12 research outputs found

    Metodologias para monitorização integrada de redes

    Get PDF
    Mestrado em Engenharia Electrónica e TelecomunicaçõesDada a import^ancia que as redes assumem nos dias de hoje, e fundamental garantir comunica c~oes sem falhas e, nesta area, a gest~ao de redes tem tido um papel crucial atrav es da utiliza c~ao de diversas ferramentas de monitoriza c~ao. A camada de Dados e a camada de Rede do modelo OSI usam, respectivamente, endere cos MAC e endere cos IP para proporcionar a comunica c~ao entre os diferentes dispositivos de rede. Uma vez que este e um modelo bastante usado, e frequentemente explorado para actividades maliciosas. Ataques de IP spoo ng e MAC spoo ng s~ao fonte de v arias amea cas a seguran ca das redes, pelo que prevenir estes ataques e essencial para se obter uma rede protegida e de con an ca. Esta disserta c~ao apresenta alguns mecanismos e cientes de apoio a administra c~ao de rede atrav es da realiza c~ao de tarefas de monitoriza c~ao espec cas baseadas no uso do protocolo SNMP, que e suportado por grande parte do equipamento de rede existente no mercado. O SNMP permite aceder remotamente aos dispositivos de rede e obter informa c~ao contida nas suas MIBs. Numa primeira etapa, foi proposto um algoritmo de descoberta da topologia da rede que permite identi car os dispositivos presentes nesta, tal como obter informa c~ao util da rede atrav es da sele c~ao e manipula c~ao da informa c~ao da MIB; de seguida, e seguindo o mesmo princ pio, foi apresentado um algoritmo para detetar ataques de MAC spoo ng e IP spoo ng. Foram realizados v arios testes de avalia c~ao de desempenho e os resultados obtidos provaram que as metodologias desenvolvidas fornecem um conjunto completo de ferramentas de monitoriza c~ao de redes capaz de encontrar qualquer dispositivo que suporte SNMP e de rapidamente e e cientemente detetar e bloquear ataques de MAC spoo ng e IP spoo ng.Due to the importance of communication networks on current days, it is essential to ensure seamless communications. Network management has a crucial role in this area, through the use of many monitoring tools. The Data Link and Network layers of the OSI model use, respectively, MAC addresses and IP addresses to provide communication between the di erent network devices. Since this is a widely used model, it is frequently explored for various malicious activities. IP spoo ng and MAC spoo ng attacks are the origin of many security threats, so preventing them is essential to obtain a protected and trustful network. This dissertation presents some e cient mechanisms to support network administration by performing speci c monitoring tasks, based on the use of SNMP protocol, which is supported by most of the existing network equipment. SNMP allows to remotely access network devices and retrieve information contained in their MIBs. On a rst stage, this Thesis proposes a network discovery algorithm that allows identifying the devices present on the network as well as obtaining useful network information by selecting and manipulating the MIB information; then, following the same principle, the Thesis presentes an algorithm to detect both IP and MAC spoo ng attacks. Many performance evaluation tests were conducted and the obtained results proved that the developed methodologies provide a complete set of network monitoring tools that are able to nd any network device that supports SNMP and quickly and e ciently detect and block MAC and IP spoo ng attacks

    Counter Unmanned Aircraft Systems Technologies and Operations

    Get PDF
    As the quarter-century mark in the 21st Century nears, new aviation-related equipment has come to the forefront, both to help us and to haunt us. (Coutu, 2020) This is particularly the case with unmanned aerial vehicles (UAVs). These vehicles have grown in popularity and accessible to everyone. Of different shapes and sizes, they are widely available for purchase at relatively low prices. They have moved from the backyard recreation status to important tools for the military, intelligence agencies, and corporate organizations. New practical applications such as military equipment and weaponry are announced on a regular basis – globally. (Coutu, 2020) Every country seems to be announcing steps forward in this bludgeoning field. In our successful 2nd edition of Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets (Nichols, et al., 2019), the authors addressed three factors influencing UAS phenomena. First, unmanned aircraft technology has seen an economic explosion in production, sales, testing, specialized designs, and friendly / hostile usages of deployed UAS / UAVs / Drones. There is a huge global growing market and entrepreneurs know it. Second, hostile use of UAS is on the forefront of DoD defense and offensive planners. They are especially concerned with SWARM behavior. Movies like “Angel has Fallen,” where drones in a SWARM use facial recognition technology to kill USSS agents protecting POTUS, have built the lore of UAS and brought the problem forefront to DHS. Third, UAS technology was exploding. UAS and Counter- UAS developments in navigation, weapons, surveillance, data transfer, fuel cells, stealth, weight distribution, tactics, GPS / GNSS elements, SCADA protections, privacy invasions, terrorist uses, specialized software, and security protocols has exploded. (Nichols, et al., 2019) Our team has followed / tracked joint ventures between military and corporate entities and specialized labs to build UAS countermeasures. As authors, we felt compelled to address at least the edge of some of the new C-UAS developments. It was clear that we would be lucky if we could cover a few of – the more interesting and priority technology updates – all in the UNCLASSIFIED and OPEN sphere. Counter Unmanned Aircraft Systems: Technologies and Operations is the companion textbook to our 2nd edition. The civilian market is interesting and entrepreneurial, but the military and intelligence markets are of concern because the US does NOT lead the pack in C-UAS technologies. China does. China continues to execute its UAS proliferation along the New Silk Road Sea / Land routes (NSRL). It has maintained a 7% growth in military spending each year to support its buildup. (Nichols, et al., 2019) [Chapter 21]. They continue to innovate and have recently improved a solution for UAS flight endurance issues with the development of advanced hydrogen fuel cell. (Nichols, et al., 2019) Reed and Trubetskoy presented a terrifying map of countries in the Middle East with armed drones and their manufacturing origin. Guess who? China. (A.B. Tabriski & Justin, 2018, December) Our C-UAS textbook has as its primary mission to educate and train resources who will enter the UAS / C-UAS field and trust it will act as a call to arms for military and DHS planners.https://newprairiepress.org/ebooks/1031/thumbnail.jp

