• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 68
  • 24
  • 23
  • 14
  • 10
  • 7
  • 6
  • 3
  • 3
  • 1
  • 1
  • Tagged with
  • 169
  • 76
  • 67
  • 61
  • 53
  • 40
  • 36
  • 25
  • 21
  • 20
  • 19
  • 19
  • 17
  • 16
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

A Novel Technique of Network Auditability with Managers In The Loop

Shelley, Rian 01 December 2008 (has links)
Network management requires a large amount of knowledge about the network. In particular, knowledge about used network addresses, access time, and topology is useful. In a network composed of managed devices, much of the data necessary can come from simple network management protocol (SNMP) queries. Other data can come from other databases, or analysis of existing data. In particular, layer-two network topology can be determined by analyzing the mac address forwarding tables of layer-two devices. The layer-two topology can be merged with a layer-three topology to generate a complete topology of the network. This information is useless unless it is easily accessible to the network manager; therefore, a simple interface should be used to give access to all of this data.
72

Agents Mobiles : itinéraires pour l'administration système et réseau

Reuter, Emmanuel 28 May 2004 (has links) (PDF)
Depuis le début des années 1990, l'utilisation des agents mobiles dans le cadre de l'administration système et réseau est étudiée. Des plates-formes à agents mobiles répondant à cet usage ont été développées et se sont penchées en général sur les problèmes de l'interrogation des équipements actifs du réseau, de la supervision des noeuds des plates-formes, de la sécurité des noeuds visités, etc. Cependant, une contrainte opérationnelle provenant du fait que la présence d'éléments dans un réseau tend à évoluer dynamiquement n'avait pas été prise en compte. Une telle évolution requiert que les itinéraires de migration associés aux agents mobiles d'administration ne soient pas définis comme cela est fait en général, de manière statique par l'administrateur, mais qu'au contraire de tels itinéraires puissent être construits à la volée de sorte à refléter la topologie courante du réseau à administrer. Nous avons aussi constaté que les facilités de programmation obtenues par l'association d'une fonction d'administration à chacun des éléments d'un itinéraire, et ce, en fonction du type de l'élément, pourraient être bénéfique, en ce sens que cela pourrait grandement simplifier la définition d'agents mettant en oeuvre de nouvelles fonctions d'administration système et réseau.<br />Ce travail de thèse consiste à proposer la définition d'un mécanisme de fabrication puis d'utilisation d'itinéraires dynamiques pour l'administration système et réseau. Nous validons cette définition en fournissant une plate-forme complète ainsi qu'un cadre de programmation d'agents mobiles d'administration système et réseau. Pour ce faire, nous utilisons et étendons la bibliothèque ProActive pour le calcul parallèle, réparti et mobile. En effet, ProActive offre un cadre qui simplifie grandement la programmation et le déploiement d'agents mobiles en<br />environnement hétérogène et réparti. Le mécanisme d'itinéraires proposé suppose la connaissance de la topologie du réseau et des éléments qui y sont connectés. Nous implantons donc un mécanisme de découverte automatique de la topologie d'un réseau au niveau 2 OSI. Nous définissons ensuite un cadre générique de programmation d'agents mobiles bâtie autour de notre mécanisme d'itinéraires pour effectuer des tâches d'administration système et réseau. Pour valider notre approche et son intégration dans le monde de l'administration système et réseau, nous fournissons des exemples concrets de l'utilisation des agents mobiles d'administration et ce pour une large gamme de configurations réseau.
73

Design och implementering av utskriftsredovisning och statusrapportering för utskriftshanteraren LPRng / Design and Implementation of Accounting and Status Notification for the LPRng Print Spooler

Edlund, Henrik January 2003 (has links)
<p>This thesis presents the design and implementation of an accounting and status notification system for the LPRng print spooler. A solution using SNMP to query for needed accounting and status data is presented, a design built upon this, and an implementation produced. </p><p>As the system derives from the requirements specification, it will make no attempt to solve all printer accounting problems or to offer compatibility with all printers, database management systems or print spoolers. However, several solutions for printer accounting are discussed and the best solution derived from the requirements specification will be chosen.</p>
74

Mining Network Traffic Data for Supporting Denial of Service Attack Detection

Ma, Shu-Chen 17 August 2005 (has links)
Denial of Service (DoS) attacks aim at rendering a computer or network incapable of providing normal services by exploiting bugs or holes of system programs or network communication protocols. Existing DoS attack defense mechanisms (e.g., firewalls, intrusion detection systems, intrusion prevention systems) typically rely on data gathered from gateways of network systems. Because these data are IP-layer or above packet information, existing defense mechanisms are incapable of detecting internal attacks or attackers who disguise themselves by spoofing the source IP addresses of their packets. To address the aforementioned limitations of existing DoS attack defense mechanisms, we propose a classification-based DoS attack detection technique on the basis of the SNMP MIB II data from the network interface to induce a DoS detection model from a set of training examples that consist of both normal and attack traffic data). The constructed DoS detection model is then used for predicting whether a network traffic from the network interface is a DoS attack. To empirically evaluate our proposed classification-based DoS attack detection technique, we collect, with various traffic aggregation intervals (including 1, 3, and 5 minutes), normal network traffic data from two different environments (including an enterprise network, and a university campus network) and attack network traffics (including TCP SYN Flood, Land, Fake Ping, and Angry Ping) from an independent experimental network. Our empirical evaluation results show that the detection accuracy of the proposed technique reaches 98.59% or above in the two network environments. The evaluation results also suggest that the proposed technique is insensitive to the traffic aggregation intervals examined and has a high distinguishing power for the four types of DoS attacks under investigation.
75

