12 research outputs found
Metodologias para monitorização integrada de redes
Mestrado em Engenharia Electrónica e TelecomunicaçõesDada a import^ancia que as redes assumem nos dias de hoje, e fundamental
garantir comunica c~oes sem falhas e, nesta area, a gest~ao de redes tem tido
um papel crucial atrav es da utiliza c~ao de diversas ferramentas de monitoriza
c~ao. A camada de Dados e a camada de Rede do modelo OSI usam,
respectivamente, endere cos MAC e endere cos IP para proporcionar a comunica
c~ao entre os diferentes dispositivos de rede. Uma vez que este e
um modelo bastante usado, e frequentemente explorado para actividades
maliciosas. Ataques de IP spoo ng e MAC spoo ng s~ao fonte de v arias
amea cas a seguran ca das redes, pelo que prevenir estes ataques e essencial
para se obter uma rede protegida e de con an ca.
Esta disserta c~ao apresenta alguns mecanismos e cientes de apoio a administra
c~ao de rede atrav es da realiza c~ao de tarefas de monitoriza c~ao espec cas
baseadas no uso do protocolo SNMP, que e suportado por grande parte
do equipamento de rede existente no mercado. O SNMP permite aceder
remotamente aos dispositivos de rede e obter informa c~ao contida nas suas
MIBs. Numa primeira etapa, foi proposto um algoritmo de descoberta da
topologia da rede que permite identi car os dispositivos presentes nesta, tal
como obter informa c~ao util da rede atrav es da sele c~ao e manipula c~ao da informa
c~ao da MIB; de seguida, e seguindo o mesmo princ pio, foi apresentado
um algoritmo para detetar ataques de MAC spoo ng e IP spoo ng. Foram
realizados v arios testes de avalia c~ao de desempenho e os resultados obtidos
provaram que as metodologias desenvolvidas fornecem um conjunto completo
de ferramentas de monitoriza c~ao de redes capaz de encontrar qualquer
dispositivo que suporte SNMP e de rapidamente e e cientemente detetar e
bloquear ataques de MAC spoo ng e IP spoo ng.Due to the importance of communication networks on current days, it is
essential to ensure seamless communications. Network management has a
crucial role in this area, through the use of many monitoring tools. The
Data Link and Network layers of the OSI model use, respectively, MAC
addresses and IP addresses to provide communication between the di erent
network devices. Since this is a widely used model, it is frequently explored
for various malicious activities. IP spoo ng and MAC spoo ng attacks are
the origin of many security threats, so preventing them is essential to obtain
a protected and trustful network.
This dissertation presents some e cient mechanisms to support network
administration by performing speci c monitoring tasks, based on the use
of SNMP protocol, which is supported by most of the existing network
equipment. SNMP allows to remotely access network devices and retrieve
information contained in their MIBs. On a rst stage, this Thesis proposes
a network discovery algorithm that allows identifying the devices present on
the network as well as obtaining useful network information by selecting and
manipulating the MIB information; then, following the same principle, the
Thesis presentes an algorithm to detect both IP and MAC spoo ng attacks.
Many performance evaluation tests were conducted and the obtained results
proved that the developed methodologies provide a complete set of network
monitoring tools that are able to nd any network device that supports
SNMP and quickly and e ciently detect and block MAC and IP spoo ng
attacks
Counter Unmanned Aircraft Systems Technologies and Operations
As the quarter-century mark in the 21st Century nears, new aviation-related equipment has come to the forefront, both to help us and to haunt us. (Coutu, 2020) This is particularly the case with unmanned aerial vehicles (UAVs). These vehicles have grown in popularity and accessible to everyone. Of different shapes and sizes, they are widely available for purchase at relatively low prices. They have moved from the backyard recreation status to important tools for the military, intelligence agencies, and corporate organizations. New practical applications such as military equipment and weaponry are announced on a regular basis – globally. (Coutu, 2020) Every country seems to be announcing steps forward in this bludgeoning field.
