The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Because of increasing number of hacking attack that are caused mainly due to ARP-Spoofing, there by a new technique is presented in this paper by which these threats can be detected. The technique discussed here includes a network administrator, who can monitor and easily detect the ARP-Spoofing occurring in his local subnet. This paper has a mechanism to detect IP-ARP Spoofing.
Current solutions for managing distributed applications in the cloud, typically covered by PaaS (Platform as a Service) offers, remain domain specific and are only partially automated. In this context, the task consisting in automatically configuring distributed applications is still a difficult issue. In this paper, we present an application architectural model and a self-configuration protocol that...
Recently, there are increasingly numerous hacking techniques which are used to compromise the computer systems. One popular hacking technique is called Man-in-the-Middle attack [1]. This technique uses the weakness of ARP protocol [5] namely “ARP spoofing” to damage the users on both confidentiality and privacy issues. It does not only steal the sensitive information, but also leads to the collapse...
Both SNMP and Netflow have advantages and disadvantages in traffic collect and manage, by study, introduced a new network traffic management combining Netflow based on Hash aggregation with SNMP, use hash aggregation to combine the large number of original Netflow data, achieved the compression store of original traffic data and efficient network system management, make full use of the advantages...
It is necessary to monitor and control remotely the devices in scattered unattended machine rooms. The remote monitoring and controlling system are designed based on SNMP and TCP/IP, which uses mainly existing intranet. Following the introductions of SNMP and TCP/IP, overview design and software design of the system are presented. The system may achieve the management of unattended machine rooms and...
This paper presents new Signaling System No. 7 (SS7) to IP based Signaling Transport (SIGTRAN) protocol interchanger software and related hardware to implement an improved distributed database based Automated Teller Machine (ATM) network where the countrywide existing IP network can be used. Currently the ATM network is based on fully centralized database environment. This leads to varying transaction...
The upcoming peer-to-peer (P2P) and other decentralized, co-operative storage mechanisms allow for decentralized storage of data as well as decentralized search, depending on the specific system. In this work, we assume these kinds of systems to store management information into it. We discuss some of the opportunities, requirements, and challenges when storing network management information decentralized...
This paper presents an implementation of competitive data acquisition system based on wireless network. Adopting IEEE802.11b wireless communication standard, introducing the organization and operational mode of wireless network, and discussing the B/S design thought of data collector, data control and Web server, and show the operation results at last. This resolution support flexible organization...
This article presents our framework intended for measurement of the Ethernet traffic, its evaluation and finally graphical representation. Whole project consists of three main parts network measurement, trace analysis and user interface.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.