IP Address Protection Method in SDN Using Format Preserving Encryption

Author(s):  
Dohyeon Park ◽  
Mintae Kim ◽  
Jonghoon Lim ◽  
Raeseung Jang ◽  
Sun-Young Lee
Keyword(s):  
2021 ◽  
Vol 2096 (1) ◽  
pp. 012040
Author(s):  
V Kh Fedorov ◽  
E G Balenko ◽  
E V Vershennik ◽  
P V Zakalkin

Abstract Cyberspace, a global artificial space, has emerged and become part of all human activities, which exposes communication network elements, in particular service servers, to attacks, whether from individual hackers and cyberterrorists or from organized communities. Denial-of-service or DDoS attacks are the most common type. These are intended solely to cause a denial of service in various information systems, including service servers. This paper presents a method that can improve protection of servers that provide various resources (services) by reasonable management of filter rules and IP address lists.


The choice of cost-effective method of anticorrosive protection of steel structures is an urgent and time consuming task, considering the significant number of protection ways, differing from each other in the complex of technological, physical, chemical and economic characteristics. To reduce the complexity of solving this problem, the author proposes a computational tool that can be considered as a subsystem of computer-aided design and used at the stage of variant and detailed design of steel structures. As a criterion of the effectiveness of the anti-corrosion protection method, the cost of the protective coating during the service life is accepted. The analysis of existing methods of steel protection against corrosion is performed, the possibility of their use for the protection of the most common steel structures is established, as well as the estimated period of effective operation of the coating. The developed computational tool makes it possible to choose the best method of protection of steel structures against corrosion, taking into account the operating conditions of the protected structure and the possibility of using a protective coating.


Author(s):  
Chun-Hung Lin ◽  
Hsin-Cheng Hsu ◽  
Tsung-Yi Lin ◽  
Ru-Hui Lin ◽  
I-An Chen ◽  
...  

Abstract Protection layers on double ex situ lift-out TEM specimens were investigate in this paper and two protection layer approaches for double INLO or double EXLO were introduced. The improved protection methods greatly decreased the damage layer on the top surface from 90 nm to 5 nm (or lower) during FIB milling. According to the property of different sample and its preliminary treatment in the FIB, we have the satisfactory approaches to be applied. Using this improved protection method, we demonstrate the structures within the TEM lamella can be observed without ion beam damage/implantation during FIB


2016 ◽  
Vol 1 (1) ◽  
pp. 001
Author(s):  
Harry Setya Hadi

String searching is a common process in the processes that made the computer because the text is the main form of data storage. Boyer-Moore is the search string from right to left is considered the most efficient methods in practice, and matching string from the specified direction specifically an algorithm that has the best results theoretically. A system that is connected to a computer network that literally pick a web server that is accessed by multiple users in different parts of both good and bad aim. Any activity performed by the user, will be stored in Web server logs. With a log report contained in the web server can help a web server administrator to search the web request error. Web server log is a record of the activities of a web site that contains the data associated with the IP address, time of access, the page is opened, activities, and access methods. The amount of data contained in the resulting log is a log shed useful information.


2020 ◽  
Vol 14 (12) ◽  
pp. 2263-2270 ◽  
Author(s):  
Chenhao Zhang ◽  
Guobing Song ◽  
Liming Yang ◽  
Xinzhou Dong

Sign in / Sign up

Export Citation Format

Share Document