63 research outputs found

    LOCAL AREA NETWORK MANAGEMENT (Case Study at Assessment and Development Information Technology Units Brawijaya University Malang)

    Full text link
    The purpose of this study was to know the management local area network at Assessment and Development Information Technology units, furthermore this study focusing on network management functions that applied by Assessment and Development Information Technology Units. This study will explain about the implementation of network management functions in the local area network management. The research method employ in this research is by using descriptive qualitative method by study case approach. The results of this study was in the implementation of network management functions Assessment and Development Information Technology units already applied all five network management functions in the local area network management. Each functions represented as a network management components in managing Assessment and Development Information Technology units local area network. Since the network management functions represented as a network management components it needed improvement in each network management functions policies and measurements

    Wireless local area network management frame denial- of-service attack detection and mitigation schemes

    Get PDF
    Wireless Local Area Networks (WLAN) are increasingly deployed and in widespread use worldwide due to its convenience and low cost. However, due to the broadcasting and the shared nature of the wireless medium, WLANs are vulnerable to a myriad of attacks. Although there have been concerted efforts to improve the security of wireless networks over the past years, some attacks remain inevitable. Attackers are capable of sending fake de-authentication or disassociation frames to terminate the session of active users; thereby leading to denial of service, stolen passwords, or leakage of sensitive information amongst many other cybercrimes. The detection of such attacks is crucial in today's critical applications. Many security mechanisms have been proposed to effectively detect these issues, however, they have been found to suffer limitations which have resulted in several potential areas of research. This thesis aims to address the detection of resource exhaustion and masquerading DoS attacks problems, and to construct several schemes that are capable of distinguishing between benign and fake management frames through the identification of normal behavior of the wireless stations before sending any authentication and de-authentication frames. Thus, this thesis proposed three schemes for the detection of resource exhaustion and masquerading DoS attacks. The first scheme was a resource exhaustion DoS attacks detection scheme, while the second was a de- authentication and disassociation detection scheme. The third scheme was to improve the detection rate of the de-authentication and disassociation detection scheme using feature derived from an unsupervised method for an increased detection rate. The effectiveness of the performance of the proposed schemes was measured in terms of detection accuracy under sophisticated attack scenarios. Similarly, the efficiency of the proposed schemes was measured in terms of preserving the resources of the access point such as memory consumptions and processing time. The validation and analysis were done through experimentation, and the results showed that the schemes have the ability to protect wireless infrastructure networks against denial of service attacks

    Network performance monitors

    Get PDF
    Over the last 10 years both industry and academia have conducted extensive research and development in the areas of local area network management and performance. This thesis investigates some different ways of measuring the performance of local area networks and studies hardware and software systems designed to watch over network performance and events. These systems are termed network performance monitors. As part of the thesis, a network performance monitor has been implemented to monitor TOOLSNET, an Ethernet based local area network, supervised by the Engineering Tools Technology group at Compugraphic Corporation. This network performance monitor is called TOOLSNET ANALYSIS PACKAGE, or TAP for short. TAP runs Monday through Friday, from 8 a.m. to 5 p.m. to monitor TOOLSNET performance during working hours. A summary of the measurements from one of these 5 day sessions is reported in this paper. This summary includes the following tables: one showing a system by system contribution to TOOLSNET traffic for the session; another that shows the amount the network was utilized each day of the session; another that shows the total number of random errors experienced by TOOLSNET during the session; another that shows asymptotic throughput utilization, perceived utilization, relative load, and average response time for each day of the session; another that shows source-to-destination traffic for each day of the session

    Design and Logistics for a LAN Management Course

    Get PDF
    This paper outlines an implementation for a hands-on Local Area Network (LAN) management course in the undergraduate curriculum of a department of Information Systems. Three major problems are addressed: faculty preparation, resource allocation, and course design/logistics. There are special difficulties in designing such a course because of the hardware preparation involved and the assignment of supervisor rights to a large number of students simultaneously for a single file server. A course outline and a sample practical exercise are given. This course has been successfully implemented and received a favorable student response

    Web-Based Network Device Monitoring Tool Using Simple Network Management Protocol (Snmp)