Stream and system management for networked audio devices

Eisenmann, André January 2008 (has links)
<p>The paper deals with the development of a remote management solution for embedded audio devices. The creation of a development environment for the embedded ARM target is discussed as well as several available solutions for remote system management. The creation of a service for stream and system management using SNMP is discussed as well as several changes to the SNMP standard to improve performance using multicast. The implementation of a proof-of-concept cross-platform user interface for the client side is described as well.</p>
76

Differenzierte Bereitstellung von Internetdiensten in öffentlichen Bereichen der Universität

Breiler, Andre 26 January 2001 (has links)
Die vorliegende Arbeit entwickelt und implementiert ein System für die Bereitstellung von Internet-Diensten an öffentlichen Orten. Besonderer Wert wurde auf eine einfache Handhabung für den Nutzer, eine breite Unterstützung von Klienten und ein breites Spektrum möglicher Privilegien (von der vollen Internetkonnektivität bis zu einer Art Infoterminalstatus) gelegt.
77

Klassenbasierter Anschluss im Chemnitzer Studenten Netz

Junge, Sebastian 10 December 2005 (has links) (PDF)
Im Rahmen dieser Studienarbeit soll die Bedeutung klassenbasierter Anschlüsse im Chemnitzer Studenten Netz untersucht und Tools bereitgestellt werden, welche eine weitgehend automatisierte Anlage/Verwaltung solcher Netzklassen ermöglichen.
78

Control and Status of Telemetric Network Systems

Araujo, Maria S., Newton, Todd A., Samiadji-Benthin, Christopher S., Seegmiller, Ray D., Moodie, Myron L., Abbott, Ben A., Grace, Thomas B., Malatesta, William A. 10 1900 (has links)
ITC/USA 2012 Conference Proceedings / The Forty-Eighth Annual International Telemetering Conference and Technical Exhibition / October 22-25, 2012 / Town and Country Resort & Convention Center, San Diego, California / Network-based telemetry systems have unprecedented amounts of flexibility due to the ability to manipulate configuration during a test. As a result of this flexibility, multiple tests can be conducted in a single flight; all it takes is reconfiguration of instrumentation. However, configuration of devices can be a complex task, and dynamic configuration can be even more daunting. As such, device configuration, control, and status must be managed in a coordinated fashion. A system manager implementation that performs coordinated status and control of instrumentation in the Test Article as well as test configuration authoring is presented in this paper, the Ground Test Article Manager (GTAM), which is being developed by the integrated Network Enhanced Telemetry (iNET) program.
79

VGTU kompiuterių tinklų užimtumo analizė / VGTU computer network load analysis

Štaras, Mindaugas 28 June 2004 (has links)
The purpose of the final job is to analyze load of the computer network main lines during weekdays in VGTU and to compare it with load of the same type lines. In the job VGTU network history, development and present situation is described. The network typology, main communicative equipment and routing is discussed. The main protocols of the networks and control technologies are described in the job. Possibilities to use them for making network statistics are analyzed. Statistical information receiving and releasing system is realized. Possibility to use it in VGTU computer network is demonstrated. The carried out analysis permits to determine the weak links of the network, load in dynamics of the main equipment and the increase of the network resource usage. This lets predict the expansion of the network and the necessary renovations.
80

Implementação de um IDS utilizando SNMP e lógica difusa / Implementation of an IDS using SNMP and fuzzy logic

Virti, Émerson Salvadori January 2007 (has links)
Este trabalho busca o estudo da segurança em redes de computadores através da implementação de um sistema detector de intrusão embasado na captura de informações pela utilização do protocolo SNMP. Para alcançar-se a diminuição no número de falsos positivo e negativo, problema peculiar à maioria dos IDS, utiliza-se a lógica difusa para, com o auxilio dos administradores de segurança de cada rede, possibilitar a construção de um sistema detector de intrusão que melhor se adeque às características das redes monitoradas. Posteriormente, utilizando o monitoramento de uma rede de produção, avalia-se a melhora na segurança obtida com o uso do IDS implementado por esse trabalho que, atuando quase em tempo real, propicia sua adoção como mecanismo complementar à segurança de redes. / This work develops a study about Computer Network Security through the implementation of an Instruction Detection System (IDS) based on system information captured by the SNMP protocol. To reach a reduction in the number of false positive and false negative, a peculiar problem to the majority of the IDS, it is used fuzzy logic and the assistance of Network Security Administrators. Thus it is possible to build an Intrusion Detection System better adjusted to the network characteristics that must be monitored. At last, by monitoring a production network, it is evaluated the overall security improvement obtained by the IDS proposed in this work and considers its adoption as a complementary network security mechanism.

Page generated in 0.0237 seconds