internal network
Recently Published Documents


TOTAL DOCUMENTS

184
(FIVE YEARS 54)

H-INDEX

11
(FIVE YEARS 2)

2021 ◽  
Vol 9 (1) ◽  
pp. 80-91
Author(s):  
Adi Widiatmoko Wastumirad ◽  
Moh Irzam Darmawan

Today, the internet has become the most used tool for delivering information. Through the internet, people can search for information by freely accessing a web page. This freedom of access often raises security issues in the website provider's internal network. These security issues can be in the form of misuse of information, threats, and other attacks on the provider's internal network. Based on these conditions, a technique is needed to protect important data on the website owner's server from various attacks. In this research, a Honeypot security system has been implemented using Dionaea and Kippo in the Demilitarized Zone to increase the security of a network. The methodology of this research is Waterfall Model for software engineering. The system that has been built is able to detect, take action, record attack logs and display them in the form of a website in real time.


2021 ◽  
Vol 3 (2) ◽  
Author(s):  
Hussein Safwat Hasan ◽  
Humor Hwang

In the realm of technological market penetration of solar photovoltaiclouvers (PVL) addressing environmental difficulties and the industrialrevolution, a new avenue of renewable energy is introduced. Moreover,solar energy exploitation through building façades was addressedthrough motorized solar photovoltaic louvers (MPVL). On the otherhand, proponents exalted the benefits of MPVL overlooking the typicalanalyses. In this communication, we attempted to perform a thoroughindustrial system evaluation of the MPVL. This communication presentsa methodology to validate the industrial claims about MPVL devices andtheir economic efficiency and the insight on how geographical locationinfluences their utilization and augment their potential benefits. This taskis carried out by evaluating the extent of solar energy that can be harvestedusing solar photovoltaic system (PVSYST) software and investigatingwhether existing product claims are associated with MPVL are feasible indifferent locations. The performance and operational losses (temperature,internal network, power electronics) were evaluated. To design and assessthe performance of different configurations based on the geographicalanalogy, simulation tools were successfully carried out based on differenttopographical locations. Based on these findings, various factors affect theemployment of MPVL such as geographical and weather conditions, solarirradiation, and installation efficiency. tt is assumed that we successfullyshed light and provided insights into the complexity associated withMPVL.


2021 ◽  
Vol 2066 (1) ◽  
pp. 012014
Author(s):  
Xiaobin Hong

Abstract With the development of the times, computer technology is booming, so the network is becoming more and more complex, software design is becoming more and more complex, because of the protection against a variety of internal or external risks. The internal risk is that the traffic carried by the system is too large to cause the system to crash or the system to crash caused by the code operation error, and the external threat is that hackers use computer technology to break into the system according to security vulnerabilities, so the purpose of this paper is based on big data technology, the software complexity of complex networks is measured and studied. With the consent of the school, we used the school’s internal network data, and after consulting the literature on the complex construction and analysis of complex networks and software, modeled and analyzed it using the improved particle group algorithm. The experimental results show that there is a certain correlation between complex network and software complexity. Because complex networks determine that software requires complex construction to withstand potential risks to keep the software running properly.


2021 ◽  
Vol 7 (9) ◽  
pp. 479-485
Author(s):  
J. Arzieva ◽  
N. Nukusbaev

This article defines a VPN as a virtual private network. This technology is based on the formation of an internal network within another network to exchange all information between users in order to provide reliable protection.


Author(s):  
Iryna Kozlyuk ◽  
Yuliia Kovalenko

The problem of designing advanced computing systems in the class of structures of integrated modular avionics is considered. The unified topology of the internal network of the computer on the basis of Space Wire exchange channels and variants of its execution for various onboard applications is offered. Equivalent reliability schemes of each of the specific structures are introduced and the probabilities of trouble-free operation of each structure are analyzed. Families of graphic dependencies are given. The analysis of the existing principles and algorithms for testing multiprocessor multimodal onboard digital computer systems is given; the new testing algorithm for the multiprocessor systems which follows the software design standards for products of integrated modular avionics is offered. The structure of the unified automated workplace for checking the functional modules of integrated modular avionics is considered. Specific requirements inherent in the workplaces for testing integrated avionics are identified: an increased level of control of the hardware component of products; the ability to simulate the failure state of individual components of avionics to check the mode of reconfiguration of the computer system; modular construction of software with the division of verification tests into components performed at the level of each CPM and the computer as a whole in single-task and multitasking modes; openness of architecture of a workplace, which provides an ability to change the level of control complexity of a product and control of one class of complexity; intra-project unification of both hardware and software of the workstation of the inspection.


