Back to Search Start Over

Blocking of operation of unauthorised software using MQTT

Authors :
Hwang, K.
Source :
International Journal of Computational Vision and Robotics; 2019, Vol. 9 Issue: 6 p609-620, 12p
Publication Year :
2019

Abstract

This paper presents design and implementation of the 'Meerkat' system; a system that detects operation of software that is unauthorised. The MQTT protocol has been used for data communication in Meerkat system. The Meerkat system is largely comprised of three components: Meerkat client, the web application that operates as admin and the server software. The Meerkat client alerts the MQTT broker as soon as it detects operation of unauthorised software on the users PC. The admin receives the information from the MQTT broker immediately via the MQTT broker. To evaluate the performance of the system, the transmission time between messages delivered from the user/admin PC was measured. The measurements illustrated that it took, on average, 8~50 milliseconds for a message to be delivered. These results indicate that the messages are delivered quickly enough for the Meerkat system to be put into actual use.

Details

Language :
English
ISSN :
17529131 and 1752914X
Volume :
9
Issue :
6
Database :
Supplemental Index
Journal :
International Journal of Computational Vision and Robotics
Publication Type :
Periodical
Accession number :
ejs51694425
Full Text :
https://doi.org/10.1504/IJCVR.2019.104041