scholarly journals Packet Filtering Based On Differentiated Services Code Point For DHCP Starvation Attacks Prevention

2019 ◽  
Vol 4 (2) ◽  
pp. 137 ◽  
Author(s):  
Nfn Sarip ◽  
Arief Setyanto

The use of the internet today has become a necessity, the most commonly used media to connect to the internet is a Wireless LAN network. For easy access to the network, DHCP service become a standard feature that must exist, because ordinary users no longer need to think about procedures for configuring IP addresses, all of which have been done automatically by the DHCP service. But it turns out that there is a security threat to DHCP service, namely DHCP Starvation attacks that can be exhausting the availability of IP addresses in DHCP service so that the configuration of IP address automatically can no longer be done on the client. Various methods such as authentication, cryptography, and machine learning are used by researchers in preventing DHCP Starvation attacks, but the issue of effectiveness and efficiency still opens up further research opportunities. In this research, packet filtering methods based on DSCP code applied to the Netfilter system are used to do prevention of DHCP Starvation attacks, this method has proven to be very effective in making prevention and more efficient when applied on small scale wireless networks such as at office networks and internet cafe.

Author(s):  
Diana Elizabeth Moreno Carrillo ◽  
Gustavo Adolfo León Duarte ◽  
Carlos René Contreras Cázarez

ABSTRACTSociety has been transforming throughout the last years. The easy access to Internet has made two important institutions, family and school, cope to new challenges. Teenagers in different countries have access to Internet. However, understanding how these changes affect them, their families, their education, their community and the risks they cope help us get to empiric research. The main inquiry is to identify the use and the role parents have around the Internet and technological devices. The research is based in a mixed approach, combining qualitative and quantitative methods, using a questionnaire and a focus group to collect data.RESUMENLa sociedad ha venido transformándose durante las últimas décadas. El fácil acceso al Internet ha hecho que dos importantes instituciones, la familia y la escuela, se enfrenten a nuevos retos. En distintos países alrededor del mundo, los adolescentes tienen acceso al Internet. Sin embargo, para entender como estos cambios los afecta a ellos, a sus familias, a su educación, a su comunidad y los riesgos que enfrentan, es posible llevar a cabo la investigación empírica. La pregunta central es conocer el uso y el rol que tienen los padres en torno al Internet y a los dispositivos tecnológicos. Como parte de la metodología, la construcción del objeto de estudio se basa en la implementación de un enfoque mixto. La combinación de enfoques cualitativos y cuantitativos conlleva al diseño de dos fases en las que se utilizarán dos herramientas, la encuesta y el grupo focal. Contacto principal: [email protected]


2015 ◽  
Vol 7 (3) ◽  
pp. 1-23 ◽  
Author(s):  
Benjamin Edelman ◽  
Michael Schwarz

We consider market rules for transferring IP addresses, numeric identifiers required by all computers connected to the Internet. Transfers usefully move resources from lowest- to highest-valuation networks, but transfers tend to cause socially costly growth in the Internet's routing table. We propose a market rule that avoids excessive trading and comes close to achieving social efficiency. We argue that this rule is feasible despite the limited powers of central authorities. We also offer a framework for reasoning about future prices of IP addresses, then explore the role of rentals in sharing information about the value of IP address and assuring allocative efficiency. (JEL D47, D82, D85, L86)


2002 ◽  
Vol 1 (1) ◽  
Author(s):  
Faris Mahdi

The explosion in the use of the Internet/Intranet and its accessibility to individuals, and enterprises has dramatically changed the way organizations conduct business with its customers and partners. The Internet/Intranet with inherent features like easy access, real-time information, and low cost, is a natural driver for business operations solution. Further, related to Internet/Intranet, the Web is very critical component. Web makes the application easy to use and provides an intuitive way for users to interact.Web offers tremendous time and cost savings for corporate operations. Web based operations management is operating businesses in the Internet world. It is about using the power of digital information to understand the needs and preferences of customers and partners, to customize products and services for them, and then deliver the products and services as quickly as possible. Automated services offer businesses the potential to increase revenues, lower costs, and establish and strengthen customers and partner relationships. To achieve these benefits, many enterprises engage in electronic commerce for business operations. In the future, Web will be common tool in any activities for both individual and enterprises.