2021 ◽  
Author(s):  
Masakazu Agetsuma ◽  
Issei Sato ◽  
Yasuhiro R Tanaka ◽  
Luis Carrillo-Reid ◽  
Atsushi Kasai ◽  
...  

The prefrontal cortex regulates various emotional behaviors and memories, and prefrontal dysfunction can trigger psychiatric disorders. While untangling the internal network may provide clues to the neural architecture underlying such disorders, it is technically difficult due to the complexity and heterogeneity of the network. Here we propose an optical and computational dissection of the internal prefrontal network based on chronic two-photon imaging and a sparse modeling algorithm, which enabled the discrimination of newly emerged neuronal ensembles specifically encoding conditioned fear responses. Further graphical modeling revealed that neurons responding to the unconditioned stimulus during fear conditioning became a core of the ensembles with an enhanced capability for pattern completion, demonstrating the activity dependent rewiring upon the associative learning.


2021 ◽  
Vol 11 (16) ◽  
pp. 7763
Author(s):  
Jiazhen Zhao ◽  
Yuliang Lu ◽  
Xin Wang ◽  
Kailong Zhu ◽  
Lu Yu

Webshells are a malicious scripts that can remotely control a webserver to execute arbitrary commands, steal sensitive files, and further invade the internal network. Existing webshell detection methods, such as using pattern matching for webshell detection, can be easily bypassed by attackers using the file include and user-defined functions. Furthermore, detecting unknown webshells has always been a problem in the field of webshell detection. In this paper, we propose a static webshell detection method based on taint analysis, which realizes accurate taint analysis based on ZendVM. We first converted the PHP code into Opline sequences, analyzed the Opline sequences in order, and marked the externally imported taint source. Then, the propagation of the taint variables was tracked, and the interprocedural analysis of the taint variables was performed. Finally, considering the dangerous functions’ call and the referencing of the taint variables at the point of the taint sink, we completed the webshell judgment. Based on this method, we constructed a taint analysis prototype system named WTA and evaluated it with a benchmark dataset by comparing its performance with popular webshell detection tools. The results showed that our method supports interprocedural analysis and has the ability to detect unknown webshells and that WTA’s performance surpasses well-known webshell detection tools such as D-shield, SHELLPUB, WebshellKiller, CloudWalker, ClamAV, LoKi, and findbot.pl.


Symmetry ◽  
2021 ◽  
Vol 13 (8) ◽  
pp. 1550 ◽  
Author(s):  
Won-Chi Jung ◽  
Jinsu Kim ◽  
Namje Park

Attackers’ intrusion into the Enterprise LAN is increasing every year, and the method is becoming more intelligent and crafty. Various security measures against external network intrusions, such as firewalls, are being studied and applied to protect against external attacks, but it is difficult to respond to increasing attacks. Most institutions block access from the external network for the safety of the internal network and allow access from the internal network to the external network through some restricted ports. In particular, restricted ports in subject to a variety of security techniques to block intrusion into the internal network, but in the process, access to the internal network is only applied by restricted ports, making it inefficient to handle internal requests. Although various studies have been conducted on network isolation to address these challenges, it is difficult to perform tasks efficiently as security functions, such as detecting whether request data is attacked or not, during actual application. The proposed technique is a network-blocking-based network separation technique that converts data from the external network connected to the Internet into symmetry data from which malicious code is removed through an agent and delivers it to the client of the internal network. We propose a technique to provide access.


2021 ◽  
pp. 54-59
Author(s):  
A.N. Legkonogikh ◽  
◽  
S.L. Popova ◽  
N.I. Legkonogikh ◽  
◽  
...  

Presented is developing of an algorithm for using information and computer technologies in the research work of the psychological service of universities in order to quickly respond and resolve the occurrence of conflict, psychological and other unstable situations between interacting internal and external audiences of the university. The relevance of the issue is emphasized by the author's research and the low efficiency of the psychological service with students and teachers of the university, which was revealed on the basis of numerous surveys of all test groups during 2020–2021. The study was conducted using a Google questionnaire, a representative sample — general contacts in social networks and messengers, as well as direct mail. The Google-form automatically summarized and structured the survey results after receiving the responses. The results are used to identify the key vector of constructing the algorithm of the psychological service of the Don State Technical University with the intensification of the use and deep penetration of information and computer technologies in this process. It is confirmed that the surveys of students and teachers of the university with the help of internal network resources or printed questionnaires, currently conducted by universities — are not the whole algorithm of those technologies that are available and acceptable for providing timely and professional psychological support to all representatives of the university conglomerate. The results of the study were discussed collectively at the Don State University and other universities in Rostov-on-Don online, on the platform “Boiling Point” in May 2021.


Sign in / Sign up

Export Citation Format

Share Document