442 research outputs found

    Peningkatan Keamanan pada Simple Network Time Protocol (SNTP) untuk Mendeteksi Cybercrime di dalam Aktivitas Jaringan

    Get PDF
    Today's cybercrime methods are extremely diverse. The methods employed by attackers are becoming more diverse and intricate. Malicious software, commonly referred to as malware, is utilized in these various attacks. Malware threats and their propagation can be accomplished in several different ways. Good governance facilitates prevention via migration, assisting the security team and network infrastructure IT. This paper discusses efforts to enhance the security of the Simple Network Time Protocol (SNTP) to detect cybercrime on the network. Based on the results of the conducted experiments, we determined that by updating the Simple Network Time Protocol, implementing the client-server antivirus, and scanning every client connected to the local network or centrally, we could detect the types of attacks that frequently occur on the network system, thereby protecting all client computers from malware, viruses, worms, and Trojan horses. Based on the antivirus migration data, the employed research method can find information on cybercrimes that involve malware that enters the network and is successfully cleaned or quarantined before being automatically blocked

    A time-slot scheduling algorithm for e-health wireless sensor networks

    Get PDF
    http://www.ieee-healthcom.org/2010/about.htmlFor e-health wireless sensor networks presenting significant traffic loads, MAC protocols based on deterministic scheduling algorithms are consensually considered more adequate than protocols based on random access algorithms. Indeed, TDMA-based MAC protocols are able to control the delay bound and save power by eliminating collisions. However, these protocols always require some expedite scheme to assign the superframe time-slots to the network devices that need to transmit data. Knowing that patients of an e-health wireless network are normally monitored by the same number and types of motes, originating a regular traffic pattern, a simple collaborative time-slot allocation algorithm can be achieved, as introduced in this paper. In the proposed algorithm, the announcement of time-slot allocation by the network coordinator is avoided, which helps to improve the packet delivery ratio and reduce the energy consumption in the e–health wireless network.(undefined

    Network Time Synchronization: A Full Hardware Approach

    Get PDF
    Complex digital systems are typically built on top of several abstraction levels: digital, RTL, computer, operating system and software application. Each abstraction level greatly facilitates the design task at the cost of paying in performance and hardware resources usage. Network time synchronization is a good example of a complex system using several abstraction levels since the traditional solutions are a software application running on top of several software and hardware layers. In this contribution we study the case where a standards-compliant network time synchronization solution is fully implemented in hardware on a FPGA chip doing without any software layer. This solution makes it possible to implement very compact, inexpensive and accurate synchronization systems to be used either stand-alone or as embedded cores. Some general aspects of the design experience are commented together with some figures of merit. As a conclusion, full hardware implementations of complex digital systems should be seen as a feasible design option, from which great performance advantages can be expected, provided that we can find a suitable set of tools and control the design development costs

    Fast-Convergence Microsecond-Accurate Clock Discipline Algorithm for Hardware Implementation

    Get PDF
    Discrete microprocessor-based equipment is a typical synchronization system on the market which implements the most critical features of the synchronization protocols in hardware and the synchronization algorithms in software. In this paper, a new clock discipline algorithm for hardware implementation is presented, allowing for full hardware implementation of synchronization systems. Measurements on field-programmable gate array prototypes show a fast convergence time (below 10 s) and a high accuracy (1 μs) for typical configuration parameters.Ministerio de Educación y Cultura HIPER TEC2007-61802/MI

    PENINGKATAN KEAMANAN PADA SIMPLE NETWORK TIME PROTOCOL(SNTP) UNTUK MENDITEKSI CYBER CRIME DI DALAM AKTIFITAS JARINGAN

    Get PDF
    Di era sekarang ini teknologi informasi dan komputasi telah berkembang pesat sehingga kejahatan dunia maya meningkat secara drastis karena pandemi, penjahat dunia maya kini juga menargetkan orang, bukan hanya sistem. Modus kejahatan di dunia maya saat ini sangat beragam. Cara yang digunakan oleh penyerang  semakin beragam dan kompleks. Dengan mengimplementasi antivirus client server bertujuan melakukan scan di setiap client yang sudah terhubung jaringan local secara real time maupun terpusat juga mengupdate secara terpusat pula, serta mendeteksi jenis serangan yang sering terdapat system jaringan serta medeteksi jenis serangan yang sering terdapat system jaringan dan meberikan proteksi seluruh komputer client dari segala serangan (malware, virus, worm, Trojan) yang terdapat pada jaringan.Sebagai upaya meningkatan keamanan  dijaringan perusahaan dan mermerikan kenyaman disaat melaukan aktivitas  komunikasi di jaringan Internet, peneliti melakukan migrasi software sophos  ke trend Micro. Hasil log dari scanning antivirus dengan menggunakan Trend Micro, Risk Level High, action yang harus dilakukan segera Blocke

    Multidimensional Intrusion Detection System for IEC 61850 based SCADA Networks

    Get PDF

    TimeWeaver: Opportunistic One Way Delay Measurement via NTP

    Full text link
    One-way delay (OWD) between end hosts has important implications for Internet applications, protocols, and measurement-based analyses. We describe a new approach for identifying OWDs via passive measurement of Network Time Protocol (NTP) traffic. NTP traffic offers the opportunity to measure OWDs accurately and continuously from hosts throughout the Internet. Based on detailed examina- tion of NTP implementations and in-situ behavior, we develop an analysis tool that we call TimeWeaver, which enables assessment of precision and accuracy of OWD measurements from NTP. We apply TimeWeaver to a ~1TB corpus of NTP traffic collected from 19 servers located in the US and report on the characteristics of hosts and their associated OWDs, which we classify in a precision/accuracy hierarchy. To demonstrate the utility of these measurements, we apply iterative hard-threshold singular value decomposition to estimate OWDs between arbitrary hosts from the high- est tier in the hierarchy. We show that this approach results in highly accurate estimates of OWDs, with average error rates on the order of less than 2%. Finally, we outline a number of applications---in particular, IP geolocation, network operations and management---for hosts in lower tiers of the precision hierarchy that can benefit from TimeWeaver, offering directions for future work.Comment: 14 page

    IPv6 Communication Library

    Get PDF
    Práce se zabývá síťovou komunikací na bázi IPv6. Cílem bylo vytvořit knihovnu, která umožní komunikaci nad IPv6 vývojové desce FITkit vybavené rozšiřujícím modulem pro zapojení do sítě typu Ethernet. Součástí výsledného řešení je aplikace demonstrující funkce knihovny. Použitým jazykem je ANSI C.Thesis deals with IPv6-based network communication. The aim was to create a library enabling FITkit development board equipped with Ethernet extension module to act as an IPv6 node. Project includes application to demonstrate available functionality. The library is written in ANSI C.
    corecore