Back to Search
Start Over
Blocking of operation of unauthorised software using MQTT
- Source :
- International Journal of Computational Vision and Robotics; 2019, Vol. 9 Issue: 6 p609-620, 12p
- Publication Year :
- 2019
-
Abstract
- This paper presents design and implementation of the 'Meerkat' system; a system that detects operation of software that is unauthorised. The MQTT protocol has been used for data communication in Meerkat system. The Meerkat system is largely comprised of three components: Meerkat client, the web application that operates as admin and the server software. The Meerkat client alerts the MQTT broker as soon as it detects operation of unauthorised software on the users PC. The admin receives the information from the MQTT broker immediately via the MQTT broker. To evaluate the performance of the system, the transmission time between messages delivered from the user/admin PC was measured. The measurements illustrated that it took, on average, 8~50 milliseconds for a message to be delivered. These results indicate that the messages are delivered quickly enough for the Meerkat system to be put into actual use.
Details
- Language :
- English
- ISSN :
- 17529131 and 1752914X
- Volume :
- 9
- Issue :
- 6
- Database :
- Supplemental Index
- Journal :
- International Journal of Computational Vision and Robotics
- Publication Type :
- Periodical
- Accession number :
- ejs51694425
- Full Text :
- https://doi.org/10.1504/IJCVR.2019.104041