    Get PDF
    The Internet enables different computer networks to join together into one network in which many different models of network devices can co-exist with each other. Standard management protocol is necessary for the purpose of managing these networks. SNMP (Simple Network Management Protocol), one of the standard protocols, is designed for this open-class management function and is successfully implemented. This thesis suggests a monitoring of network device statistical data from a remote place. This approach reduced the complexity of existing techniques, which are basically operable in specific operating system and having no standard Graphical User Interface (GUI). To address this problem, a system based on WWW standard tool is developed which is SNMP compatible as well as operable with any network device. The network device monitoring tool is a client program, which is managed and could be contacted with the server program. A web server and a browser are to provide static, dynamic, and interactive management information. A web server, which plays a managing role, offers a variety of types of information. An SNMP agent, which cooperates with a web server, uses SNMP protocol and provides access to management information of network devices/agents. The implementation of the user interface using the web-based technique of Java Applet makes it possible for a manager to easily search and manage agent Management Information Base (Mill) through a browser. Java SNMP class files and SNMP Applet Server (SAS) classes are used inside the Web-server to communicate with network devices. The network device monitoring tool is configured to collect network statistical data. It can monitor the real time graph on the basis of MIB variable from remote place and shows more efficient than the existing tool

    Curriculum Subcommittee Minutes, January 12, 2006

    Get PDF
    College of Business New Course School of Accountancy Delete course Department of Business Information Systems New Course Prerequisite Change Prefix Change, Course Description Change Prefix Change, Course Description Change, Title Change Prefix Change, Course Description Change, Prerequisite Change, Title Change Prefix Change, Course Number Change, Course Description Change, Title Change Prefix Change, Course Number Change, Prerequisite Change Delete Course College of Education and Human Services Course Description Change Remove Prerequisite Prerequisite Change Title Change, Course Description Change Department of Communicative Disorders and Deaf Education University Studies Request Department of Family, Consumer, and Human Development Remove Prerequisites, Remove University Studies Designation Prerequisite Change, University Studies Request Department of Health, Physical Education and Recreation Title Change Course Description Change, Course Number Change Prerequisite Change Title Change, Prerequisite Change, Course Description Change Credit Hour Change, Prerequisite Change Department of Mechanical and Aerospace Engineering Prerequisite Change Department of Art New Course Add Dual List Course Prefix Change Prerequisite Change Title Change, Prerequisite Change, Course Description Change Title Change Title Change, Prerequisite Change, Course Description Change, Remove Repeatable for Credit Delete Course Department of English New Course Title Change, Course Description Change Delete Course Interior Design Program Credit Hour Change Department of Journalism and Communication Prerequisite Change Remove Prerequisite Department of Landscape Architecture and Environmental Planning New Course Prerequisite Change Add Dual List, Credit Hour Change Prerequisite Change, Course Description Change Course Description Change Title Change, Course Description Change Title Change, Credit Hour Change, Prerequisite Change Department of Languages, Philosophy, and Speech Communication New Course Delete Course Department of Music New Course Title Change, Prerequisite Change Remove Prerequisite Prerequisite Change Department of Political Science New Course Title Change Department of Sociology, Social Work and Anthropology University Studies Request Department of Theatre Arts Title Change Add Dual List Department of Aquatic, Watershed, and Earth Resources Remove Prerequisite Department of Biology New Course Prerequisite Change Department of Chemistry and Biochemistry New Course Title Change, Prerequisite Change, Course Description Change Department of Computer Science New Course Title Change, Prerequisite Change, Course Description Change Department of Geology New Course Department of Mathematics and Statistics New Course Prerequisite Change Course Description Change Inactivate Course Delete Course Other Removing the Business Analysis and Decision Making Specialization Removing the Business Information Systems Specialization Removing the International Economics Specialization Removing the Quantitative Economic Analysis Specialization Suspending enrollment for the Business Information Technology and Education (BITE) and Marketing Education (MKED) programs Offering a Master of Science Degree: Plan C Engineering and Technology Education Degree Offering a Master of Science in Computer Engineering and a Master of Engineering in Computer Engineering Changing the name of the Management Information Systems Emphasis to Managerial Emphasis; changing the name of the Office Systems Management Emphasis to Training and Development Emphasis; and changing the name of the Electronic Commerce Emphasis to Technical Emphasis Suspending enrollment for Two-Year Certificate and Diploma Programs in the Department of Music College of Business courses that need additional wording added to the prerequisites Curriculum Subcommittee Handboo

