351,791 research outputs found

    Analisa Infrastruktur Jaringan Wireless dan Local Area Network (WLAN) Meggunakan Wireshark Serta Metode Penetration Testing Kali Linux

    Get PDF
    Computer networks and the internet play an important role for the smooth running of various fields of work. One example of information and communication technology is the Wireless Local Area Network (WLAN) or also called wireless local network technology. The method used in this research is the Penetration Testing method, with the intention of analyzing the Wireless Network computer security system in the STMIK Bina Patria Laboratory. Testing is carried out with several activities, including identifying and exploiting vulnerabilities in computer network security. In analyzing the security of the WLAN network, it is carried out using the Penetration Testing method where a form of attack on the network is simulated, one of the operating systems that has the right specifications in this regard is Kali Linux. Wireless network is a network that is widely used in institutions and public places. Even though it has a security system, wireless networks can still be attacked by attackers

    Membangun Jaringan Virtual Private Network (Vpn) Dengan Metode Tunneling Menggunakan Ubuntu 11.10 Pada Laboratorium Jaringan STMIK PPKIA Pradnya Paramita Malang

    Full text link
    Local computer network is a computer network that is built on the college STMIK PPKIA Pradnya Paramita Malang and serves as a support learning tool for students. This private network built and designed by an Admin. Admin should always monitor network construction. In order for the construction of the network remains stable. But not forever a network admin will continue to be on a server computer, there are times when an Admin has a personal interest that requires Admin leave his job. It takes a special application that can to remote computers with a remote server.Virtual Private Network or VPN is better known by the tunneling method is implemented on a local network to develop local networks that exist in universities, facilitate an Admin to connect to servers and computers to remote computers with a remote server.VPN has been tested on a local network STMIK PPKIA Pradnya Paramita Malang Ubuntu11.10 operating system. The result of this research is the establishment of a network virtual private network (VPN) with tunneling method in laboratory network Ubuntu11.10 STMIK PPKIA Pradnya Paramita Malang

    Some experiences in using virtual machines for teaching computer networks

    Get PDF
    Laboratory practice is a fundamental aspect of computer network learning. Experiments tend to be very specific, frequently demanding changes in the local network topology and privileged access to the operating system configuration. These features impose a specific and exclusive laboratory for network teaching experiments. However, it is not always possible to provide such laboratory; the reality in most institutions is to have shared laboratories, used by different students and disciplines. This problem can be alleviated by the use of virtual machines, allowing each student to build his/her own network experiment, using the appropriate topology, and thus not disturbing the other activities running in the lab. This paper presents some experiences in using virtual machines to teach advanced aspects of computer networks, such as IPSec, firewalls and network services. Also, some key points are highlighted in order to show the benefits of virtual machines for pedagogical practice.Education for the 21 st century - impact of ICT and Digital Resources ConferenceRed de Universidades con Carreras en Informática (RedUNCI

    <Report> An operation of campus information processing network and an extension of academical working environments

    Get PDF
    At information Processing Center, Nagaoka University of Technology, a star local area network with Port Selector has been working since 1987 April. In 1989 February, an Ethernet local area network (CIP-LAN) and a host computer MV/20000-II have been installed and began to start. Although data communications between personal computers, work stations, and MV/20000-II become increasing, there are some problems which must be solved. We have not only investigated a style of the networking environments at university, but also developed a few of terminal interfaces. This paper describes an installation and experiences on campus computer network which is connected to wide area networks JUNET and N-1 net. Moreover, we discuss about an Ethernet multi interface for personal computer and evaluate the characteristics of a virtual UNIX, MV/UX, which is the operating system for MV/20000-II

    A comparative experimental design and performance analysis of Snort-based Intrusion Detection System in practical computer networks

    Get PDF
    As one of the most reliable technologies, network intrusion detection system (NIDS) allows the monitoring of incoming and outgoing traffic to identify unauthorised usage and mishandling of attackers in computer network systems. To this extent, this paper investigates the experimental performance of Snort-based NIDS (S-NIDS) in a practical network with the latest technology in various network scenarios including high data speed and/or heavy traffic and/or large packet size. An effective testbed is designed based on Snort using different muti-core processors, e.g., i5 and i7, with different operating systems, e.g., Windows 7, Windows Server and Linux. Furthermore, considering an enterprise network consisting of multiple virtual local area networks (VLANs), a centralised parallel S-NIDS (CPS-NIDS) is proposed with the support of a centralised database server to deal with high data speed and heavy traffic. Experimental evaluation is carried out for each network configuration to evaluate the performance of the S-NIDS in different network scenarios as well as validating the effectiveness of the proposed CPS-NIDS. In particular, by analysing packet analysis efficiency, an improved performance of up to 10% is shown to be achieved with Linux over other operating systems, while up to 8% of improved performance can be achieved with i7 over i5 processors