In our successful 2nd edition of Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets (Nichols, et al., 2019), the authors addressed three factors influencing UAS phenomena. First, unmanned aircraft technology has seen an economic explosion in production, sales, testing, specialized designs, and friendly / hostile usages of deployed UAS / UAVs / Drones. There is a huge global growing market and entrepreneurs know it. Second, hostile use of UAS is on the forefront of DoD defense and offensive planners. They are especially concerned with SWARM behavior. Movies like “Angel has Fallen,” where drones in a SWARM use facial recognition technology to kill USSS agents protecting POTUS, have built the lore of UAS and brought the problem forefront to DHS. Third, UAS technology was exploding. UAS and Counter- UAS developments in navigation, weapons, surveillance, data transfer, fuel cells, stealth, weight distribution, tactics, GPS / GNSS elements, SCADA protections, privacy invasions, terrorist uses, specialized software, and security protocols has exploded. (Nichols, et al., 2019) Our team has followed / tracked joint ventures between military and corporate entities and specialized labs to build UAS countermeasures.
As authors, we felt compelled to address at least the edge of some of the new C-UAS developments. It was clear that we would be lucky if we could cover a few of – the more interesting and priority technology updates – all in the UNCLASSIFIED and OPEN sphere.
Counter Unmanned Aircraft Systems: Technologies and Operations is the companion textbook to our 2nd edition. The civilian market is interesting and entrepreneurial, but the military and intelligence markets are of concern because the US does NOT lead the pack in C-UAS technologies. China does. China continues to execute its UAS proliferation along the New Silk Road Sea / Land routes (NSRL). It has maintained a 7% growth in military spending each year to support its buildup. (Nichols, et al., 2019) [Chapter 21]. They continue to innovate and have recently improved a solution for UAS flight endurance issues with the development of advanced hydrogen fuel cell. (Nichols, et al., 2019) Reed and Trubetskoy presented a terrifying map of countries in the Middle East with armed drones and their manufacturing origin. Guess who? China. (A.B. Tabriski & Justin, 2018, December)
Our C-UAS textbook has as its primary mission to educate and train resources who will enter the UAS / C-UAS field and trust it will act as a call to arms for military and DHS planners.https://newprairiepress.org/ebooks/1031/thumbnail.jp
Disruptive Technologies with Applications in Airline & Marine and Defense Industries
Disruptive Technologies With Applications in Airline, Marine, Defense Industries is our fifth textbook in a series covering the world of Unmanned Vehicle Systems Applications & Operations On Air, Sea, and Land. The authors have expanded their purview beyond UAS / CUAS / UUV systems that we have written extensively about in our previous four textbooks. Our new title shows our concern for the emergence of Disruptive Technologies and how they apply to the Airline, Marine and Defense industries. Emerging technologies are technologies whose development, practical applications, or both are still largely unrealized, such that they are figuratively emerging into prominence from a background of nonexistence or obscurity. A Disruptive technology is one that displaces an established technology and shakes up the industry or a ground-breaking product that creates a completely new industry.That is what our book is about. The authors think we have found technology trends that will replace the status quo or disrupt the conventional technology paradigms.The authors have collaborated to write some explosive chapters in Book 5:Advances in Automation & Human Machine Interface; Social Media as a Battleground in Information Warfare (IW); Robust cyber-security alterative / replacement for the popular Blockchain Algorithm and a clean solution for Ransomware; Advanced sensor technologies that are used by UUVs for munitions characterization, assessment, and classification and counter hostile use of UUVs against U.S. capital assets in the South China Seas. Challenged the status quo and debunked the climate change fraud with verifiable facts; Explodes our minds with nightmare technologies that if they come to fruition may do more harm than good; Propulsion and Fuels: Disruptive Technologies for Submersible Craft Including UUVs; Challenge the ammunition industry by grassroots use of recycled metals; Changing landscape of UAS regulations and drone privacy; and finally, Detailing Bioterrorism Risks, Biodefense, Biological Threat Agents, and the need for advanced sensors to detect these attacks.https://newprairiepress.org/ebooks/1038/thumbnail.jp
Air Traffic Management Abbreviation Compendium
As in all fields of work, an unmanageable number of abbreviations are used today in aviation for terms, definitions, commands, standards and technical descriptions. This applies in general to the areas of aeronautical communication, navigation and surveillance, cockpit and air traffic control working positions, passenger and cargo transport, and all other areas of flight planning, organization and guidance. In addition, many abbreviations are used more than once or have different meanings in different languages.
