• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 84
  • 38
  • 13
  • 10
  • 10
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 182
  • 69
  • 47
  • 34
  • 24
  • 24
  • 21
  • 20
  • 19
  • 19
  • 18
  • 17
  • 17
  • 15
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

Implementace pokročilých bezpečnostních algoritmů do domácích routerů / Implementation of the Advanced Security Algorithms into Home Routers

Špinler, Martin January 2011 (has links)
This work deals with network devices designed for packet routing in small networks. It's focused on two particular devices with ARM processor. There is detailed description of an instalation of OpenWRT operating system to this devices. Next, there are results of tests of routing performance of these and some other selected devices and tests of performance of alogorithms used in network security. A module for OpenWRT operating system for pattern-matching in network traffic is also part of the work.
92

Vyhledání nejdelšího shodného prefixu / Longest Prefix Match Algorithms

Weigner, Martin January 2011 (has links)
The speed of computer network is increasing. One of the basic tasks which has to be solved by the network devices is longest prefix match. Many algorithms are able to solve this task but it's necessary to solve it very fast because of increasing transfer speed and the routing standard IPv6. This standard has longer addresses and it's necessary to search prefixes in much bigger sets. The thesis describes present algorithms that solve the problem. These are confronted with new algorithm HashTreeBitmap which is also described in the work. On the tests is documented that this algorithm is able to cope with high demands which are placed on it.
93

Syntéza a verifikace síťové konfigurace / Network Configuration Synthesis and Verification

Černeková, Alžbeta January 2016 (has links)
The subject of this master's thesis is to address the topic of network devices configuring. It resolves the problems related to simplifying certain parts of configuration while eliminating frequent errors or issues. It introduces a solution to setting of IP addresses on router's interfaces. Furthermore it presents the generation of configuration for particular dynamic routing scenarios and its application and methods for its verification on network devices. It also demonstrates the preparation of configuration of VPN tunnel between two devices. The conclusion of this thesis contains possibilities for further extensions or improvements.
94

Automatisera konfigurationen av routrar och switchar på ett IT-tjänsteföretag

Boularbah, Mohamed January 2020 (has links)
Det anonyma företaget är ett IT-tjänsteföretag som utför IT-tjänster efter kunds behov. De fick för några månader sedan en internetleverantör som kund. De sköter konfigurationen av internetleverantörens routrar och switchar som sen skickas till internetleverantörens företagskunder. Arbetet går ut pa att uppgradera operativsystem på routrar och switchar samt lägga till filer och sedan skicka produkt till internetleverantörens slutkund. Filer och operativsystem skiljer sig åt beroende på vilken typ av router och switch som ska uppgraderas. Arbetssättet idag är ineffektivt och det blir en del fel då man idag arbetar med USB minnen. Målet med detta arbete är att effektivisera deras arbetssätt genom att lagra alla filer på en TFTP server istället för på USB minnen. Ett skript ska skapas med språket VB script som automatiserar konfigurationen av routrar och switchar. Terminal för att kunna kommunicera med router/switch är SecureCrt. Personal på Företaget har sagt att det i snitt tar ca 15 minuter att konfigurera en router manuellt. Man kör endast en åt gången pga. kvalitetssäkring och man måste sitta framför skärmen under hela förloppet då man konfigurerar manuellt. Resultatet av mitt arbete ledde till en effektivisering. Tiden det tar att konfigurera en router hamnar pa samma tid, ca 15 minuter, dock kan man köra flera samtidigt men pga. platsbrist så kan de köra max två åt gången samtidigt som man inte behöver sitta framför skärmen då skriptet sköter all konfiguration. Det blev också säkrare att köra då man slipper leta efter rätt USB minne till motsvarande enhet. / The anonymous company is an IT company that performs IT services according to customer needs. They got an internet provider as a customer about a couple of months ago. They manage the configuration of the ISP's routers and switches, which are then sent to the ISP's corporate customers. The work involves upgrading operating systems on routers and switches as well as adding files and then sending the product to the ISP’s end customer. Files and operating systems differ depending on the type of router and switch to be upgraded. The working method today is inefficient and there can be some errors when working with USB memory sticks today. The goal of this work is to improve and make their operation more effective by storing all files on a TFTP server instead of on USB storage. A script will be created with the language VB script that automates the configuration of routers and switches. The terminal for communicating with the router/switch is SecureCrt. Staff at the company have said that it takes on average about 15 minutes to manually configure a router. You only configure one at a time due to quality assurance and you have to sit in front of the screen throughout the process when configuring manually. The result of my work led to an efficiency improvement. The time it takes to configure a router ends at the same time, about 15 minutes, however, you can run several units simultaneously but because of lack of space, they can run a maximum of two at a time, while not having to sit in front of the screen as the script handles all configuration. It also led to lesser errors as you do not have to look for the correct USB memory for the corresponding device.
95

