351,306 research outputs found

    Secure Identification in Social Wireless Networks

    Get PDF
    The applications based on social networking have brought revolution towards social life and are continuously gaining popularity among the Internet users. Due to the advanced computational resources offered by the innovative hardware and nominal subscriber charges of network operators, most of the online social networks are transforming into the mobile domain by offering exciting applications and games exclusively designed for users on the go. Moreover, the mobile devices are considered more personal as compared to their desktop rivals, so there is a tendency among the mobile users to store sensitive data like contacts, passwords, bank account details, updated calendar entries with key dates and personal notes on their devices. The Project Social Wireless Network Secure Identification (SWIN) is carried out at Swedish Institute of Computer Science (SICS) to explore the practicality of providing the secure mobile social networking portal with advanced security features to tackle potential security threats by extending the existing methods with more innovative security technologies. In addition to the extensive background study and the determination of marketable use-cases with their corresponding security requirements, this thesis proposes a secure identification design to satisfy the security dimensions for both online and offline peers. We have implemented an initial prototype using PHP Socket and OpenSSL library to simulate the secure identification procedure based on the proposed design. The design is in compliance with 3GPP‟s Generic Authentication Architecture (GAA) and our implementation has demonstrated the flexibility of the solution to be applied independently for the applications requiring secure identification. Finally, the thesis provides strong foundation for the advanced implementation on mobile platform in future

    Design and testing of a secure computer network

    Get PDF
    Bakalářská práce se zabývá zabezpečením počítačových sítí pomocí směrovačů a přepínačů. Záměrně nejsou využita žádná bezpečnostní zařízení, jako firewally a sondy IDS, IPS. Cílem je předvést zabezpečení privátní sítě směrovačem ve funkci firewallu a snížit tak náklady na IT infrastrukturu. V teoretické části nejdříve rozebírá, proč zabezpečení sítě potřebujeme a zaměřuje se na problémy síťové bezpečnosti. Práce také popisuje základní typy síťových útoků a síťových hrozeb. Dále zmiňuje hlavní bezpečnostní technologie a protokoly, využívané k zabezpečení sítí. V praktické části je vytvořena topologie sítě středního rozsahu, simulující oblast středně velké firmy. Dále je předvedena konfigurace směrovacího protokolu EIGRP, bezpečné VLAN a přístupových listů ACL. U směrovačů je nakonfigurován protokol PPP, SSH, technologie AAA a překlad síťových adres NAT. Pro přepínače nastavíme bezpečnostní funkce jako Port Security, IP Source Guard, Dynamic ARP Inspection, PortFast a BPDU Guard. Součástí práce jsou dvě laboratorní úlohy, zaměřené na zabezpečení sítě pomocí směrovačů a přepínačů. Úlohy jsou vytvořeny v nástroji Activity Wizard programu Cisco Packet Tracer.This bachelor’s thesis deals with the security of computer networks using routers and switches. Intentionally we don’t use any security devices, such as firewalls and sensors IDS, IPS. The aim is to demonstrate the security of a private network by router, which has the firewall function, to reduce the cost of the IT infrastructure. In the theoretical part discusses why we need network security and focuses on network security problems. The thesis also describes the basic types of network attacks and network threats. Subsequently we focus on main security technologies and protocols that are used for networks security. In the practical part a medium-sized network topology which simulates a medium-sized company area is created. Further we configure EIGRP routing protocol, security VLAN and Access Control List. We also set up protocol PPP, Secure Shell, AAA technology and Network Address Translation for routers. After that we set up some security function for switches, such as Port Security, IP Source Guard, Dynamic ARP Inspection, PortFast and BPDU Guard. The thesis includes two labarotory exercises, which focus on the security networks using routers and switches. Exercises are created by the tool Activity Wizard in the program Cisco Packet Tracer.

    Implementation of Security Protocol for Wireless Computer in Virtual Laboratory

    Get PDF
    Implementing security model for wireless computer network we require effective Wireless intranet setup; many models are in working to funct ion. This thing is focused at developing a security model to secure a Wireless Computer network of any institution. The model will develop to secure a Wireless Computer class - room through an authentication server by supplying authentication constraint at registration process, which is used at login for comparison then it will store. Fingerprint is used to make sure that a user is who claims to be. Time duration for access is allotted fo r a user, after which primary constraint will supplied for re - authentica tion. While a user is still logged - on, some security questions will pose intermittently to avoid counterfeiting. The methodology used for this research will be Structured System Analysis and Design (SSAD). For coding the program Java Programming Language w ill use and MySQL as a database. The final result of the system will secure model that guarantees secure access. This is different from the security of other wireless virtual class - room which uses only users name, pin or registration number

    Computer Network Security- The Challenges of Securing a Computer Network

    Get PDF
    This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies

    NETWORK PROGRAMMABILITY FOR NETWORK ISSUE USING PARAMIKO LIBRARY

    Get PDF
    In a company, information technology is needed, especially computer networks, to facilitate data communication. The management of a computer network, of course, requires good administration. The criteria for whether or not a network is good can be seen from the performance, reliability, and security indicators so that it will not cause network issues. Events such as server downs, data loss, lost connections, and undetected computers cause the organization's business performance to be disrupted. This study's purpose is to detect network issues with network programmability technology automatically. Paramiko library supports network automation systems and implements OSPF routing protocol in finding the shortest path to send network packets. This study uses the PPDIOO flow, namely prepare, plan, design, implement, operate, and optimize, because it is considered by the flow of making network detection tools. The results showed that the design and implementation of a small-scale network were successfully built by utilizing network programmability technology and the paramiko library, which helps detect network conditions at any time. This design has a dashboard, provisioning, assurance, and policy features that allow administrators to manage and monitor information on each network device. The network design is fitted with REST-API technology and security through a secure shell (ssh) from the Network Controller that can detect the device's connection conditions and the device's health and update the DNS configuration used. Network Issues that have been seen are devices being down, and the connection being lost. Future research can improve features for network troubleshooting when the connection is lost

    A Neural Network Based Security Tool for Analyzing Software

    Get PDF
    Part 4: Intelligent Computational SystemsInternational audienceThe need to secure software application in today’s hostile computer environment cannot be overlooked. The increase in attacks aimed at software directly in the last decade and the demand for more secure software applications has drawn the attention of the software industry into looking for better ways in which software can be developed more securely. To achieve this, it has been suggested that security needs to be integrated into every phase of software development lifecycle (SDLC). In line with this view, security tools are now used during SDLC to integrate security into software applications. Here, we propose a neural network based security tool for analyzing software design for security flaws. Our findings show that the trained neural network was able to match possible attack patterns to design scenarios presented to it. With the information on the attack pattern identified, developers can make informed decision in mitigating risks in their designs

    A Quantum Key Distribution Network Through Single Mode Optical Fiber

    Full text link
    Quantum key distribution (QKD) has been developed within the last decade that is provably secure against arbitrary computing power, and even against quantum computer attacks. Now there is a strong need of research to exploit this technology in the existing communication networks. In this paper we have presented various experimental results pertaining to QKD like Raw key rate and Quantum bit error rate (QBER). We found these results over 25 km single mode optical fiber. The experimental setup implemented the enhanced version of BB84 QKD protocol. Based upon the results obtained, we have presented a network design which can be implemented for the realization of large scale QKD networks. Furthermore, several new ideas are presented and discussed to integrate the QKD technique in the classical communication networks.Comment: This paper has been submitted to the 2006 International Symposium on Collaborative Technologies and Systems (CTS 2006)May 14-17, 2006, Las Vegas, Nevada, US
    corecore