In order to obtain an overview of the most common abbreviations used in air traffic management, organizations like EUROCONTROL, FAA, DWD and DLR have published lists of abbreviations in the past, which have also been enclosed in this document. In addition, abbreviations from some larger international projects related to aviation have been included to provide users with a directory as complete as possible. This means that the second edition of the Air Traffic Management Abbreviation Compendium includes now around 16,500 abbreviations and acronyms from the field of aviation
Proceedings of the Second International Mobile Satellite Conference (IMSC 1990)
Presented here are the proceedings of the Second International Mobile Satellite Conference (IMSC), held June 17-20, 1990 in Ottawa, Canada. Topics covered include future mobile satellite communications concepts, aeronautical applications, modulation and coding, propagation and experimental systems, mobile terminal equipment, network architecture and control, regulatory and policy considerations, vehicle antennas, and speech compression
Safety and Reliability - Safe Societies in a Changing World
The contributions cover a wide range of methodologies and application areas for safety and reliability that contribute to safe societies in a changing world. These methodologies and applications include: - foundations of risk and reliability assessment and management
- mathematical methods in reliability and safety
- risk assessment
- risk management
- system reliability
- uncertainty analysis
- digitalization and big data
- prognostics and system health management
- occupational safety
- accident and incident modeling
- maintenance modeling and applications
- simulation for safety and reliability analysis
- dynamic risk and barrier management
- organizational factors and safety culture
- human factors and human reliability
- resilience engineering
- structural reliability
- natural hazards
- security
- economic analysis in risk managemen
Social work with airports passengers
Social work at the airport is in to offer to passengers social services. The main
methodological position is that people are under stress, which characterized by a
particular set of characteristics in appearance and behavior. In such circumstances
passenger attracts in his actions some attention. Only person whom he trusts can help him
with the documents or psychologically
ESARDA 39th Annual Meeting: 2017 Symposium
The 39th ESARDA symposium on Safeguards and Nuclear Non-Proliferation was held in Düsseldorf, Germany from 16-18 May, 2017. The Symposium has been preceded by meetings of the ESARDA Working Groups on 15 May 2017. The event has once again been an opportunity for research organisations, safeguards authorities and nuclear plant operators to exchange information on new aspects of international safeguards and non-proliferation, as well as recent developments in nuclear safeguards and non-proliferation related research activities and their implications for the safeguards community.JRC.G.II.7-Nuclear securit
Anales del XIII Congreso Argentino de Ciencias de la Computación (CACIC)
Contenido:
Arquitecturas de computadoras
Sistemas embebidos
Arquitecturas orientadas a servicios (SOA)
Redes de comunicaciones
Redes heterogéneas
Redes de Avanzada
Redes inalámbricas
Redes móviles
Redes activas
Administración y monitoreo de redes y servicios
Calidad de Servicio (QoS, SLAs)
Seguridad informática y autenticación, privacidad
Infraestructura para firma digital y certificados digitales
Análisis y detección de vulnerabilidades
Sistemas operativos
Sistemas P2P
Middleware
Infraestructura para grid
Servicios de integración (Web Services o .Net)Red de Universidades con Carreras en Informática (RedUNCI