270 research outputs found

    IoT Botnet Detection Using an Economic Deep Learning Model

    Full text link
    The rapid progress in technology innovation usage and distribution has increased in the last decade. The rapid growth of the Internet of Things (IoT) systems worldwide has increased network security challenges created by malicious third parties. Thus, reliable intrusion detection and network forensics systems that consider security concerns and IoT systems limitations are essential to protect such systems. IoT botnet attacks are one of the significant threats to enterprises and individuals. Thus, this paper proposed an economic deep learning-based model for detecting IoT botnet attacks along with different types of attacks. The proposed model achieved higher accuracy than the state-of-the-art detection models using a smaller implementation budget and accelerating the training and detecting processes.Comment: The paper under reviewing proces

    Strategy for Developing Expert-System-Based Internet Protocols (TCP/IP)

    Get PDF
    The Satellite Networks and Architectures Branch of NASA's Lewis Research is addressing the issue of seamless interoperability of satellite networks with terrestrial networks. One of the major issues is improving reliable transmission protocols such as TCP over long latency and error-prone links. Many tuning parameters are available to enhance the performance of TCP including segment size, timers and window sizes. There are also numerous congestion avoidance algorithms such as slow start, selective retransmission and selective acknowledgment that are utilized to improve performance. This paper provides a strategy to characterize the performance of TCP relative to various parameter settings in a variety of network environments (i.e. LAN, WAN, wireless, satellite, and IP over ATM). This information can then be utilized to develop expert-system-based Internet protocols

    Telecommunication of stabilizing signals in power systems

    Get PDF
    Deregulation of the power industry has occurred at a rapid pace, opening some promising competition between suppliers. The result of this competition should be to the benefit of customers.;Telecommunication plays a crucial role in integrating systems and ensuring smooth operation by way of exchanging data and information between various systems that are responsible for monitoring and control of the grid. For example, a Power System Stabilizer (PSS) controller could be placed at one of the generators and requires remote measurements. All the communication schemes within the network generate delays that are characterized in this project using OPNET Modeler. OPNET Modeler is also used to characterize the number of dropped packets.;As a case study, we consider a two-area four-generator (2A4G) and explore the role of communication delay on system stability. Those delays play an important role in the design of a controller that can help the damping of electro-mechanical oscillations between interconnected synchronous generators and therefore maintain the system stability. The network statistics are then imported into Simulink in order to visualize the speed of the shaft w2 as a function of time. Additional communication options to the inter-area oscillation problem are offered at the end of the thesis (use of Virtual Private Network (VPN), use of fiber optic dedicated network, or the use of IPv6 protocol)

    Network Traffic Analysis: A Case Study of ABU Network

    Get PDF
    The Internet is being viewed as a critical component of success by the researchers, teachers and students in the Universities and Colleges. The Objectives of thesis is to identify unproductive network based applications responsible for consuming valuable bandwidth of University network system and to enhance utility of productive applications on a University network. This research work, geared towards analysis on the internet traffic network’s of Ahmadu Bello University (ABU), Zaria as a case study. the monitoring of network traffic was conducted by bandwidth monitoring software, a packet sniffer (using Wireshark Version 165, SVR Rev 40429) configured as a gateway between the University network system and the internet over a 90-day monitoring period in a schedule of 15 minutes daily, 30 minutes weekly and 2 hours monthly. The data (packets) captures was further analysed using MATLAB which is a tool for graphing network data from which conclusions from the graphs was drawn that ABU’s current network traffic is underutilized and far from optimal in terms of Internet Inbound/Outbound traffic generated by its users (staff/students). It has also been observed that defensive bandwidth management is insufficient in respect to the institution’s aims and objectives on its network usage. This emphasises the need for improved bandwidth management and optimization. Keyword: Network monitoring traffic, Monitoring software (packet sniffer), Packet capture and Traffic analysis.

