-
21
Design and Implementation of a Vlsm Simulator
Published 2023-07-01Subjects: “…VLSM, IP Addressing, Subnetting, Maximize Addressing Efficiency.…”
Get full text
Article -
22
Virtual IP-Based Secure Gatekeeper System for Internet of Things
Published 2020-12-01Subjects: Get full text
Article -
23
Implementasi Trunk Interkoneksi Multi Server menggunakan Singleboard Komputer
Published 2021-06-01Subjects: “…server, voip, ip telephony, internet telephony, digital phone, ip address, pbx, codec, prefix…”
Get full text
Article -
24
Adoption of IP Truncation in a Privacy-Based Decision Tree Pruning Design: A Case Study in Network Intrusion Detection System
Published 2022-03-01Subjects: Get full text
Article -
25
Signal Quality Improvement for Mobile Phone Using the Pico Cells in Dense Phone Usage Areas
Published 2012-04-01Subjects: Get full text
Article -
26
Implementation of a Lossless Moving Target Defense Mechanism
Published 2024-02-01Subjects: Get full text
Article -
27
Distributed Dynamic Host Configuration Protocol (D2HCP)
Published 2011-04-01Subjects: Get full text
Article -
28
Investigation of protection of DNS servers from cache poisoning attacks
Published 2012“…It performs the translation between domain name and real IP address. DNS cache poisoning attack change or insert records in the resolver caches so that a DNS query will return a fake IP address of the attacker’s domain instead of the real IP address. …”
Get full text
Final Year Project (FYP) -
29
Design and Implementation of Internet Protocol
Published 2013-08-01“… Determining the geographic location of an Internet Protocol (IP) devices based on its IP addresses is a challenging matter because of wide network topologies and many protocols used to interconnect these devices. …”
Get full text
Article -
30
Towards Supercomputing Categorizing the Maliciousness upon Cybersecurity Blacklists with Concept Drift
Published 2023-01-01“…All the experiments have been carried out with a well-known optimal set of features: the geolocation information of the IP address. However, the geolocation features of an IP address can change over time. …”
Get full text
Article -
31
Development of (VOIP) applications for mobile devices
Published 2009“…SIP Registrar Server is used to store the user location. As the IP Address changes due to the changes of user location, the registrar server will be responsible for storing the user latest IP address. …”
Get full text
Final Year Project (FYP) -
32
Design security schemes to prevent DNS cache poisoning attacks
Published 2014“…DNS cache poisoning attack is a frequently discovered vulnerability that changes or inserts records in the resolver caches so that a DNS query will return a fake IP address of the attacker’s server instead of the real IP address. …”
Get full text
Final Year Project (FYP) -
33
IMPLEMENTASI BAYESIAN BELIEF NETWORK UNTUK SISTEM MANAJEMEN KEAMANAN JARINGAN DI JURUSAN TEKNIK ELEKTRO DAN TEKNOLOGI INFORMASI FT UGM
Published 2014“…Threshold determined that an IP address is a threat positive that its generate ThreatPositive values above 0.6. …”
Thesis -
34
Design and Implementation of Dynamic Hybrid Virtual Honeypot Architecture for Attack Analysis
Published 2013-04-01“…The experiment result proves this architecture can claim for multiple IP address, filter uninteresting traffic and gives a realism response for attacker.…”
Get full text
Article -
35
Tor Hidden Services: A Systematic Literature Review
Published 2021-09-01“…Among them, we can mention that Tor can hide a user’s IP address when accessing to a service such as the Web, and it also supports Tor hidden services (THS) (now named onion services) as a mechanism to conceal the server’s IP address, used mainly to provide anonymity to websites. …”
Get full text
Article -
36
TAARA Method for Processing on the Network Forensics in the Event of an ARP Spoofing Attack
Published 2023-03-01“…The information that was gathered, such as the IP address and MAC address of the attacker, the IP address and MAC address of the target, and the date and time of the attack are examples of evidence information that was gathered. …”
Get full text
Article -
37
Developing TCP/IP and UDP traffic monitoring tool / Rafiq Che Mat
Published 2005“…For example, in the case of usage of file transfer, the TCP/IP and UDP Traffic monitor checks the details of the data transmission including the size of messages transmitted or received during a given period of time, the source IP address and MAC address, the destination IP address and MAC address, the source and destination port number, the type of protocol that have been used and etc. …”
Get full text
Student Project -
38
MTDCD:A Hybrid Defense Mechanism Against Network Intrusion
Published 2022-07-01“…Both moving target defense and cyber deception defense protect their own systems and networks by increasing the uncertainty of information acquired by attackers.They can slow down network reconnaissance attacks to a certain extent.However,a single moving target defense technology cannot prevent attackers who use multiple information to conduct network intrusions.Meanwhile,the deployed decoy node may be identified and marked by the attacker,thereby reducing the defense effectiveness.Therefore,this paper proposes a hybrid defense mechanism combining moving target defense and cyber deception defens.Through in-depth analysis of actual network confrontation,a network intrusion threat model is constructed.Finally,a defense effectiveness evaluation model based on the Urn model is built.In addition,this paper evaluates the defense performance of the proposed hybrid defense method from multiple aspects such as virtual network topology size,deception probability of decoy nodes,IP address randomization period,IP address transfer probability,etc.,and provides reference and guidance for subsequent defense strategy design.…”
Get full text
Article -
39
Development of a software application for teaching computer networking
Published 2021“…From an IP address, you can also identify the subnetwork that the device is in. …”
Get full text
Final Year Project (FYP) -
40
Mobile application development for CCTV system
Published 2015“…In this project, the main focus is on creating and test out a user platform for IP address CCTV system with Android base device. Software implementation used Eclipse Juno 4.2 wit Android Software Development Kit (SDK) and PHP file. …”
Get full text
Final Year Project (FYP)