21,048 Hits in 4.3 sec

On a Network Forensics Model For Information Security

Wei Ren
2004 International United Information Systems Conference  
Particularly, some novel approaches for network forensics system are discussed for the first time, such as network forensics server, network forensics protocol and standardization, and so on.  ...  In this paper, we for the first time discuss the concept model of network forensics system, which can give guidance for the implementation of network forensics system and the formalization of the network  ...  Particularly, some novel approaches for network forensics system are discussed for the first time, such as network forensics server, network forensics protocol and standardization, and so on.  ... 
dblp:conf/ista/Wei04 fatcat:zdrio6rbmva5jge6oki4fhl56i


Mayoon Yaibuates, Roungsan Chaisricharoen
2019 Malaysian Journal of Computer Science  
Dynamic Host Configuration Protocol (DHCP) Internet Protocol (IP) address starvation is a method, used by attackers, to breakdown communication over IP network.  ...  In order to solve this problem, a method to detect and recover malicious IP address request by using Internet Control Message Protocol (ICMP) protocol has been proposed.  ...  The time used in the experiment for L dt is 2 seconds which corresponded with Khan et al. [7] .  ... 
doi:10.22452/mjcs.sp2019no2.2 fatcat:njjzcxx33vev7hrhcju73uo7de

Inspector Gadget: A Framework for Inferring TCP Congestion Control Algorithms and Protocol Configurations

Sishuai Gong, Usama Naseer, Theophilus Benson
2020 Traffic Monitoring and Analysis  
To motivate this work, we surveyed network operators to get a qualitative understanding of their approach towards tuning their networking stacks and the root cause of configuration heterogeneity.  ...  To demonstrate the efficacy of Inspector Gadget, we implemented a prototype of Inspector Gadget and used it to survey the configuration parameters for the Alexa top 5K sites.  ...  We thank the anonymous reviewers and our shepherd, Simone Ferlin, for their invaluable comments. We, also, thank the anonymous NANOG operators for filling out our survey.  ... 
dblp:conf/tma/GongNB20 fatcat:c45iufceazhajkhxuprvyomji4

Autosonda: Discovering Rules and Triggers of Censorship Devices

Jill Jermyn, Nicholas Weaver
2017 USENIX Security Symposium  
This paper presents Autosonda, a tool for discovering and studying decision models of censorship devices.  ...  Through network traffic alone, Autosonda fingerprints censorship devices by discovering their models and mechanisms for how they enforce rule sets.  ...  We further assume root access on the control servers for our experiments. However, Autosonda can run two sets of tests on the client: one with root access and one without.  ... 
dblp:conf/uss/JermynW17 fatcat:hym63yfnezfdzpivk2lbpa22xe

Hands-on Exercises for IT Security Education

Xinli Wang, Yan Bai, Guy C. Hembroff
2015 Proceedings of the 16th Annual Conference on Information Technology Education - SIGITE '15  
Our labs cover a wide spectrum of principles, ideas and technologies along with well-developed open source tools. Lab descriptions are publicly accessible from our web page.  ...  We have developed a collection of instructional hands-on lab assignments that can be used to help teach security courses or courses with a security component in information technology (IT).  ...  Acknowledgment We would like to thank the three anonymous reviewers for this paper. This work is supported by the National Science Foundations (NSF) TUES grants (Award#: 1140310 and Award#: 1140308).  ... 
doi:10.1145/2808006.2808023 dblp:conf/sigite/WangBH15 fatcat:rzuprzs2ivfwnltakikga4pbge

Survey of End-to-End Mobile Network Measurement Testbeds, Tools, and Services

Utkarsh Goel, Mike P. Wittie, Kimberly C. Claffy, Andrew Le
2016 IEEE Communications Surveys and Tutorials  
We intend for this survey to provide a comprehensive view of currently active efforts and some auspicious directions for future work in mobile network measurement and mobile application performance evaluation  ...  We compare available tools and their shortcomings with respect to the needs of researchers, developers, regulators, and the public.  ...  , Geoffrey Challen, David Choffness, Nick Feamster, Walter Johnston, Valerio Luconi, Jim Martin, Konstantina Papagiannaki, John Rula, Mario Sanchez, Qing Yang, Hongyi Yao, and the anonymous reviewers for  ... 
doi:10.1109/comst.2015.2485979 fatcat:kyelf24bfna5ncoblu6wttjq3i

Smart-Phones Attacking Smart-Homes

Vijay Sivaraman, Dominic Chan, Dylan Earl, Roksana Boreli
2016 Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks - WiSec '16  
In this paper we demonstrate how an attacker can infiltrate the home network via a doctored smart-phone app.  ...  The ability to infiltrate smart-homes via doctored smart-phone apps demonstrates that home routers are poor protection against Internet attacks and highlights the need for increased security for IoT devices  ...  Our server takes the body of these requests with the information of the discovered devices and stores it in a database.  ... 
doi:10.1145/2939918.2939925 dblp:conf/wisec/SivaramanCEB16 fatcat:gkvz7vpgvfeibcioy2q37k7vfy

Visualization Tools for Teaching Computer Security

Xiaohong Yuan, Percy Vega, Yaseen Qadah, Ricky Archer, Huiming Yu, Jinsheng Xu
2010 ACM Transactions on Computing Education  
These tools have been used in various computer network and information security courses at North Carolina A&T State University, and have received positive feedback from the students.  ...  These visualization tools are intended to be used in undergraduate level computer network and security courses.  ...  Classroom Experience with the Visualization Tool for Wireless Network Attacks The visualization tool for wireless network attacks was used in the Network Security and Security Management for Information  ... 
doi:10.1145/1656255.1656258 fatcat:b3gjm464dreddpzzzgpfjys2ia