    The association of external auditor's attributes with management fraud risk assessment in financial reporting: empirical evidence from Yemen

    Get PDF
    As stated by the International Standard of Auditing (ISA No. 240), the effectiveness of the external auditors' attributes is the primary process in management fraud risk assessment (MFRA). Therefore, the aim of this study is to examine the associations of external auditor effectiveness-related attributes and independent-related factors with MFRA in the context of Yemen. To achieve the objective of this study, questionnaires were distributed out to 410 external auditors working in private audit firms and the Yemeni Central Organization for Control and Accounting (COCA) for the year 2012. A total of 273 questionnaires were returned back out of which 19 were unusable. As such, the final sample of this study consists of 254 external auditors. Multiple regression analysis was used to test the study's hypotheses. This study finds positive associations of the external auditor's effectiveness score and external auditor's independence score with MFRA. Furthermore, questioning discussion ability, professional qualification, fraud detection experience, information technology (IT) skill, training on fraud detection, and social relationships are reported to have positive and significant associations with MFRA, while job position is found to have a negative association. The findings of this study indicate that Yemeni government and COCA should issue new regulations to increase the external auditors' awareness and effectiveness towards MFRA. This study also indicates that the audit profession in Yemen needs more control, regulations, laws and policies to enhance the structure of the external auditors' decision in issues related to MFRA in order to protect the interests of demand-supply sides of audit services and the related parties. Moreover, this study has implications for the Yemeni policy makers and government to enrich the external auditors' effectiveness and independence by issuing new regulations, new laws, and applying more control on the quality of auditing profession to protect the economy and the society stability

    Monitoring Aktivitas Komputer Jaringan LAN Menggunakan Net Monitor For Employees Berbasis Android

    Get PDF
    Abstrak—Aplikasi android Net Monitor For Employees merupakan aplikasi android yang begitu mudah digunakan untuk memonitoring atau memantau serta mengendalikan komputer yang terhubung dalam jaringan LAN atau WLAN. Tujuan kajian ini adalah memanfaatkan aplikasi Net Monitor For Employees untuk mengontrol dan memonitoring aktivitas komputer agen yang sedang aktif di dalam jaringan dan bisa untuk mendukung proses belajar dan mengajar yang efektif misalnya digunakan oleh lembaga pelatihan komputer, materi praktek di lab komputer, serta juga sangat digunakan untuk mengefisienkan opersional kantor pada suatu perusahaan dalam melakukan pemantauan aktivitas komputer yang digunakan oleh para pegawai perusahaan tersebut. Setiap karyawan yang disediakan komputer pada setiap mejanya dapat membuka komputer dan memungkinkan browsing yang tidak diinginkan. Hal inilah yang menyebabkan kurangnya pemantauan, Pemanfaatan aplikasi ini juga memungkinkan para manajer dan pemilik bisnis untuk melacak aktivitas, keterlibatan kerja, kinerja, dan produktivitas karyawan mereka. Para manajer dan pemilik bisnis tidak dapat memantau secara keseluruhan kinerja dari karyawanya satu per satu. Tetapi dengan adanya aplikasi ini diharapkan kinerja karyawanya dapat tetap terpantau oleh manager ataupun pemilik bisnis melalui komputer yang berada di ruangan ataupun dari gadget smartphone androidnya yang terhubung dalam satu jaringan LAN/WLAN. Dan dapat dimanfaatkan juga untuk para Administrator Jaringan untuk memantau aktivitas komputer dalam menajaga sistem keamaan jaringan yang dibuat dan mengurangi resiko terjadi ganguan yang tidak diinginkan

    A management information system for the 341st Security Police Group

    Get PDF
    corecore