442 research outputs found
Peningkatan Keamanan pada Simple Network Time Protocol (SNTP) untuk Mendeteksi Cybercrime di dalam Aktivitas Jaringan
Today's cybercrime methods are extremely diverse. The methods employed by attackers are becoming more diverse and intricate. Malicious software, commonly referred to as malware, is utilized in these various attacks. Malware threats and their propagation can be accomplished in several different ways. Good governance facilitates prevention via migration, assisting the security team and network infrastructure IT. This paper discusses efforts to enhance the security of the Simple Network Time Protocol (SNTP) to detect cybercrime on the network. Based on the results of the conducted experiments, we determined that by updating the Simple Network Time Protocol, implementing the client-server antivirus, and scanning every client connected to the local network or centrally, we could detect the types of attacks that frequently occur on the network system, thereby protecting all client computers from malware, viruses, worms, and Trojan horses. Based on the antivirus migration data, the employed research method can find information on cybercrimes that involve malware that enters the network and is successfully cleaned or quarantined before being automatically blocked
A time-slot scheduling algorithm for e-health wireless sensor networks
http://www.ieee-healthcom.org/2010/about.htmlFor e-health wireless sensor networks presenting significant traffic loads, MAC protocols based on deterministic scheduling algorithms are consensually considered more adequate than protocols based on random access algorithms. Indeed, TDMA-based MAC protocols are able to control the delay bound and save power by eliminating collisions. However, these protocols always require some expedite scheme to assign the superframe time-slots to the network devices that need to transmit data. Knowing that patients of an e-health wireless network are normally monitored by the same number and types of motes, originating a regular traffic pattern, a simple collaborative time-slot allocation algorithm can be achieved, as introduced in this paper. In the proposed algorithm, the announcement of time-slot allocation by the network coordinator is avoided, which helps to improve the packet delivery ratio and reduce the energy consumption in the e–health wireless network.(undefined
Network Time Synchronization: A Full Hardware Approach
Complex digital systems are typically built on top of several
abstraction levels: digital, RTL, computer, operating system and
software application. Each abstraction level greatly facilitates the design
task at the cost of paying in performance and hardware resources usage.
Network time synchronization is a good example of a complex system
using several abstraction levels since the traditional solutions are a software
application running on top of several software and hardware layers.
In this contribution we study the case where a standards-compliant network
time synchronization solution is fully implemented in hardware on
a FPGA chip doing without any software layer. This solution makes it
possible to implement very compact, inexpensive and accurate synchronization
systems to be used either stand-alone or as embedded cores.
Some general aspects of the design experience are commented together
with some figures of merit. As a conclusion, full hardware implementations
of complex digital systems should be seen as a feasible design
option, from which great performance advantages can be expected, provided
that we can find a suitable set of tools and control the design
development costs
Fast-Convergence Microsecond-Accurate Clock Discipline Algorithm for Hardware Implementation
Discrete microprocessor-based equipment is a typical synchronization
system on the market which implements the most critical
features of the synchronization protocols in hardware and the synchronization
algorithms in software. In this paper, a new clock discipline
algorithm for hardware implementation is presented, allowing for full
hardware implementation of synchronization systems. Measurements on
field-programmable gate array prototypes show a fast convergence time
(below 10 s) and a high accuracy (1 μs) for typical configuration
parameters.Ministerio de Educación y Cultura HIPER TEC2007-61802/MI
PENINGKATAN KEAMANAN PADA SIMPLE NETWORK TIME PROTOCOL(SNTP) UNTUK MENDITEKSI CYBER CRIME DI DALAM AKTIFITAS JARINGAN
Di era sekarang ini teknologi informasi dan komputasi telah berkembang pesat sehingga kejahatan dunia maya meningkat secara drastis karena pandemi, penjahat dunia maya kini juga menargetkan orang, bukan hanya sistem. Modus kejahatan di dunia maya saat ini sangat beragam. Cara yang digunakan oleh penyerang semakin beragam dan kompleks. Dengan mengimplementasi antivirus client server bertujuan melakukan scan di setiap client yang sudah terhubung jaringan local secara real time maupun terpusat juga mengupdate secara terpusat pula, serta mendeteksi jenis serangan yang sering terdapat system jaringan serta medeteksi jenis serangan yang sering terdapat system jaringan dan meberikan proteksi seluruh komputer client dari segala serangan (malware, virus, worm, Trojan) yang terdapat pada jaringan.Sebagai upaya meningkatan keamanan dijaringan perusahaan dan mermerikan kenyaman disaat melaukan aktivitas komunikasi di jaringan Internet, peneliti melakukan migrasi software sophos ke trend Micro. Hasil log dari scanning antivirus dengan menggunakan Trend Micro, Risk Level High, action yang harus dilakukan segera Blocke
TimeWeaver: Opportunistic One Way Delay Measurement via NTP
One-way delay (OWD) between end hosts has important implications for Internet
applications, protocols, and measurement-based analyses. We describe a new
approach for identifying OWDs via passive measurement of Network Time Protocol
(NTP) traffic. NTP traffic offers the opportunity to measure OWDs accurately
and continuously from hosts throughout the Internet. Based on detailed examina-
tion of NTP implementations and in-situ behavior, we develop an analysis tool
that we call TimeWeaver, which enables assessment of precision and accuracy of
OWD measurements from NTP. We apply TimeWeaver to a ~1TB corpus of NTP traffic
collected from 19 servers located in the US and report on the characteristics
of hosts and their associated OWDs, which we classify in a precision/accuracy
hierarchy. To demonstrate the utility of these measurements, we apply iterative
hard-threshold singular value decomposition to estimate OWDs between arbitrary
hosts from the high- est tier in the hierarchy. We show that this approach
results in highly accurate estimates of OWDs, with average error rates on the
order of less than 2%. Finally, we outline a number of applications---in
particular, IP geolocation, network operations and management---for hosts in
lower tiers of the precision hierarchy that can benefit from TimeWeaver,
offering directions for future work.Comment: 14 page
IPv6 Communication Library
Práce se zabývá síťovou komunikací na bázi IPv6. Cílem bylo vytvořit knihovnu, která umožní komunikaci nad IPv6 vývojové desce FITkit vybavené rozšiřujícím modulem pro zapojení do sítě typu Ethernet. Součástí výsledného řešení je aplikace demonstrující funkce knihovny. Použitým jazykem je ANSI C.Thesis deals with IPv6-based network communication. The aim was to create a library enabling FITkit development board equipped with Ethernet extension module to act as an IPv6 node. Project includes application to demonstrate available functionality. The library is written in ANSI C.
- …