    Honeypot for wireless IoT networks

    Get PDF
    Ciele tejto prĂĄce leĆŸia v teoretickej analĂœze konceptu Internet vecĂ­ (IoT) a jeho bezpečnostnĂœch problĂ©mov, praktickom vĂœskume a vĂœvoji novĂ©ho unikĂĄt-neho zariadenia zvanĂ©ho "IoT honeypot". AnalytickĂĄ časĆ„ prĂĄce sumarizuje existujĂșce hardvĂ©rovĂ© a softvĂ©rovĂ© rieĆĄenia, a sĂșstredĂ­ sa na technolĂłgiu Soft-vĂ©rom definovanĂ©ho rĂĄdia (SDR), ktorĂĄ bola pouĆŸitĂĄ na vĂœvoj IoT honeypot-u. VyvĂ­janĂœ prototyp v sĂșčasnosti podporuje rozĆĄĂ­renĂœ Z-Wave protokol. AvĆĄak, dizajn je dosĆ„ univerzĂĄlny na to, aby v budĂșcnosti podporoval ďalĆĄie IoT protokoly. MotivĂĄciou tejto prĂĄce bolo vytvoriĆ„ zariadenie, ktorĂ© dokĂĄĆŸe zbieraĆ„ informĂĄcie o IoT komunikĂĄcii, detegovaĆ„ potenciĂĄlnych ĂștočnĂ­kov, a pĂŽsobiĆ„ ako nĂĄvnada, ktorĂĄ komplikuje ĂștočnĂ­kom objaviĆ„ a prebraĆ„ kon-trolu nad skutočnĂœmi nasadenĂœmi IoT zariadeniami, ako sĂș senzory, spĂ­nače, a podobne. VĂœstupom tejto prĂĄce je funkčnĂœ IoT honeypot, ktorĂœ podporuje viacero reĆŸimov fungovania (naprĂ­klad pasĂ­vny alebo interaktĂ­vny reĆŸim), a mĂŽĆŸe byĆ„ nasadenĂœ ako sĂșčasĆ„ Z-Wave infraĆĄtruktĂșry. Predstavuje komple-ment k ostatnĂœm bezpečnostnĂœm nĂĄstrojom a mechanizmom, ktorĂ© zvyĆĄujĂș Ășroveƈ bezpečnosti IoT infraĆĄtruktĂșry.The goals of this thesis lay among theoretical analysis of the Internet of Things (IoT) concept and its security issues, and practical research and development of a new unique device called "IoT honeypot." The analytical part of the thesis summarizes existing hardware and software solutions and concentrates on Software Defined Radio (SDR) technology, which was used for the development of IoT honeypot. The developed prototype currently supports a wide-spread Z-Wave protocol. However, the design is universal enough to support other IoT protocols in the future. The motivation of this thesis was to create a device that can collect information about IoT traffic, detect potential attackers, and act as a decoy that complicates attackers to discover and hack real deployed IoT devices, such as sensors, switches, and so on. The result of the thesis is a working IoT honeypot that supports multiple modes of operation (such as passive or interactive mode), and that can be deployed as a part of a Z-Wave infrastructure. It is as a complement to other security tools and mechanisms that increase the security of IoT infrastructure

    ImplementaciĂłn de un sistema SDN para la movilidad en redes OMNIRAN

    Get PDF
    This document details all the information needed to understand and test distributed mobility management using the SDN paradigm. This project stars by an analysis of the mobility problem in dense networks. Traditionally mobility has been managed with hierarchical approaches extending the current mobility protocols. But thinking in the future evolution of the network into dense environments some scalability problems appear. The traditional centralized elements may not be able to handle all the traffic in the network and bottlenecks appear at the Mobility Anchors. Nowadays, the problems related to scalability are mostly resolved with hardware upgrades, but in dense environments this couldn’t be enough and surely it would be quite expensive. To find a solution to this problem the IETF has chartered the Distributed Mobility Management (DMM) Group.This project focus on implementing a DMM-based mobility solution designed within the EU FP7 CROWD project. Once the analysis of the problem ended and the requirements of the theoretical solution were defined, we developed all the necessary elements to physically build a distributed network using SDN to manage layer 2 and layer 3.The entities of the network are defined by the CROWD projectin its related publications[9][10]. These districts were run using an SDN implementation called OpenFlow. With all the elements developed we proceed to perform the necessary tests in order to evaluate the distributed mobility management as a solution. This document explains the full design, execution and validationprocesses. Finally all the measurements and statistical data are detailed in order to have an approximation of the services that could achieve the developed network.Ingeniería Telemátic

    Performance Evaluation of MPEG-4 Video Transmission over IP-Networks: Best-Effort and Quality-of-Service

