scholarly journals Algorithm and Technical Solutions for Dynamic Configuration of Client-Server Computing Networks

Author(s):  
Roman Maximov ◽  
Sergey Sokolovsky ◽  
Ivan Voronchikhin

The main factors that determine the expansion of capabilities and increase the effectiveness of network intelligence to identify the composition and structure of client-server computer networks due to the stationarity of their structural and functional characteristics are analyzed. The substantiation of an urgent problem of dynamic management of structurally-functional characteristics of the client-server computer networks functioning in the conditions of network reconnaissance is resulted on the grounds of the revealed protection features of client-server computer networks at the present stage that is based on realization of principles of spatial safety maintenance, and also formalization and introduction of forbidding regulations. The mathematical model allowing to find optimum modes for dynamic configuration of structurally-functional characteristics of client-server computer networks for various situations is presented. Calculation results are given. An algorithm is presented that makes it possible to solve the problem of dynamic configuration of the structural and functional characteristics of a client-server computer network, which reduces the reliability time of data obtained by network intelligence. The results of practical tests of software developed on the basis of the dynamic configuration algorithm of client-server computer networks are shown. The obtained results show that the use of the presented solution for the dynamic configuration of client-server computer networks allows to increase the effectiveness of protection by changing the structural and functional characteristics of client-server computer networks within several subnets without breaking critical connections through time intervals that are adaptively changed depending on the functioning conditions and the attacker’s actions. The novelty of the developed model lies in the application of the mathematical apparatus of the Markov’s theory of random processes and Kolmogorov’s solution of equations to justify the choice of dynamic configuration modes for the structural and functional characteristics of client-server computer networks. The novelty of the developed algorithm is the use of a dynamic configuration model for the structural and functional characteristics of client-server computer networks for the dynamic control of the structural and functional characteristics of a client-server computer network in network intelligence.

2019 ◽  
Author(s):  
Bayu Kurniawan

Computer network connection is a fundamental thing in a network because if a connection is problematic, then all types of applications that run through a computer network cannot be used. Cisco Packet Tracer can be used for simulations that reflect a picture of the computer network connection on the network system used. This paper designs two designs, namely the design with a star topology from one server using Cisco Packet Tracer software and connecting networks between computers. The results of this study are the connection between computer networks. This study was conducted to find out whether the server and client computers can communicate with each other


2018 ◽  
Vol 7 (2) ◽  
pp. 61-67
Author(s):  
Iga Revva Princiss Jeinever

Computer networks are basically not safe to access freely. Security gaps in the network can be seen by irresponsible people with various techniques. Opening a port for access carries a high risk of being attacked by an attacker. In this connection, network administrators are required to work more to be able to secure the computer network they manage. One form of network security that is often used by network administrators in server management is through remote login such as ports on telnet, SSH, etc. A port that is always open is a network security hole that can be used by people who are not responsible for logging into the server. Focusing on these problems, in this study, Random Port Knocking is the right way and can be used to increase network security. With Random Port Knocking, the port will be opened as needed, the port will automatically change when it fails to log in more than three times and IP will automatically be blocked and access will not continue so that attacks on the network can be avoided and network security stability can be further improved. The final result of this research shows that the method applied in this research makes server safe. Because port randomization and IP block make irresponsible parties try harder to penetrate firewall walls.


Author(s):  
Theodorus Kristian Widianto ◽  
Wiwin Sulistyo

Security on computer networks is currently a matter that must be considered especially for internet users because many risks must be borne if this is negligent of attention. Data theft, system destruction, and so on are threats to users, especially on the server-side. DDoS is a method of attack that is quite popular and is often used to bring down servers. This method runs by consuming resources on the server computer so that it can no longer serve requests from the user side. With this problem, security is needed to prevent the DDoS attack, one of which is using iptables that has been provided by Linux. Implementing iptables can prevent or stop external DDoS attacks aimed at the server.


2021 ◽  
Author(s):  
Celia J. Li

This thesis research has successfully completed two developments: an efficient Power-system Role-based Access Control (PRAC) and a secure Power-system Role-based kEy management (PREM). The PRAC significantly increases the security of computer networks for power systems, and surmounts the challenges caused by typical security and reliability concerns due to current technological and political changes faced in the electricity power industry. The PREM is designed to support the efficient operation of the PRAC using one-way hash functions and utilizing their advantages of computationally efficient and irreversibility security. PRAC and PREM are not only developed for handling single local computer network domain, but also extended for supporting multiple computer network domains. A platform for the comprehensive assessment of PREM is established for the fast and economical assessment of the key management developed in this thesis research.


2021 ◽  
Author(s):  
Celia J. Li

This thesis research has successfully completed two developments: an efficient Power-system Role-based Access Control (PRAC) and a secure Power-system Role-based kEy management (PREM). The PRAC significantly increases the security of computer networks for power systems, and surmounts the challenges caused by typical security and reliability concerns due to current technological and political changes faced in the electricity power industry. The PREM is designed to support the efficient operation of the PRAC using one-way hash functions and utilizing their advantages of computationally efficient and irreversibility security. PRAC and PREM are not only developed for handling single local computer network domain, but also extended for supporting multiple computer network domains. A platform for the comprehensive assessment of PREM is established for the fast and economical assessment of the key management developed in this thesis research.


Author(s):  
S.N. John ◽  
A.A. Anoprienko ◽  
C.U. Ndujiuba

This chapter provides solutions for increasing the efficiency of data transfer in modern computer network applications and computing network environments based on the TCP/IP protocol suite. In this work, an imitation model and simulation was used as the basic method in the research. A simulation model was developed for designing and analyzing the computer networks based on TCP/IP protocols suite which fully allows the exact features in realizing the protocols and their impact on increasing the efficiency of data transfer in local and corporate networks. The method of increasing efficiency in the performance of computer networks was offered, based on the TCP/IP protocols by perfection of the modes of data transfer in them. This allows an increased efficient usage of computer networks and network applications without additional expenditure on infrastructure of the network. Practically, the results obtained from this research enable significant increase in the performance efficiency of data transfer in the computer networks environment. An example is the “Donetsk National Technical University” network.


Game Theory ◽  
2017 ◽  
pp. 369-382
Author(s):  
Sungwook Kim

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. It involves the authorization of access to data in a network, which is controlled by the network administrator. Usually, network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies, and individuals. This chapter explores network security.


Sign in / Sign up

Export Citation Format

Share Document