• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 1
  • 1
  • Tagged with
  • 5
  • 5
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Felsökning av nätverksenheter : En metod för effektivare felsökning av Cisco Nexus 3000 switch / Network device troubleshooting : A method for more efficient troubleshooting of Cisco Nexus 3000 switch

Khajo, Aboud, Razai, Mattias January 2024 (has links)
Denna rapport syftar till att hitta en metod för effektivare felsökning av Cisco Nexus 3000 switchar. Företag utvecklas ständigt och behovet av flera nätverksenheter ökar, dock har metoder för felsökningen av nätverksenheter inte standardiserats. Den gamla metoden genom kommandorad där enskilda nätverksenheter granskas en i taget är inte längre lämplig i dagens IT-företag när antalet nätverksenheter uppgår till flera tiotusen. Rapporten görs i samarbete med IT-företaget Conscia.  Metoden baseras på en simulering och en testuppkoppling med hjälp av nätverkshanteringsprotokollet NETCONF genom Python-biblioteket Ncclient. Resultatet bestod av flera parametrar och faktorer som kan indikera en förändring i nätverksenheten. Detta har resulterat i en metod som ger information om olika parametervärden och faktorer, vilket ger nätverksadministratören en klarare bild kring switchens tillstånd. Metoden har lett till effektivare felsökning av Cisco Nexus 3000 vid inträffandet av nätverksincidenter. / This report aims to find a method for more efficient troubleshooting of Cisco Nexus 3000 switches. Companies are constantly developing and the need for multiple network devices is increasing, however, methods for troubleshooting network devices have not been standardized. The old method through the command line interface where individual network devices are reviewed one at a time is no longer suitable in today's IT companies when the number of network devices amounts to several tens of thousands. The report is made in collaboration with the IT company Conscia. The method is based on a simulation and a test connection using the network management protocol NETCONF through the Python library Ncclient. The result consisted of several parameters and factors that may indicate a change in the network device. This has resulted in a method that provides information on various parameter values and factors, which gives the network administrator a clearer picture of the state of the switch. The method has led to more efficient troubleshooting of the Cisco Nexus 3000 when network incidents occur.
2

Identification of Users via SSH Timing Attack

Flucke, Thomas J 01 July 2020 (has links) (PDF)
Secure Shell, a tool to securely access and run programs on a remote machine, is an important tool for both system administrators and developers alike. The technology landscape is becoming increasingly distributed and reliant on tools such as Secure Shell to protect information as a user works on a system remotely. While Secure Shell accounts for the abuses the security of older tools such as telnet overlook, it still has fundamental vulnerabilities which leak information about both the user and their activities through timing attacks. The OpenSSH client, the implementation included in all Linux, Mac, and Windows computers, sends each keystroke entered to the server as soon as it becomes available. As a result, an attacker can observe the network patterns to know when a user presses a key and draw conclusions based on that information such as what a user is typing or who they are. In this thesis, we demonstrate that such an attack allows a malicious observer to identify a user with a concerning level of accuracy without having direct access to either the client or server systems. Using machine learning classifiers, we identify individual users in a crowd based solely on the size and timing of packets traveling across the network. We find that our classifiers were able to identify users with 20\% accuracy using as little as one hour of network traffic. Two of them promise to scale well to the number of users.
3

Mitteilungen des URZ 2/1998

Huebner, U., Grunewald,, Heide,, Huettmann,, Trapp, 05 August 1998 (has links)
Perspektiven im Netzbereich C.A.N. - Chemnitzer AbsolventenNetz Grafische Benutzeroberfl¨achen im Netz (VNC) PGP 5.x und GNUPG Neuigkeiten bei der Secure Shell (SSH) Vim 5.x Richtlinien zur Sicherheit im Campusnetz Ein Jahr Einsatz von Windows NT im URZ
4

Mitteilungen des URZ 1/2/1996

Riedel, Ursula, Richter, Frank, Huebner, Uwe, Wunderlich, Jan, Trapp, Holger, Clauss, Matthias, Baensch, Karsten, Plichta, Christa, Riedel, Wolfgang, Dippmann, D., Winkler, Jürgen 20 August 1996 (has links)
Neuer WWW-Server Metacomputing - neue Aufgabenverteilung im Netz Harvest Secure Shell Nutzung der WS-Pools SW-Umgebung Parsytec URZ auf der CeBit Software-News Dienste des URZ - Ueberblick
5

Mitteilungen des URZ 2/1998

Huebner, U., Grunewald, Heide, Huettmann, Trapp 05 August 1998 (has links)
Perspektiven im Netzbereich C.A.N. - Chemnitzer AbsolventenNetz Grafische Benutzeroberfl¨achen im Netz (VNC) PGP 5.x und GNUPG Neuigkeiten bei der Secure Shell (SSH) Vim 5.x Richtlinien zur Sicherheit im Campusnetz Ein Jahr Einsatz von Windows NT im URZ

Page generated in 0.0503 seconds