SNMP Application for the MINT Router (Walkstation II project)

Oelhafen, Markus January 1994 (has links)
The purpose of the Walkstation II project is to create a testbed for a wireless communication system with access to the Internet. The Mobile INTernet (MINT) router is a core element of this project. Most of the routers and many other nodes of today's Internet support network management. This includes the remote control of various parameters which caracterize the status of physical interfaces, protocols and many other objects. The Simple Network Management Protocol (SNMP) which was used in the current work is a standard protocol of the TCP/IP suite. All the managed nodes of the Internet have a common set of management capabilities. Their implementation is available in software development packages. The management of mobile stations requires a new set of management capabilities. They will allow for the control of mobility support and the radio links. The current work consists in adapting the set of standard SNMP capabilities to the MINT router and of the creation of a set of new capabilities specific to the MINT. / <p>I do not know the number of university credits, but entered it as 30 ECTS. This was an exchange student and I do not know if they were actually registered at KTH.</p>
96

Investigation of home router security

Karamanos, Emmanouil January 2010 (has links)
Home routers are common in every household that has some kind of Internet connectivity. These embedded devices are running services such as web, file and DHCP server. Even though they have the same security issues as regular computers, they do no run protection software such as anti-virus and they are not updated. Moreover, the importance of these devices is misjudged; all network traffic is passing through them and they control the DNS of the network while, in most cases, they are on-line around the clock. When more and more non-Internet features are implemented into home routers, such as Voice over IP and network storage, their role becomes more special and many security concerns are raising. In this thesis, we investigate the issues resulting from this special role; the importance for these devices to be secure, the attacking vector and how the devices can be compromised to be part of a large home router botnet. We conclude by proposing ways to make the current implementation more secure, suggesting ways to protect routers from botnets without user interaction, that is from the ISP, while respecting the privacy of the end user and we identify what future work needs to be done. / Router är vanliga i hem som har någon slags Internet anslutning. De här inbyggda enheter kör tjänster som t.ex. web, file och DHCP basenheter. Fastän de har samma säkerhetsfrågor som vanliga datorer, så kan de inte använda säkerhets mjukvara som t.ex anti-virus och de är inte uppdaterade. Dessutom har betydelsen av de här apparaterna blivit felbedömmat; hela nätverket passerar genom dem och de kontrolerar nätverkets DNS medan, i de flesta fall, de är on-line dygnet runt. Men, när mer och mer icke-Internet lockvaror fars in i routern, som t.ex Voice över IP och nätverkslagring, blir deras roll viktigare och oron för säkerheten växer. I den här avhandlingen utforskars problemen och frågorna som efterföljer deras speciella roll, hur viktigt det är att de här apparaterna är skyddade, (the attacking vector) och hur de här apparaterna kan bli jämkningad för att bli en del av ett stort router botnet. Vi avsluter med att lägga fram sätt att göra det nuvarande verktyget mer skyddat, föreslå sätt att skydda routern från botnet utan användarinteraktion, som kommer från ISP, medan man respekterar det andra användarens privtaliv och markera vad som behövs ändras i framtiden.
97

Sårbarheter i routrar och switchar

Dannerud, Sara January 2008 (has links)
Det finns många olika källor där man kan få information om sårbarheter i routrar och switchar. Mängden information gör det dock svårt att på ett enkelt sätt ta reda på vilka tillverkare som drabbas och vilken typ av sårbarheter man hittar i nätverksutrustning. Därmed är det också svårt att veta hur man ska skydda sin utrustning mot attacker. I detta examensarbete analyseras ett antal befintliga sårbarheter i routrar och switchar. Dessa sårbarheter har valts ut genom att i National Vulnerability Database söka på orden ”router” och ”switch”. Målet med analysen är att svara på frågorna vem, vad och varför när det gäller sårbarheter i routrar och switchar. Examensarbetet beskriver vilka tillverkare som drabbas av sårbarheter, vilka typer av sårbarheter som är vanligast i routrar och switchar och varför sårbarheterna har uppstått. Utifrån detta dras slutsatser om vad man som användare ska göra för att undvika attacker mot sin utrustning. I arbetet beskrivs också hur tillverkarna väljer att hantera de sårbarheter som finns i deras produkter. / There are a lot of different sources to information about vulnerabilities in routers and switches. The amount of information means that there is no easy way to find out which vendors are affected by vulnerabilities and what types of vulnerabilities that are found in network equipment. Thereby it is also hard to know how to protect your equipment against attacks. In this thesis a number of already existing vulnerabilities in router and switches are being analyzed. These vulnerabilities have been chosen by searching the National Vulnerability Database using the words “router” and “switch”. The aim of the analysis is to answer the questions who, what and why when it comes to vulnerabilities in routers and switches. The thesis describes which vendors are exposed to vulnerabilities, what types of vulnerabilities that are most common among routers and switches and why these vulnerabilities have came up. Based on this information, conclusions are drawn regarding what the user should do to avoid vulnerabilities in their equipment. The way the companies deal with vulnerabilities in their products is also described.
98