Wireless ad hoc dissemination for search and rescue

Mikael Asplund, Trishan R. de Lanerolle, Christopher Fei, Prasanna Gautam, Ralph A. Morelli, Simin Nadjm-Tehrani, Gustav Nykvist
2010 International Conference on Information Systems for Crisis Response and Management  
Even if we consider wireless ad hoc communication as a means of information dissemination we should count on frequent loss of connectivity in the network due to unpredictable mobility and sparse network  ...  The application layer is an adaptation of an existing surveying information tool (POSIT) which is now fully decentralized and relies on text communication to achieve energy efficiency.  ...  During a search mission, When a new find is discovered, the phone will mark its location and generate a time stamp.  ... 
dblp:conf/iscram/AsplundLFGMNN10 fatcat:mpurnhrxznhexp257ylb3qggd4

Survey of robust and resilient social media tools on Android [article]

P.W.G. Brussee, J.A. Pouwelse
2015 arXiv   pre-print
We focus specifically on the limited set of mature tools with a healthy development community and Internet-deployment.  ...  We present an overview of robust and resilient social media tools to overcome natural disasters, censorship and Internet kill switches.  ...  The Mesh Datagram Protocol (MDP) in the network layer propagates these requests over the network for a limited time and returns the addresses of any phone that claims to own that phone number.  ... 
arXiv:1512.00071v1 fatcat:v2b7lsynrvc7jfut7hjbd646zy

Understanding passive and active service discovery

Genevieve Bartlett, John Heidemann, Christos Papadopoulos
2007 Proceedings of the 7th ACM SIGCOMM conference on Internet measurement - IMC '07  
Active scanning is better suited to rapidly finding all servers, which is important for vulnerability detectionone scan finds 98% of services in two hours, missing only a handful.  ...  Increasingly, network operators do not directly operate computers on their network, yet are responsible for assessing network vulnerabilities to ensure compliance with laws and policies about information  ...  We thank Fabio Silva who carried out early proof-of-concept passive surveys.  ... 
doi:10.1145/1298306.1298314 dblp:conf/imc/BartlettHP07 fatcat:54kx2v5ijjbmtgznw6pezyd33u

Multi-path Time Protocols

Alexander Shpiner, Yoram Revah, Tal Mizrahi
2013 2013 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication (ISPCS) Proceedings  
Classical time distribution protocols are run between a master clock and a slave clock using a single network path between the two clocks.  ...  Over the last few years, packet based networks have become the common transport for applications requiring clock synchronization.  ...  Each experiment was conducted with a different NTP server; we ran our experiments with each of the 234 stratum 1 NTP servers [17]. 2 We used Paris Traceroute [15] for discovering the available paths  ... 
doi:10.1109/ispcs.2013.6644754 fatcat:cowve7koeffahcvtpw2g64kui4

Cisco Packet Tracer Simulation as Effective Pedagogy in Computer Networking Course

Nazre bin Abdul Rashid, Md. Zahar Bin Othman, Rasyidi Bin Johan, Salman Firdaus Bin Hj. Sidek
2019 International Journal of Interactive Mobile Technologies  
As such, an approach of using computer network simulation and visualization tool in teaching and learning Computer Networking course is seen beneficial for educators and students.  ...  In a nutshell, CISCO Packet Tracer as a simulation and visualization tool had been proven to be an effective software in supporting the teaching and learning of computer networking course.  ...  DHCP server: The DHCP (dynamic host configuration protocol) is a standardized network protocol which is used on internet protocol (IP) networks.  ... 
doi:10.3991/ijim.v13i10.11283 fatcat:ztdihxx3x5czxncpak4oh6f76u

Cryptographic strength of ssl/tls servers

Homin K. Lee, Tal Malkin, Erich Nahum
2007 Proceedings of the 7th ACM SIGCOMM conference on Internet measurement - IMC '07  
We present a tool developed for this purpose, the Probing SSL Security Tool (PSST), and evaluate over 19,000 servers.  ...  We also observe encouraging behavior such as sensible default choices by servers when presented with multiple options, the quick adoption of AES (more than half the servers support strong key AES as their  ...  Acknowledgments We thank Noel Codella for participating in early stages of this work.  ... 
doi:10.1145/1298306.1298318 dblp:conf/imc/LeeMN07 fatcat:5ivhadrmrbh27m75rv74robm6a

Scanning for Vulnerabilities in the Security Mechanisms of the Hosts in the Academic Institutions and Government Agencies

Hristo Hristov
2018 Mathematical and Software Engineering  
The port and network scanner are specialized software tools that can discover detail information about the selected target hosts such as open, filtered, closed ports and the whole computer network topology  ...  In this paper a sophisticated investigation and scanning for vulnerabilities in the security mechanisms of the hosts in the academic institutions and government agencies is made.  ...  The Dynamic Host Configuration Protocol (DHCP) in the router's configuration has been configured on purpose each host in this computer lab to obtain a valid IPv4 addresses, network mask, DNS server addresses  ... 
doaj:cb8e8a91fcd84502800f6ea5934e7eb9 fatcat:zao6zdprhncixgcxwkfrvd2cci
« Previous Showing results 1 — 15 out of 21,048 results