661 Hits in 3.4 sec

Performance Analysis of SNMP over SSH [chapter]

Vladislav Marinov, Jürgen Schönwälder
2006 Lecture Notes in Computer Science  
This paper describes how the Secure Shell (SSH) protocol can be used to secure SNMP and it provides a performance analysis of a prototype implementation which compares the performance of SNMP over SSH  ...  with other secure and insecure versions of SNMP.  ...  Acknowledgments The work reported in this paper was supported in part by the EC IST-EMANICS Network of Excellence (#26854).  ... 
doi:10.1007/11907466_3 fatcat:dkxumnakxvd5npznxsb2mxijsa

Performance Evaluation of SNMPv1/2c/3 using Different Security Models on Raspberry Pi

Eric Gamess, Sergio Hernandez
2021 International Journal of Advanced Computer Science and Applications  
In this work, we carried out a performance analysis of SNMP agents running in three different Raspberry Pis (Pi Zero W, Pi 3 Model B, and Pi 3 Model B+).  ...  Our experiments were executed with Net-SNMP, an open-source and comprehensive distribution of SNMP. Our tests indicate that SNMPv1 and SNMPv2c have similar performance.  ...  ACKNOWLEDGMENT We are grateful to "Faculty Commons" and the "College of Science & Mathematics" at Jacksonville State University for partially funding this project.  ... 
doi:10.14569/ijacsa.2021.0121101 fatcat:dicbyxaaibc6tif6yf465ikkfu

Using Internet Protocols to Implement IEC 60870-5 Telecontrol Functions

G. Sanchez, I. Gomez, J. Luque, J. Benjumea, O. Rivera
2010 IEEE Transactions on Power Delivery  
In this paper, the use of general standard protocols to perform the telecontrol of electrical networks is justified.  ...  Index Terms-Computer network-management protocols, International Electrotechnical Commission (IEC) 60870-5 series, internet protocols, performance, security, telecontrol.  ...  PERFORMANCE ANALYSIS In this section, the results of the performance analysis are summarized.  ... 
doi:10.1109/tpwrd.2009.2037535 fatcat:hlg5dikrqjg5bfjrgpxc3kiy5m

Multiplatform management of a Hard Real-Time Ethernet Switch

Aleksander Pleszko, Joao Paulo Barraca, Joaquim Ferreira, Pedro Goncalves
2012 2012 IEEE Globecom Workshops  
The Hard Real-Time Ethernet Switch (HaRTES) allows using the same network to handle multiple traffic flows, without compromising the performance of real-time applications.  ...  This paper describes a multiprotocol (SNMP and NETCONF) management interface design, and implementation. It also presents a preliminary validation of the two management technologies.  ...  As SSH is mandatory, and the one most commonly available, we focused in evaluating NETCONF over SSH.  ... 
doi:10.1109/glocomw.2012.6477683 dblp:conf/globecom/PleszkoBFG12 fatcat:ckjhvj4ygjgpphxscsxcsrskhu

Theory and implementation of a virtualisation level Future Internet defence in depth architecture

Jerzy Konorski, Piotr Pacyna, Grzegorz Kolaczek, Zbigniew Kotulski, Krzysztof Cabaj, Pawel Szalachowski
2013 International Journal of Trust Management in Computing and Communications  
He is the author or the co-author of over 70 publications.  ...  He took part in several research projects related to network analysis and service oriented systems and he is also an evaluator of many national research and infrastructural project and a TPC member for  ...  The work of J. Konorski is supported in part by the Air Force Office of Scientific Research, Air Force Material Command, USAF, under Grant FA 8655-11-1-3076.  ... 
doi:10.1504/ijtmcc.2013.056431 fatcat:7vqo7vwqyjd2heey57p4xksr54

A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems [article]

Javier Franco, Ahmet Aris, Berk Canberk, A. Selcuk Uluagac
2021 arXiv   pre-print
It provides a taxonomy and extensive analysis of the existing honeypots and honeynets, states key design factors for the state-of-the-art honeypot/honeynet research and outlines open issues for future  ...  The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical Systems (CPS) have become essential for our daily lives in contexts such as our homes, buildings, cities, health  ...  Researchers can employ open source IDS solutions such as Snort, Zeek, Suricata etc., malware analysis platforms such as Cuckoo, and next generation networking technologies such as SDN to propose novel  ... 
arXiv:2108.02287v1 fatcat:l4b23mylyfd6xjtfhrtsrin3zq

NETCONF agent for link state monitoring

Diogo Loureiro, Pedro Goncalves, Antonio Nogueira
2012 2012 IEEE International Conference on Communications (ICC)  
Additionally, it also analyzes the encoding of the monitoring messages that is performed by NETCONF and evaluates the amount of overhead introduced by the gSOAP API.  ...  This paper documents the development of a NETCONF agent for link-state monitoring and analyzes/evaluates the most important features and capabilities of this management protocol.  ...  NETCONF notification The traffic analysis allows us to evaluate the influence that the protocol can have in network performance.  ... 
doi:10.1109/icc.2012.6364912 dblp:conf/icc/LoureiroGN12 fatcat:jg2kxm5bsnhtxkj4bqeftkmd3a