    Get PDF
    The demand for video communication over internet has been growing rapidly in recent years and the quality of video has become a challenging issue for video transmission. Different types of video coding standards like MPEG-2 and MPEG-4 have been developed to support application like video transmission. MPEG-2 which requires high bit rate transmission has been successful video standard for DVD and satellite digital broadcasting. On the other hand, MPEG-4 supports low bit rate and is suitable for transmitting video over IP networks. In this paper, MPEG-4 Video standard has been used for evaluating the performance of video transmission over two IP networks:- Best-effort and Quality of Service (QoS). For both of the best-effort and QoS IP networks, peak signal noise ratio (PSNR), throughput, frame and packet statistics have been considered as performance metrics. The calculated values of these performance metrics reflect that video transmission over QoS IP network is better than that of the best-effort network. Keywords: video transmission, mpeg, ip networks, best-effort, quality of service, ns-

    Information Technology for Effective Supervision of the Marketing Executives in the Banking Industry in Nigeria

    Get PDF
    New technology has greatly increased the choices for communicators. The study was undertaken to examine how information technology enhances the supervision of the marketing executives in the banking industry in Nigeria. A typical three-tier information model guided the study. The marketing executives of eight selected consolidated banks in Lagos, commercial city of Nigeria formed the population of the study. A sample of 180 marketing executives was determined using a percentage formula. Kendall’s   W Test statistics was used for the hypothesis testing. A calculated Chi-square result of 230.691 was obtained, which is significant as P-value of 0.000<0.05. Furthermore, with the Kendall’s coefficient of 0.641, an agreement among the responses was established that the personal computer, in both desktop and portable form, is a superb message centre for managers receiving and relaying information quickly to the marketing executives. These systems would provide a way to minimize the time spent on report writing, yet at the same time, would improve the accuracy of the marketing information collected. Banks that have computerized support system would report significant improvements in the productivity of their marketing executives and management effectiveness in the banking industry in Nigeria. Keywords:Information Technology, Effective Supervision, Marketing Executives, Personal Computers, Superb Message centre, World Wide Web, Three-Tier Networking, Banking industry in Nigeria

    Construction, Operation and Maintenance of Network System(Junior Level)

    Get PDF
    This open access book follows the development rules of network technical talents, simultaneously placing its focus on the transfer of network knowledge, the accumulation of network skills, and the improvement of professionalism. Through the complete process from the elaboration of the theories of network technology to the analysis of application scenarios then to the design and implementation of case projects, readers are enabled to accumulate project experience and eventually acquire knowledge and cultivate their ability so as to lay a solid foundation for adapting to their future positions. This book comprises six chapters, which include “General Operation Safety of Network System,” “Cabling Project,” “Hardware Installation of Network System,” “Basic Knowledge of Network System,” “Basic Operation of Network System,” and “Basic Operation and Maintenance of Network System.” This book can be used for teaching and training for the vocational skills certification of network system construction, operation, and maintenance in the pilot work of Huawei’s “1+X” Certification System, and it is also suitable as a textbook for application-oriented universities, vocational colleges, and technical colleges. In the meantime, it can also serve as a reference book for technicians engaged in network technology development, network management and maintenance, and network system integration. As the world’s leading ICT (information and communications technology) infrastructure and intelligent terminal provider, Huawei Technologies Co., Ltd. has covered many fields such as data communication, security, wireless, storage, cloud computing, intelligent computing, and artificial intelligence. Taking Huawei network equipment (routers, switches, wireless controllers, and wireless access points) as the platform, and based on network engineering projects, this book organizes all the contents according to the actual needs of the industry

    Proposed Framework for Securing Mobile Banking Applications from Man in the Middle Attacks

    Get PDF
    Mobile phone banking and payments continues to not only be a popular way of transacting business but it also seems to evolve rapidly. Despite its popularity however there seem to be some very genuine concerns on the security issues revolving around it, particularly in regard to man in the middle attacks. This paper seeks to propose a secure framework for communication between a mobile device and the back end server for protecting mobile banking applications from man-in-the-middle attacks without introducing further threats to the communication channel. Keywords: Defense- in-depth, Security, man in the middle attack, secure framework, bank serve
    • 

    corecore