A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Performance Analysis of SNMP over SSH
[chapter]
2006
Lecture Notes in Computer Science
This paper describes how the Secure Shell (SSH) protocol can be used to secure SNMP and it provides a performance analysis of a prototype implementation which compares the performance of SNMP over SSH ...
with other secure and insecure versions of SNMP. ...
Acknowledgments The work reported in this paper was supported in part by the EC IST-EMANICS Network of Excellence (#26854). ...
doi:10.1007/11907466_3
fatcat:dkxumnakxvd5npznxsb2mxijsa
Performance Evaluation of SNMPv1/2c/3 using Different Security Models on Raspberry Pi
2021
International Journal of Advanced Computer Science and Applications
In this work, we carried out a performance analysis of SNMP agents running in three different Raspberry Pis (Pi Zero W, Pi 3 Model B, and Pi 3 Model B+). ...
Our experiments were executed with Net-SNMP, an open-source and comprehensive distribution of SNMP. Our tests indicate that SNMPv1 and SNMPv2c have similar performance. ...
ACKNOWLEDGMENT We are grateful to "Faculty Commons" and the "College of Science & Mathematics" at Jacksonville State University for partially funding this project. ...
doi:10.14569/ijacsa.2021.0121101
fatcat:dicbyxaaibc6tif6yf465ikkfu
Using Internet Protocols to Implement IEC 60870-5 Telecontrol Functions
2010
IEEE Transactions on Power Delivery
In this paper, the use of general standard protocols to perform the telecontrol of electrical networks is justified. ...
Index Terms-Computer network-management protocols, International Electrotechnical Commission (IEC) 60870-5 series, internet protocols, performance, security, telecontrol. ...
PERFORMANCE ANALYSIS In this section, the results of the performance analysis are summarized. ...
doi:10.1109/tpwrd.2009.2037535
fatcat:hlg5dikrqjg5bfjrgpxc3kiy5m
Multiplatform management of a Hard Real-Time Ethernet Switch
2012
2012 IEEE Globecom Workshops
The Hard Real-Time Ethernet Switch (HaRTES) allows using the same network to handle multiple traffic flows, without compromising the performance of real-time applications. ...
This paper describes a multiprotocol (SNMP and NETCONF) management interface design, and implementation. It also presents a preliminary validation of the two management technologies. ...
As SSH is mandatory, and the one most commonly available, we focused in evaluating NETCONF over SSH. ...
doi:10.1109/glocomw.2012.6477683
dblp:conf/globecom/PleszkoBFG12
fatcat:ckjhvj4ygjgpphxscsxcsrskhu
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
2013
International Journal of Trust Management in Computing and Communications
He is the author or the co-author of over 70 publications. ...
He took part in several research projects related to network analysis and service oriented systems and he is also an evaluator of many national research and infrastructural project and a TPC member for ...
The work of J. Konorski is supported in part by the Air Force Office of Scientific Research, Air Force Material Command, USAF, under Grant FA 8655-11-1-3076. ...
doi:10.1504/ijtmcc.2013.056431
fatcat:7vqo7vwqyjd2heey57p4xksr54
A Survey of Honeypots and Honeynets for Internet of Things, Industrial Internet of Things, and Cyber-Physical Systems
[article]
2021
arXiv
pre-print
It provides a taxonomy and extensive analysis of the existing honeypots and honeynets, states key design factors for the state-of-the-art honeypot/honeynet research and outlines open issues for future ...
The Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Cyber-Physical Systems (CPS) have become essential for our daily lives in contexts such as our homes, buildings, cities, health ...
Researchers can employ open source IDS solutions such as Snort, Zeek, Suricata etc., malware analysis platforms such as Cuckoo, and next generation networking technologies such as SDN to propose novel ...
arXiv:2108.02287v1
fatcat:l4b23mylyfd6xjtfhrtsrin3zq
NETCONF agent for link state monitoring
2012
2012 IEEE International Conference on Communications (ICC)
Additionally, it also analyzes the encoding of the monitoring messages that is performed by NETCONF and evaluates the amount of overhead introduced by the gSOAP API. ...
This paper documents the development of a NETCONF agent for link-state monitoring and analyzes/evaluates the most important features and capabilities of this management protocol. ...
NETCONF notification The traffic analysis allows us to evaluate the influence that the protocol can have in network performance. ...
doi:10.1109/icc.2012.6364912
dblp:conf/icc/LoureiroGN12
fatcat:jg2kxm5bsnhtxkj4bqeftkmd3a
Design of a Distributed HIDS for IoT Backbone Components
2019
Communication Papers of the 2019 Federated Conference on Computer Science and Information Systems
, while also interacting with a Controller of the HIDS set to allow the coordination of intrusion detection actions relative to DDoS attacks distributed all over the IoT instance. ...
