protocol analyzer
Recently Published Documents


TOTAL DOCUMENTS

54
(FIVE YEARS 9)

H-INDEX

10
(FIVE YEARS 1)

Author(s):  
Kitae Hwang Et.al

MQTT is a communication protocol for exchanging messages between clients via MQTT broker and is used to build many IoT systems. Currently, various tools have been developed to help measure the performance of application systems using MQTT. However, because they are all versatile tools, a dedicated test system that meets the purpose of the application system needs to be built on their behalf. But building a test system is not that simple. In this paper we discuss a case of building a test system for measuring U-Mosquitto’s performance, which has modified the open source Mosquitto broker to handle urgent messages with priority, and some issues to be considered in the process. In particular, they include selection of the server computer, the structure of the test program, the use of appropriate threads for the client, the appropriate number of clients, the appropriate workload per client, clock synchronization between clients, protocol analyzer issues, and other issues. Our experiences and considerations on these issues are expected to be a good guide for building a test system to measure the performance of MQTT application systems.


Author(s):  
Hemina Vetaresma ◽  
Indra Kanedi ◽  
Eko Prasetiyo

Pemanfaatan VOIP dan IPTV semakin banyak digunakan sebagai aplikasi komunikasi pada internet. Analisis dan monitoring lalu lintas VOIP dan IPTV dalam jaringan dengan menggunakan protokol transport layer sangat dibutuhkan untuk mengetahui unjuk kerja protokol yang handal dan cepat dalam proses pengirimannya. Metode penelitian yang digunakan adalah metode eksperimen karena dilakukan percobaan untuk membandingkan kinerja tiga protokol transport layer. Metode pengumpulan data yang digunakan antara lain studi pustaka dan observasi. Untuk membandingkan kinerja ketiga protokol transport layer digunakan software Soft Perfect Network Protocol Analyzer dengan menguraikan karakteristik protokol TCP, UDP, SCTP. Hasil penelitian menunjukkan bahwa protokol TCP memiliki kinerja terbaik bila dibandingkan dengan protokol UDP dan SCTP pada pengiriman data VOIP, sedangkan protokol SCTP memiliki kinerja terbaik bila dibandingkan dengan protokol TCP dan UDP pada pengiriman data IPTV.Kata Kunci : VOIP, IPTP, Protokol Transport layer.


2020 ◽  
Vol 8 (5) ◽  
pp. 4574-4578

The rise of networks has increased very fastly in this modern world. Our day to- day life mostly depends on the internet. It can be in the form of education, banking, research, business, journalism and many more. This dependency also leads to various types of intrusions. To identify intrusions on the grid, the system must have a detection engine that can detect intrusions automatically without any human intervention. Wireshark is an important tool for the analysis of network packets. But Wireshark lacks the feature of intrusion detection. In this paper, we will show that Wireshark can be considered not only as troubleshooting tool, network analyzer, protocol analyzer, packet sniffer but also a network intrusion detection tool because if the user has appropriate knowledge about attacks and data packets, then he could easily identify an attack by observing a specific data packet patterns. In this paper, an attack pattern dictionary will be created using which captured live data packets will be manually mapped in order to detect intrusions. We will also identify various attacks captured by Wireshark using this process.


2020 ◽  
pp. 19-29
Author(s):  
Liudmila Babenko ◽  
◽  
Ilya Pisarev ◽  

Purpose of the article: development of an algorithm for dynamic analysis of the source codes of cryptographic protocols using the PDA language for the possibility of using your own attack models. Method: a source code generation method was used to simulate the attacker’s side when transmitting messages between legal parties according to the Dolev-Yao model. The method of false termination is also used, which is used in dynamic analysis and allows detecting attacks during simulation. Results: this paper presents the PDA language for dynamic analysis of the source codes of cryptographic protocols. An approach to dynamic analysis based on the principle of false termination is described. The process of modeling an active attack by an intruder is presented. The elements of the PDA language are described and an example of the description of the test protocol in this language is given. A test protocol in the C# programming language has been implemented. The effectiveness of the dynamic analysis was tested by simulating a replay attack. The security verification of the test cryptographic protocol was carried out using the well-known verification tools Scyther and Avispa. The comparison of the main indicators of the known means and the dynamic protocol analyzer proposed by the authors is carried out. The main advantages of the approach proposed by the authors are presented. The further direction of work is described.


TecnoLógicas ◽  
2019 ◽  
Vol 22 (46) ◽  
pp. 185-194
Author(s):  
Andrés F. Bravo-Montoya ◽  
Jefersson S. Rondón-Sanabria ◽  
Elvis E. Gaona-García

This paper shows the vulnerabilities present in a wireless sensor network implemented over a long-range wide area network (LoRaWAN) LoRaWAN, and identifies possible attacks that could be made to the network using sniffing and/or replay. Attacks on the network were performed by implementing a protocol analyzer (Sniffer) to capture packets. The Sniffer was implemented using the RTL2832U hardware and visualized in Wireshark, through GNU-Radio. Tests showed that data availability and confidentiality could be threatened through replay attacks with LoRa server verification using HackRF One and GNU-Radio hardware. Although the LoRaWAN specification has, frame counters to avoid replay attacks, under given the right conditions, this measure could be violated even deny service to the node on the server.