Author(s):  
Mohammed Thakir Shaamood

The world is witnessing a marked and rapid change in the use of the Internet in all areas of life and this is a natural development. Because the existence of the web has swelled and increased and became a lot in various magazines depend on it and greatly. Our topic today is about Internet applications in libraries and information centers. How has library performance developed in general? What are the challenges facing librarians? What is the benefit of the students and researchers? Thanks to the presence of the Internet there has been a great revolution in the performance of libraries and traditional processes and developed many of them, for example, reference services, document delivery, resource sharing, and others. Librarians and staff in information centers face significant challenges in developing their Web site. And this returned to all those who come to the library benefit, where there is a schedule of dates and official holidays, planning of buildings within the library, information center for easy access to the destination and organization of different memberships in different categories, circulation and acquisition, and easy to announce the activities of various periodicals and seminars and know all the details and special rules. This research tries to introduce the impact of the technology on the libraries in terms of librarian and library visitors and the resources in the libraries


Author(s):  
Mohammed Thakir Shaamood

The world is witnessing a marked and rapid change in the use of the Internet in all areas of life and this is a natural development. Because the existence of the web has swelled and increased and became a lot in various magazines depend on it and greatly. Our topic today is about Internet applications in libraries and information centers. How has library performance developed in general? What are the challenges facing librarians? What is the benefit of the students and researchers? Thanks to the presence of the Internet there has been a great revolution in the performance of libraries and traditional processes and developed many of them, for example, reference services, document delivery, resource sharing, and others. Librarians and staff in information centers face significant challenges in developing their Web site. And this returned to all those who come to the library benefit, where there is a schedule of dates and official holidays, planning of buildings within the library, information center for easy access to the destination and organization of different memberships in different categories, circulation and acquisition, and easy to announce the activities of various periodicals and seminars and know all the details and special rules. This research tries to introduce the impact of the technology on the libraries in terms of librarian and library visitors and the resources in the libraries.


2019 ◽  
Vol 62 (12) ◽  
pp. 1734-1747
Author(s):  
Binlin Cheng ◽  
Jinjun Liu ◽  
Jiejie Chen ◽  
Shudong Shi ◽  
Xufu Peng ◽  
...  

Abstract Malware brings a big security threat on the Internet today. With the great increasing malware attacks. Behavior-based detection approaches are one of the major method to detect zero-day malware. Such approaches often use API calls to represent the behavior of malware. Unfortunately, behavior-based approaches suffer from behavior obfuscation attacks. In this paper, we propose a novel malware detection approach that is both effective and efficient. First, we abstract the API call to object operation. And then we generate the object operation dependency graph based on these object operations. Finally, we construct the family dependency graph for a malware family. Our approach use family dependency graph to represent the behavior of malware family. The evaluation results show that our approach can provide a complete resistance to all types of behavior obfuscation attacks, and outperforms existing behavior-based approaches in terms of better effectiveness and efficiency.


Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 4975
Author(s):  
Dan Komosny

The paper deals with the locations of IP addresses that were used in the past. This retrospective geolocation suffers from continuous changes in the Internet space and a limited availability of past IP location databases. I analyse the retrospective geolocation of IPv4 and IPv6 addresses over five years. An approach is also introduced to handle missing past IP geolocation databases. The results show that it is safe to retrospectively locate IP addresses by a couple of years, but there are differences between IPv4 and IPv6. The described parametric model of location lifetime allows us to estimate the time when the address location changed in the past. The retrospective geolocation of IP addresses has a broad range of applications, including social studies, system analyses, and security investigations. Two longitudinal use cases with the applied results are discussed. The first deals with geotargeted online content. The second deals with identity theft prevention in e-commerce.


2018 ◽  
Vol 7 (3.21) ◽  
pp. 441
Author(s):  
Ahmad Cholil ◽  
Hasmah Zanuddin ◽  
. .