    Disruptive Technologies with Applications in Airline & Marine and Defense Industries

    Get PDF
    Disruptive Technologies With Applications in Airline, Marine, Defense Industries is our fifth textbook in a series covering the world of Unmanned Vehicle Systems Applications & Operations On Air, Sea, and Land. The authors have expanded their purview beyond UAS / CUAS / UUV systems that we have written extensively about in our previous four textbooks. Our new title shows our concern for the emergence of Disruptive Technologies and how they apply to the Airline, Marine and Defense industries. Emerging technologies are technologies whose development, practical applications, or both are still largely unrealized, such that they are figuratively emerging into prominence from a background of nonexistence or obscurity. A Disruptive technology is one that displaces an established technology and shakes up the industry or a ground-breaking product that creates a completely new industry.That is what our book is about. The authors think we have found technology trends that will replace the status quo or disrupt the conventional technology paradigms.The authors have collaborated to write some explosive chapters in Book 5:Advances in Automation & Human Machine Interface; Social Media as a Battleground in Information Warfare (IW); Robust cyber-security alterative / replacement for the popular Blockchain Algorithm and a clean solution for Ransomware; Advanced sensor technologies that are used by UUVs for munitions characterization, assessment, and classification and counter hostile use of UUVs against U.S. capital assets in the South China Seas. Challenged the status quo and debunked the climate change fraud with verifiable facts; Explodes our minds with nightmare technologies that if they come to fruition may do more harm than good; Propulsion and Fuels: Disruptive Technologies for Submersible Craft Including UUVs; Challenge the ammunition industry by grassroots use of recycled metals; Changing landscape of UAS regulations and drone privacy; and finally, Detailing Bioterrorism Risks, Biodefense, Biological Threat Agents, and the need for advanced sensors to detect these attacks.https://newprairiepress.org/ebooks/1038/thumbnail.jp

    Air Traffic Management Abbreviation Compendium

    Get PDF
    As in all fields of work, an unmanageable number of abbreviations are used today in aviation for terms, definitions, commands, standards and technical descriptions. This applies in general to the areas of aeronautical communication, navigation and surveillance, cockpit and air traffic control working positions, passenger and cargo transport, and all other areas of flight planning, organization and guidance. In addition, many abbreviations are used more than once or have different meanings in different languages. In order to obtain an overview of the most common abbreviations used in air traffic management, organizations like EUROCONTROL, FAA, DWD and DLR have published lists of abbreviations in the past, which have also been enclosed in this document. In addition, abbreviations from some larger international projects related to aviation have been included to provide users with a directory as complete as possible. This means that the second edition of the Air Traffic Management Abbreviation Compendium includes now around 16,500 abbreviations and acronyms from the field of aviation

    Proceedings of the Second International Mobile Satellite Conference (IMSC 1990)

    Get PDF
    Presented here are the proceedings of the Second International Mobile Satellite Conference (IMSC), held June 17-20, 1990 in Ottawa, Canada. Topics covered include future mobile satellite communications concepts, aeronautical applications, modulation and coding, propagation and experimental systems, mobile terminal equipment, network architecture and control, regulatory and policy considerations, vehicle antennas, and speech compression

    Safety and Reliability - Safe Societies in a Changing World

    Get PDF
    The contributions cover a wide range of methodologies and application areas for safety and reliability that contribute to safe societies in a changing world. These methodologies and applications include: - foundations of risk and reliability assessment and management - mathematical methods in reliability and safety - risk assessment - risk management - system reliability - uncertainty analysis - digitalization and big data - prognostics and system health management - occupational safety - accident and incident modeling - maintenance modeling and applications - simulation for safety and reliability analysis - dynamic risk and barrier management - organizational factors and safety culture - human factors and human reliability - resilience engineering - structural reliability - natural hazards - security - economic analysis in risk managemen

    Social work with airports passengers

    Get PDF
    Social work at the airport is in to offer to passengers social services. The main methodological position is that people are under stress, which characterized by a particular set of characteristics in appearance and behavior. In such circumstances passenger attracts in his actions some attention. Only person whom he trusts can help him with the documents or psychologically

    ESARDA 39th Annual Meeting: 2017 Symposium

    Get PDF
    The 39th ESARDA symposium on Safeguards and Nuclear Non-Proliferation was held in Düsseldorf, Germany from 16-18 May, 2017. The Symposium has been preceded by meetings of the ESARDA Working Groups on 15 May 2017. The event has once again been an opportunity for research organisations, safeguards authorities and nuclear plant operators to exchange information on new aspects of international safeguards and non-proliferation, as well as recent developments in nuclear safeguards and non-proliferation related research activities and their implications for the safeguards community.JRC.G.II.7-Nuclear securit

    Anales del XIII Congreso Argentino de Ciencias de la Computación (CACIC)

    Get PDF
    Contenido: Arquitecturas de computadoras Sistemas embebidos Arquitecturas orientadas a servicios (SOA) Redes de comunicaciones Redes heterogéneas Redes de Avanzada Redes inalámbricas Redes móviles Redes activas Administración y monitoreo de redes y servicios Calidad de Servicio (QoS, SLAs) Seguridad informática y autenticación, privacidad Infraestructura para firma digital y certificados digitales Análisis y detección de vulnerabilidades Sistemas operativos Sistemas P2P Middleware Infraestructura para grid Servicios de integración (Web Services o .Net)Red de Universidades con Carreras en Informática (RedUNCI
    corecore