import pack.MailUtil;
/**
*
* @author IBN33
*/
public class activate extends HttpServlet {
/**
* Processes requests for both HTTP
* <code>GET</code> and
* <code>POST</code> methods.
*
* @param request servlet request
* @param response servlet response
* @throws ServletException if a servlet-specific error occurs
* @throws IOException if an I/O error occurs
*/
protected void processRequest(HttpServletRequest request, HttpServletResponse
response)
throws ServletException, IOException {
response.setContentType("text/html;charset=UTF-8");
PrintWriter out = response.getWriter();
try {
String id=request.getQueryString();
Connection con=Dbconnection.getConn();
Statement st=con.createStatement();
int i=st.executeUpdate("update user_reg set activate='yes',count='0' where
iduser_reg='"+id+"'");
if(i!=0){
ResultSet rt=st.executeQuery("select * from user_reg where
iduser_reg='"+id+"'");
if(rt.next()){
String name=rt.getString("name");
String uname=rt.getString("username");
}
else{
out.println("internal error occured...");
}
}
else{
out.println("internal error occured...");
}
catch(Exception e){
out.println(e);
}
finally {
out.close();
}
}
/**
* Handles the HTTP
* <code>POST</code> method.
*
* @param request servlet request
* @param response servlet response
* @throws ServletException if a servlet-specific error occurs
* @throws IOException if an I/O error occurs
*/
@Override
protected void doPost(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
processRequest(request, response);
}
/**
* Returns a short description of the servlet.
*
TESTING
2. Integrating Testing
Integration testing ensures that software and subsystems
work together as a whole. It tests the interface of all the
Security Evaluation of Pattern Classifiers under Attack Page 83
Security Evaluation of Pattern Classifiers under Attack
3. System Testing
Involves in-house testing of the entire system before
delivery to the user. It's aim is to satisfy the user the system
meets all requirements of the client's specifications.
4. Acceptance Testing
It is a pre-delivery testing in which entire system is tested
at client's site on real world data to find errors.
validation
The system has been tested and implemented
successfully and thus ensured that all the requirements as listed in the
software requirements specification are completely fulfilled. In case
of erroneous input corresponding error messages are displayed.
Conclusion:-
BIBLIOGRAPHY
REFERENCES
[1] R.N. Rodrigues, L.L. Ling, and V. Govindaraju, “Robustness of
Multimodal Biometric Fusion Methods against Spoof Attacks,” J. Visual
Languages and Computing, vol. 20, no. 3, pp. 169-179, 2009.
[4] G.L. Wittel and S.F. Wu, “On Attacking Statistical Spam Filters,” Proc.
First Conf. Email and Anti-Spam, 2004.
[5] D. Lowd and C. Meek, “Good Word Attacks on Statistical Spam Filters,”
Proc. Second Conf. Email and Anti-Spam, 2005.
[6] A. Kolcz and C.H. Teo, “Feature Weighting for Improved Classifier
Robustness,” Proc. Sixth Conf. Email and Anti-Spam, 2009.