Given that IoT network instances are distributed and deployed on the conventional Internet structure, DDoS countermeasures in IoT need to be fully distributed and coordinated all over the components that ...
Using the SNMP protocol, the percentage of CPU usage is checked and, if it is above 80 percent, this indicates that something is compromising the performance of the device. ...
doi:10.15439/2019f329
dblp:conf/fedcsis/KfouriGDAFMPAS19
fatcat:iwvk4wxrkrhclkqozib6dxorve
Management of the LHCb Readout Network
2010
IEEE Transactions on Nuclear Science
The readout network is extremely performance critical, sophisticated monitoring at all levels is essential for the successful operation of the data acquisition for the experiment. ...
For the efficient operation of the experiment, it is crucial that all parts of the system are monitored and controlled through the same interface in a coherent way. ...
ACKNOWLEDGMENT The authors would like to thank the CERN IT department, in particular the teams of IT/CS (campus networking) and IT/CO (controls) for their tight collaboration and effective support. ...
doi:10.1109/tns.2009.2035694
fatcat:sneyygopm5hephdtbqkwllf554
Management of the LHCb readout network
2009
2009 16th IEEE-NPSS Real Time Conference
The readout network is extremely performance critical, sophisticated monitoring at all levels is essential for the successful operation of the data acquisition for the experiment. ...
For the efficient operation of the experiment, it is crucial that all parts of the system are monitored and controlled through the same interface in a coherent way. ...
ACKNOWLEDGMENT The authors would like to thank the CERN IT department, in particular the teams of IT/CS (campus networking) and IT/CO (controls) for their tight collaboration and effective support. ...
doi:10.1109/rtc.2009.5321891
fatcat:omtfqfzw25a5vmrwobo54rt4aq
Comparing Event Reporting Solutions for Autonomic Management
2012
Network Protocols and Algorithms
repair failures autonomously, adapt its configuration and optimize its performance and quality of service parameters. ...
Then, a comparative study between different management technologies, in terms of their scope, flexibility and market adoption, will be conducted: by performing a series of tests on representative prototypes ...
[22] surveyed the SNMP-related performance studies that were carried out over the last 10 years. ...
doi:10.5296/npa.v4i4.2133
fatcat:cwya4izlq5ahbcs6l2k3i5jcr4
Evaluating SNMP, NETCONF, and RESTful web services for router virtualization management
2015
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)
The interfaces are based on SNMP (v2c and v3), NETCONF, and RESTful Web Services, and are designed to perform three basic VR management operations: VR creation, VR retrieval, and VR removal. ...
As part of VN provisioning, virtual routers (VRs) are created inside physical routers supporting virtualization. Currently, the management of NVEs is mostly realized by proprietary solutions. ...
We also have configured this interface to use NETCONF over SSH mapping. ...
doi:10.1109/inm.2015.7140284
dblp:conf/im/SantosEG15
fatcat:a2xkcgujfveajgfvqa4vlk3zsu
EMMCS: An Edge Monitoring Framework for Multi-Cloud Environments using SNMP
2019
International Journal of Advanced Computer Science and Applications
In fact, the monitoring framework "EMMCS" uses SNMP agents to collect metrics, and performs all monitoring tasks at the edge of each cloud to enhance network transmission and data processing at the central ...
The implementation of the framework is tested on different public cloud environments, namely Amazon AWS and Microsoft Azure to show the efficiency of the proposed approach. ...
SSH for Linux-based VM or SMB/RPC for Windows VMs); oid: SNMP Object ID of the resource to query. ...
doi:10.14569/ijacsa.2019.0100178
fatcat:xp62bwr7azhczn4qmzk5j2eqcy
Characterizing user behavior and network performance in a public wireless LAN
2002
Performance Evaluation Review
The goals of our study are: (1) to extend our understanding of wireless user behavior and wireless network performance; (2) to characterize wireless users in terms of a parameterized model for use with ...
analytic and simulation studies involving wireless LAN traffic; and (3) to apply our workload analysis results to issues in wireless network deployment, such as capacity planning, and potential network ...
for the benefit of the conference. ...
doi:10.1145/511399.511359
fatcat:3kjejcglifgafilpzad4ettl7q
Performance Improvement Methods for NETCONF-Based Configuration Management
[chapter]
2006
Lecture Notes in Computer Science
Moreover, it also demonstrates the process of performance evaluation of configuration management. * ...
In addition to interoperability, high performance is also required in configuration management, but many researches have often discarded the performance aspect of it. ...
request/response message that is used to manage configuration information and the headers of each transport protocol. ...
doi:10.1007/11876601_25
fatcat:supushgh35belfeankzos6rtlm
« Previous
Showing results 1 — 15 out of 661 results