There are 911 of Islamic boarding schools in Madura. However, the students do not have easy access to the media via the Internet as expected. This is particularly due to some restrictions imposed by the schools on them in accessing the Internet. This resulted in the study of communication action between students of Islamic boarding schools and the new internet media; that is, how the schools and students can absorb the use of new media among students and how they play roles in political participation through new internet media. The present study employs a qualitative approach using ethnographic observations. The study uses Rogers’ (1986) theory on the diffusion of innovation organizations and individuals, Roth’s (1980) theory on political participation, and Wilson’s (1980) theory on the pyramid of political participation. Based on diffusion of organizational innovation, it was found that the Banyuanyar Islamic boarding schools accept the existence of the Internet, but they experience lack of computer equipment (hardware), application program (software), as well as lack of experts and skills to use the facilities. As for the communication action, the use of the Internet gains wide acceptance. Most of the students even have basic knowledge to use the Internet before they enter school. The existence of media facilities may lead to the breach of rules by the students with regard to the policies of pesantren. Some efforts are needed to identify ethical violations in communication actions undertaken by the students in the use of the Internet. On the one hand, the identification of the Internet provides freedom space, but on the other, the pesantren does not have virtual security officers to deal with digital violations that may be committed by the students. The early identification of an effort is necessary to anticipate the adoption of innovations and to make boarding school students media-intelligent. In term of the tendency of political participation, the students of pesantren Banyuanyar are participative in political activities. The policy made by the pesantren leaders plays a pivotal role in political participation. The education on political participation among students of pesantren through new media is reflected in the flow of information that is accessible everywhere, particularly electronic media, which has contributed significantly to developing the mindset of the people, especially among the students of pesantren.  


2018 ◽  
Vol 7 (4.9) ◽  
pp. 151
Author(s):  
Ahmad Cholil ◽  
Hasmah Zanuddin

There are 911 of Islamic boarding schools in Madura. However, the students do not have easy access to the media via the Internet as expected. This is particularly due to some restrictions imposed by the schools on them in accessing the Internet. This resulted in the study of communication action between students of Islamic boarding schools and the new internet media; that is, how the schools and students can absorb the use of new media among students and how they play roles in political participation through new internet media. The present study employs a qualitative approach using ethnographic observations. The study uses Rogers’ (1986) theory on the diffusion of innovation organizations and individuals, Roth’s (1980) theory on political participation, and Wilson’s (1980) theory on the pyramid of political participation. Based on diffusion of organizational innovation, it was found that the Banyuanyar Islamic boarding schools accept the existence of the Internet, but they experience lack of computer equipment (hardware), application program (software), as well as lack of experts and skills to use the facilities. As for the communication action, the use of the Internet gains wide acceptance. Most of the students even have basic knowledge to use the Internet before they enter school. The existence of media facilities may lead to the breach of rules by the students with regard to the policies of pesantren. Some efforts are needed to identify ethical violations in communication actions undertaken by the students in the use of the Internet. On the one hand, the identification of the Internet provides freedom space, but on the other, the pesantren does not have virtual security officers to deal with digital violations that may be committed by the students. The early identification of an effort is necessary to anticipate the adoption of innovations and to make boarding school students media-intelligent. In term of the tendency of political participation, the students of pesantren Banyuanyar are participative in political activities. The policy made by the pesantren leaders plays a pivotal role in political participation. The education on political participation among students of pesantren through new media is reflected in the flow of information that is accessible everywhere, particularly electronic media, which has contributed significantly to developing the mindset of the people, especially among the students of pesantren.  


2018 ◽  
Vol 10 (2) ◽  
pp. 74-94 ◽  
Author(s):  
Jonathan McKeague ◽  
Kevin Curran

The Internet is built atop the Internet Protocol (IP) which has at its heart a unique identifier known as an IP address. Knowing the location of an IP address can be very useful in many situations such as for banks to know if a connection is in progress from online fraud hotspots. IP addresses can be spoofed allowing hackers to bypass geographical IP restrictions and thus render some category of fraud prevention useless. Anonymous proxies (AP) which act as intermediate relays which disguise the source IP addresses can play a large role in cybercrime. There is a need to ascertain whether an incoming IP connection is an original source matched IP address, or one being routed through an anonymising proxy. This article concentrates on various methods used by anonymising proxies, the characteristics of the anonymous proxies and the potential mechanisms available to detect if a proxy is in use.


Sign in / Sign up

Export Citation Format

Share Document