Design of a Distributed HIDS for IoT Backbone Components

Guilherme de O. Kfouri, Daniel G. V. Gonçalves, Bruno V. Dutra, João F. de Alencastro, Francisco L. de Caldas Filho, Lucas M. C. e Martins, Bruno J. G. Praciano, Robson de O. Albuquerque, Rafael T. de Sousa Jr
2019 Communication Papers of the 2019 Federated Conference on Computer Science and Information Systems  
, while also interacting with a Controller of the HIDS set to allow the coordination of intrusion detection actions relative to DDoS attacks distributed all over the IoT instance.  ...  Given that IoT network instances are distributed and deployed on the conventional Internet structure, DDoS countermeasures in IoT need to be fully distributed and coordinated all over the components that  ...  Using the SNMP protocol, the percentage of CPU usage is checked and, if it is above 80 percent, this indicates that something is compromising the performance of the device.  ... 
doi:10.15439/2019f329 dblp:conf/fedcsis/KfouriGDAFMPAS19 fatcat:iwvk4wxrkrhclkqozib6dxorve

Management of the LHCb Readout Network

Guoming Liu, Niko Neufeld
2010 IEEE Transactions on Nuclear Science  
The readout network is extremely performance critical, sophisticated monitoring at all levels is essential for the successful operation of the data acquisition for the experiment.  ...  For the efficient operation of the experiment, it is crucial that all parts of the system are monitored and controlled through the same interface in a coherent way.  ...  ACKNOWLEDGMENT The authors would like to thank the CERN IT department, in particular the teams of IT/CS (campus networking) and IT/CO (controls) for their tight collaboration and effective support.  ... 
doi:10.1109/tns.2009.2035694 fatcat:sneyygopm5hephdtbqkwllf554

Management of the LHCb readout network

Guoming Liu, Niko Neufeld
2009 2009 16th IEEE-NPSS Real Time Conference  
The readout network is extremely performance critical, sophisticated monitoring at all levels is essential for the successful operation of the data acquisition for the experiment.  ...  For the efficient operation of the experiment, it is crucial that all parts of the system are monitored and controlled through the same interface in a coherent way.  ...  ACKNOWLEDGMENT The authors would like to thank the CERN IT department, in particular the teams of IT/CS (campus networking) and IT/CO (controls) for their tight collaboration and effective support.  ... 
doi:10.1109/rtc.2009.5321891 fatcat:omtfqfzw25a5vmrwobo54rt4aq

Comparing Event Reporting Solutions for Autonomic Management

Pedro Gonçalves, Diogo Loureiro, António Manuel Nogueira
2012 Network Protocols and Algorithms  
repair failures autonomously, adapt its configuration and optimize its performance and quality of service parameters.  ...  Then, a comparative study between different management technologies, in terms of their scope, flexibility and market adoption, will be conducted: by performing a series of tests on representative prototypes  ...  [22] surveyed the SNMP-related performance studies that were carried out over the last 10 years.  ... 
doi:10.5296/npa.v4i4.2133 fatcat:cwya4izlq5ahbcs6l2k3i5jcr4

Evaluating SNMP, NETCONF, and RESTful web services for router virtualization management

Paulo Roberto da Paz Ferraz Santos, Rafael Pereira Esteves, Lisandro Zambenedetti Granville
2015 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)  
The interfaces are based on SNMP (v2c and v3), NETCONF, and RESTful Web Services, and are designed to perform three basic VR management operations: VR creation, VR retrieval, and VR removal.  ...  As part of VN provisioning, virtual routers (VRs) are created inside physical routers supporting virtualization. Currently, the management of NVEs is mostly realized by proprietary solutions.  ...  We also have configured this interface to use NETCONF over SSH mapping.  ... 
doi:10.1109/inm.2015.7140284 dblp:conf/im/SantosEG15 fatcat:a2xkcgujfveajgfvqa4vlk3zsu

EMMCS: An Edge Monitoring Framework for Multi-Cloud Environments using SNMP

Saad Khoudali, Karim Benzidane, Abderrahim Sekkaki
2019 International Journal of Advanced Computer Science and Applications  
In fact, the monitoring framework "EMMCS" uses SNMP agents to collect metrics, and performs all monitoring tasks at the edge of each cloud to enhance network transmission and data processing at the central  ...  The implementation of the framework is tested on different public cloud environments, namely Amazon AWS and Microsoft Azure to show the efficiency of the proposed approach.  ...  SSH for Linux-based VM or SMB/RPC for Windows VMs);  oid: SNMP Object ID of the resource to query.  ... 
doi:10.14569/ijacsa.2019.0100178 fatcat:xp62bwr7azhczn4qmzk5j2eqcy

Characterizing user behavior and network performance in a public wireless LAN

Anand Balachandran, Geoffrey M. Voelker, Paramvir Bahl, P. Venkat Rangan
2002 Performance Evaluation Review  
The goals of our study are: (1) to extend our understanding of wireless user behavior and wireless network performance; (2) to characterize wireless users in terms of a parameterized model for use with  ...  analytic and simulation studies involving wireless LAN traffic; and (3) to apply our workload analysis results to issues in wireless network deployment, such as capacity planning, and potential network  ...  for the benefit of the conference.  ... 
doi:10.1145/511399.511359 fatcat:3kjejcglifgafilpzad4ettl7q

Performance Improvement Methods for NETCONF-Based Configuration Management [chapter]

Sun-Mi Yoo, Hong Taek Ju, James W. Hong
2006 Lecture Notes in Computer Science  
Moreover, it also demonstrates the process of performance evaluation of configuration management. *  ...  In addition to interoperability, high performance is also required in configuration management, but many researches have often discarded the performance aspect of it.  ...  request/response message that is used to manage configuration information and the headers of each transport protocol.  ... 
doi:10.1007/11876601_25 fatcat:supushgh35belfeankzos6rtlm
« Previous Showing results 1 — 15 out of 661 results