    Analysis and Demonstration of Selected Network Attacks in OS Windows

    Get PDF
    Tato práce popisuje síťové útoky, které se zaměřují na lokální sítě a operační systémem Windows. Cílem práce je vytvořit podklady pro výuku do volitelného předmětu Bezpečnost počítačových sítích, vyučovaného na Fakultě informačních technologií Vysokého učení technického v Brně.This thesis describes network attacks that focus on the local networks and operating system Windows. The aim is to create materials for teaching the elective course Security and Computer Networks which is taught at the Faculty of Information Technology Brno University of Technology.

    Технології комп’ютерної безпеки

    Get PDF
    В даній дипломній роботі було детально роглянуто основні етапи побудови комп’ютерних мереж а також робота з Firewall IPTables. Під час написання дипломної роботи було написано програму firewall під кампусну комп’ютерну мережу. Firewall , що служить дуже важливою роллю в мережах і захищає офісні, домашні комп’ютери в Глобальній комп’ютерній мережі від злому хакерів.Послідовно розглядаються основні принципи побудови та функціонування комп’ютерних мереж. Монографія містить актуальний матеріал довідково-аналітичного характеру по наступних темах: структура мережевих операційних систем, мережеві архітектури, опис топологій локальних мереж, мережеві Unix подібні операційні системи, мережеве адміністрування, мережеве адміністрування у системі Linux, штатні фаєрволи системи Linux, створення правил фаєрволу IPTable для корпоративних мереж. При цитуванні документа, використовуйте посилання http://essuir.sumdu.edu.ua/handle/123456789/20678Последовательно рассматриваются основные принципы построения и функционирования компьютерных сетей. Монография содержит актуальный материал справочно аналитического характера по следующим темам: структура сетевых операционных систем, сетевые архитектуры, описание топологии локальных сетей, сетевые Unix подобные операционные системы, сетевое администрирование, сетевое администрирование в системе Linux, штатные фаерволы системы Linux, создание правил фаервола Iptable для корпоративных сетей. При цитировании документа, используйте ссылку http://essuir.sumdu.edu.ua/handle/123456789/20678Basic principles of construction and functioning of computer networks are consistently examined. A monograph contains aktual material of certificate analytical character on the followings themes: structure of the network operating systems, network architecture, description of topologies of local networks, network Unix similar operating systems, network administration, network administration in the system of Linux, regular faervol systems of Linux, creation of rules of faervol of Iptable for corporate networks. When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789/20678Міжнародний економіко-гуманітарний університет ім. акад. С. Дем'янчук

    A comparative experimental design and performance analysis of Snort-based Intrusion Detection System in practical computer networks

    Get PDF
    As one of the most reliable technologies, network intrusion detection system (NIDS) allows the monitoring of incoming and outgoing traffic to identify unauthorised usage and mishandling of attackers in computer network systems. To this extent, this paper investigates the experimental performance of Snort-based NIDS (S-NIDS) in a practical network with the latest technology in various network scenarios including high data speed and/or heavy traffic and/or large packet size. An effective testbed is designed based on Snort using different muti-core processors, e.g., i5 and i7, with different operating systems, e.g., Windows 7, Windows Server and Linux. Furthermore, considering an enterprise network consisting of multiple virtual local area networks (VLANs), a centralised parallel S-NIDS (CPS-NIDS) is proposed with the support of a centralised database server to deal with high data speed and heavy traffic. Experimental evaluation is carried out for each network configuration to evaluate the performance of the S-NIDS in different network scenarios as well as validating the effectiveness of the proposed CPS-NIDS. In particular, by analysing packet analysis efficiency, an improved performance of up to 10% is shown to be achieved with Linux over other operating systems, while up to 8% of improved performance can be achieved with i7 over i5 processors
    corecore