Remote computer
Pro Research Analysisby 
Searched over 200M research papers for "remote computer"
Remote Computer Access: Enhancing Security and Efficiency
Introduction to Remote Desktop Protocols
Remote desktop protocols (RDP) are essential for connecting and interacting with computers remotely. These protocols enable a server component on the remote computer to share its desktop with a client component on an end-user device. However, vulnerabilities in widely used implementations like Microsoft Remote Desktop and RealVNC have exposed remote servers to new attack vectors, particularly in cyber-physical systems (CPS) where low-trust client devices connect to critical systems1.
Security Concerns and Solutions
Intrusion Detection Systems
To mitigate the risks associated with remote desktop connections, a network-based intrusion detection system (NIDS) has been proposed. This system uses machine learning to detect malicious TCP packets that could exploit vulnerabilities in the RDP server. Empirical evaluations have shown that this method can effectively detect malicious packets with a high true positive rate and a very low false positive rate1.
Trusted Execution Environments
Another approach to enhancing security in remote computing is the use of trusted execution environments (TEEs). MeetGo, an FPGA-based TEE, addresses insider threats by providing a secure environment for applications like cryptocurrency wallets and GPGPU programs. This hardware-centric solution ensures that users' private data remains safe from adversarial administrators of remote servers7.
Side-Channel Information Leakage
Despite encryption, remote desktop protocols can still suffer from side-channel information leakage. Research has shown that machine learning techniques can uncover user activities with high accuracy, even when traffic is encrypted. This highlights the need for both users and providers of remote desktop services to be aware of and address these privacy concerns9.
Enhancing Remote Control Capabilities
Wake-on-LAN Technology
Remote control systems have significantly improved work efficiency by allowing users to control computers as if they were physically present. However, challenges arise when the remote computer is in a shutdown state. Wake-on-LAN technology, combined with various software solutions, enables users to wake up and control a computer remotely, even if it is initially turned off2.
Portable and Lightweight Terminals
The Remote Screen/Keyboard model offers flexibility and minimal need for terminal upgrades. This model supports lightweight, ultra-portable, wireless terminals, allowing users to access complex applications and files from their desktop computers. Performance statistics suggest that this model is not only user-friendly but also economically viable4.
Mobile and Cellular Access
Systems like Rajicon and Android-based remote desktop clients have been developed to facilitate remote PC access via mobile devices. Rajicon, for instance, provides an easy-to-use interface for operating a PC's GUI via a cellular phone, supporting image-based navigation and various keyboard and mouse operations6. Similarly, Android-based clients use Virtual Network Computing (VNC) protocols to allow users to view and interact with remote desktops from their mobile devices10.
Remote Computing for Specialized Applications
Signal Analysis and High-Performance Computing
Remote computing systems have been developed for specialized applications such as signal analysis. These systems allow users to perform complex mathematical operations like Fourier transforms on time data from a remote terminal. The modular software and efficient hardware interfaces ensure rapid and accurate data processing3.
Simplifying Access to Supercomputers
The Remote Computation System (RCS) aims to simplify access to high-performance computers for inexperienced users. By providing an easy-to-use mechanism for utilizing computational resources remotely, RCS ensures that modern parallel algorithms on supercomputers are accessible and efficient, minimizing response times8.
Conclusion
Remote computer access has revolutionized how we interact with and control distant systems, enhancing both security and efficiency. From advanced intrusion detection systems and trusted execution environments to portable terminals and mobile access solutions, the landscape of remote computing continues to evolve. As these technologies advance, addressing security concerns and improving user experience remain paramount.
Sources and full results
Most relevant research papers on this topic