Network Configuration

2021 ◽  
pp. 433-488
Author(s):  
Richard Fox
2012 ◽  
Vol E95.B (6) ◽  
pp. 1924-1933 ◽  
Author(s):  
Hideki OKITA ◽  
Masahiro YOSHIZAWA ◽  
Keitaro UEHARA ◽  
Kazuhiko MIZUNO ◽  
Toshiaki TARUI ◽  
...  

Author(s):  
Adian Fatchur Rochim ◽  
Abda Rafi ◽  
Adnan Fauzi ◽  
Kurniawan Teguh Martono

The use of information technology these days are very high. From business through education activities tend to use this technology most of the time. Information technology uses computer networks for integration and management data. To avoid business problems, the number of network devices installed requires a manageable network configuration for easier maintenance. Traditionally, each of network devices has to be manually configured by network administrators. This process takes time and inefficient. Network automation methods exist to overcome the repetitive process. Design model uses a web-based application for maintenance and automates networking tasks. In this research, the network automation system implemented and built a controller application that used REST API (Representational State Transfer Application Programming Interface) architecture and built by Django framework with Python programming language. The design modeled namely As-RaD System. The network devices used in this research are Cisco CSR1000V because it supports REST API communication to manage its network configuration and could be placed on the server either. The As-RaD System provides 75% faster performance than Paramiko and 92% than NAPALM.


2017 ◽  
Vol 52 (6) ◽  
pp. 437-451 ◽  
Author(s):  
Ryan Beckett ◽  
Ratul Mahajan ◽  
Todd Millstein ◽  
Jitendra Padhye ◽  
David Walker

Electronics ◽  
2021 ◽  
Vol 10 (5) ◽  
pp. 537
Author(s):  
Hongxiang Gu ◽  
Miodrag Potkonjak

Physical Unclonable Functions (PUFs) are known for their unclonability and light-weight design. However, several known issues with state-of-the-art PUF designs exist including vulnerability against machine learning attacks, low output randomness, and low reliability. To address these problems, we present a reconfigurable interconnected PUF network (IPN) design that significantly strengthens the security and unclonability of strong PUFs. While the IPN structure itself significantly increases the system complexity and nonlinearity, the reconfiguration mechanism remaps the input–output mapping before an attacker could collect sufficient challenge-response pairs (CRPs). We also propose using an evolution strategies (ES) algorithm to efficiently search for a network configuration that is capable of producing random and stable responses. The experimental results show that applying state-of-the-art machine learning attacks result in less than 53.19% accuracy for single-bit output prediction on a reconfigurable IPN with random configurations. We also show that, when applying configurations explored by our proposed ES method instead of random configurations, the output randomness is significantly improved by 220.8% and output stability by at least 22.62% in different variations of IPN.


Sign in / Sign up

Export Citation Format

Share Document