2019 ◽  
Vol 6 (2) ◽  
pp. 48-53
Author(s):  
Arif Harbani

SMK Negeri 1 Cibinong memiliki beberapa gedung yang di dalamnya menyediakan akses internet dengan kapasitas bandwidth 50 Mbps, dengan jumlah perangkat komputer yang terhubung ke internet tidak kurang dari 300 komputer di seluruh area sekolah. Kebutuhan bandwidth adalah 128 Kbps x 300 = 38.400 Kbps atau 37,5 Mbps. Kebutuhan tersebut adalah gambaran untuk layanan akses web atau browsing belum termasuk layanan lainnya. Penelitian ini bertujuan untuk  mengetahui kualitas layanan jaringan internet di SMK Negeri 1 Cibinong berdasarkan parameter QoS (Quality of Service) yaitu throughput, packet loss, jitter dan latency. Kualitas layanan atau Quality of Service merupakan metode pengukuran tentang seberapa baik jaringan dan merupakan usaha mendefinisikan karakteristik dan sifat dari suatu servis. Adapun sumber data pengukuran layanan jaringan ini diperoleh dari hasil monitoring selama waktu tertentu menggunakan perangkat lunak wireshark network protocol analyzer dan dibandingkan dengan standar TIPHON.  Hasil penelitian menunjukkan bahwa nilai pada parameter throughput yang diperoleh yaitu 41bps dengan indeks 2 menunjukkan kategori sedang, nilai packet loss adalah 35% dengan indeks 1 termasuk kategori jelek,  nilai parameter jitter yaitu 153ms  dengan indeks 3 tergolong pada kategori bagus, dan nilai pada latency 69ms dengan indeks 3 menunjukkan pada kategori bagus. Secara keseluruhan nilai QoS pada layanan jaringan internet di SMK Negeri 1 Cibinong yaitu 2,25 dengan indeks kurang memuaskan.


Author(s):  
O. Karaulova ◽  
N. Kireeva ◽  
L. Chupakhina ◽  
A. Gazizulina

The analysis of Weibull and Pareto distribution functions in the approximation of the density of a sum of damping functions, PMRQ approximation and approximation of service distribution in the peak mode of the flow. There was found one of the characteristics of the network, the average waiting time of packets in the queue after application of spectral method of the Lindley’s integral equation. Finally, PMRQ approximation of the average waiting time in TES+/G/1, MMPR, was compared with the analytic values of the same value in the spectral solution of the Lindley’s integral equation obtained by simulation with real traffic. Traffic is captured using the Wireshark protocol analyzer program. The time distributions were obtained in the EasyFit data analysis program, designed for quick statistical data analysis and decision making. Methods of approximation of network traffic allows us to estimate the average packet latency using statistical data analysis, which will improve the quality of service and predict the behavior of traffic.


2019 ◽  
Vol 2 (2) ◽  
pp. 59-69
Author(s):  
Aseh Ginanjar ◽  
Nur Widiyasono ◽  
Rohmat Gunawan

The internet provides around the world facilities to reach customers without market restrictions, including e-commerce. As a result, the number of customers who depend on the Internet for purchases has increased dramatically. Potential cybercrime attacks such as phishing are criminal activities that attempt to obtain illegally sensitive information. The sensitive information can be in the form of a username, password, and credit card details. Then it is necessary to analyze the non-volatile data obtained in real and sourced from a Facebook forum. Data acquisition techniques use forensic live network data processing using Network Protocol Analyzer tools, namely Wireshark. The results of the investigation and analysis are summarized in the form of the table. The success of the investigation can be found in the source of the attack in the form of IP Address, URL phishing, DNS protocol, IMAP, username, password, FTP, SMTP, and HTTP. The analysis provides recommendations on how to avoid web phishing attacks.


2017 ◽  
Vol 9 (2) ◽  
Author(s):  
Yuza Reswan ◽  
Dedy Agung Prabowo

AbstractOne of the use of VOIP and IPTV technology that is increasingly used as a communication application on the internet are video call and video streaming, so when the data required a reliable and fast protocol performance in the process of delivery. The problem of the research is analyzing the performance of layer transport protocol in VOIP and IPTV data traffic. The objective of the research is to know the advantages and disadvantages of VOIP and IPTV data traffic and it is useful to contribute to the development of transport layer protocols in VOIP and IPTV data traffic in the future. This research is conducted independently without related to place and time. This reasearch uses SoftPerfect network Protocol Analyzer software. SoftPerfect network Protocol Analyzer is used to compare the performance of transport layer protocols of TCP, UDP, SCTV based on six parameters using different LAN and Wireless cable, test time, and sharing time. The method used in this research is based on the research approach. The results of this study indicate that SCTV protocol is a protocol that has good performance in VOIP and IPTV data traffic with TCP and UDP protocol.Keywords : Analysis, Performance, TCP, UDP, SCTP, VOIP, IPTV


Sign in / Sign up

Export Citation Format

Share Document