A Network based Home surveillance/ monitoring system : Router based Deployment and Network Security

Song, Zixuan January 2011 (has links)
Home surveillance/monitoring systems are widely used nowadays. An intelligent surveillance system can provide multiple functions for uses. The assumption underlying this thesis project is that a home surveillance system can help people manage their homes better. The thesis presents two investigations into an intelligent home surveillance system implementation. First we will focus on the development of a router platform, which can manage the cameras connected to an intelligent home surveillance system. Such a system will include at least one router, one or more cameras. Some of these cameras will be connected by wireless links. Each camera will be dynamically allocated an IP address. The system will manage and control the various elements of the home surveillance/monitoring system via the network. Second, we will examine potential network security solutions, and choose a suitable solution. A key result of this thesis project is that SRTP and MIKEY are suitable for use in a home surveillance/monitoring system and together they provide authentication and privacy for the information from the camera (and potentially other information). This privacy is an important aspect of a home surveillance/monitoring system, since improper use of this information could be damaging to the homeowner’s privacy and personal integrity.
99

Collecting and analyzing Tor exit node traffic

Jonsson, Torbjörn, Edeby, Gustaf January 2021 (has links)
Background. With increased Internet usage occurring across the world journalists, dissidents and criminals have moved their operations online, and in turn, governments and law enforcement have increased their surveillance of their country’s networks. This has increased the popularity of programs masking users’ identities online such as the Tor Project. By encrypting and routing the traffic through several nodes, the users’ identity is hidden. But how are Tor users utilizing the network, and is any of it in the plain text despite the dangers of it? How has the usage of Tor changed compared to 11 years ago? Objectives. The thesis objective is to analyze captured Tor network traffic that reveals what data is sent through the network. The collected data helps draw conclusions about Tor usage and is compared with previous studies. Methods. Three Tor exit nodes are set up and operated for one week in the US, Germany, and Japan. We deploy packet sniffers performing a deep packet inspection on each traffic flow to identify attributes such as application protocol, number of bytes sent in a flow, and content-type if the traffic was sent in plain text. All stored data is anonymized. Results. The results show that 100.35 million flows were recorded, with 32.47%of them sending 4 or fewer packets in total. The most used application protocol was TLS with 55.03% of total traffic. The HTTP usage was 15.91% and 16% was unknown protocol(s). The countries receiving the most traffic were the US with over45% of all traffic, followed by the Netherlands, UK, and Germany with less than 10%of recorded traffic as its destination. The most frequently used destination ports were 443 at 49.5%, 5222 at 12.7%, 80 with 11.9%, and 25 at 9.3%.Conclusions. The experiment shows that it is possible to perform traffic analysis on the Tor network and acquire significant data. It shows that the Tor network is widely used in the world but with the US and Europe accounting for most of the traffic. As expected there has been a shift from HTTP to HTTPS traffic when compared to previous research. However, there is still unencrypted traffic on the network, where some of the traffic could be explained by automated tools like web crawlers. Tor users need to increase their awareness in what traffic they are sending through the network, as a user with malicious intent can perform the same experiment and potentially acquire unencrypted sensitive data.
100

DYNAMIC ANALYSIS AND MODELING OF AC/AC POWER CONVERTERS FOR APPLICATIONS TO SMART-GRID SOLUTIONS / スマートグリッドへの適用のためのAC/ACパワーコンバータの動的解析とモデル化

Alexandros, Kordonis 23 March 2015 (has links)
京都大学 / 0048 / 新制・課程博士 / 博士(工学) / 甲第18989号 / 工博第4031号 / 新制||工||1621(附属図書館) / 31940 / 京都大学大学院工学研究科電気工学専攻 / (主査)教授 引原 隆士, 教授 木本 恒暢, 教授 松尾 哲司 / 学位規則第4条第1項該当 / Doctor of Philosophy (Engineering) / Kyoto University / DFAM

Page generated in 0.0515 seconds