Study and Design on Vulnerability Discovering of Network Protocols

2014 ◽  
Vol 556-562 ◽  
pp. 5526-5530
Author(s):  
Hai Yan Liu ◽  
Yue Zhao ◽  
Rui Huang

Discovering the vulnerabilities in network protocols is the key for network attacks and defenses. Basing on the analysis of some currently used vulnerability discovering methods, a method combining reverse engineering and fuzzy testing is put forward for vulnerability discovering of network protocols, where reverse engineering method is first used to analyze the details of the communication protocol, then fuzzy testing is used to test the target software. This combination can promote the efficiency of the fuzzy testing. By using this method to test a real network application, several vulnerabilities are discovered, which verifies the validity of this method.

2021 ◽  
Vol 1098 (6) ◽  
pp. 062108
Author(s):  
A P Budijono ◽  
S S Syah ◽  
W D Kurniawan ◽  
B N Habib

2013 ◽  
Vol 655-657 ◽  
pp. 1237-1241
Author(s):  
Chuan Qi Wang ◽  
Jian Zhang ◽  
Wei Rong Wang ◽  
Xue Jing Gu

Currently, the ancient calligraphy and painting are widely used in decoration screen; however, the processing technic is normally based on manual manipulation. Normally, this kind of processing is not efficient, and with highly cost. In addition, it could not maintain the original artistic style in maximum. the paper proposes to process the sculpture of ancient calligraphy according to its photo, by adopting the CNC technology based on reverse engineering method, which enables to mostly keep the original artistic style, and to create the CNC code automatically with the assistant of image processing to achieve intelligent machining.


2016 ◽  
Vol 7 (4) ◽  
pp. 37 ◽  
Author(s):  
Jose Miguel Jimenez ◽  
Oscar Romero ◽  
Albert Rego ◽  
Avinash Dilendra ◽  
Jaime Lloret

Software Defined Networks (SDN) have become a new way to make dynamic topologies. They have great potential in both the creation and development of new network protocols and the inclusion of distributed artificial intelligence in the network. There are few emulators, like Mininet, that allow emulating a SDN in a single personal computer, but there is lack of works showing its performance and how it performs compared with real cases. This paper shows a performance comparison between Mininet and a real network when multimedia streams are being delivered. We are going to compare them in terms of consumed bandwidth (throughput), delay and jitter. Our study shows that there are some important differences when these parameters are compared. We hope that this research will be the basis to show the difference with real deployments when Mininet is used.


2014 ◽  
Vol 487 ◽  
pp. 674-677
Author(s):  
Xie Li

This paper introduces the time triggered bus technology in vehicle communication network application, the bus protocol project: exclusive time window, the window of time and idle time window is discussed. In the laboratory conditions, the different communication protocols and communication parameters can be easily realized, which can be used to analyze the CAN and TTCAN communication protocol and network load frame priority to the impact of delay time, and verify the correctness of the model.


2012 ◽  
Author(s):  
Zouheir Trabelsi ◽  
Kadhim Hayawi ◽  
Arwa Al Braiki ◽  
Sujith Samuel Mathew

2011 ◽  
Author(s):  
G. S. Djordjevic ◽  
C. A. Sporea ◽  
D. N. Vulcanov ◽  
Madalin Bunoiu ◽  
Iosif Malaescu

Sign in / Sign up

Export Citation Format

Share Document