Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Cybersecurity (4)
- Penetration Testing (4)
- Networking (2)
- AAA Tacacs+ LDAP (1)
- Cisco (1)
-
- Computer (1)
- Computer Networking (1)
- Computer information systems (1)
- Domain-specific language (1)
- Firewalls (1)
- Gaming (1)
- Information security (1)
- Kali (1)
- LAN (1)
- Linux (1)
- Local Area Network (1)
- Network Exploitations (1)
- Network Security (1)
- Openflow (1)
- Packet switching (1)
- Penetration testing (1)
- Redundancy (1)
- Routing (1)
- Software-defined networking (1)
- Vulnerability Scan (1)
Articles 1 - 8 of 8
Full-Text Articles in OS and Networks
Defense Of A Small Network, Isabella Adkins
Defense Of A Small Network, Isabella Adkins
Williams Honors College, Honors Research Projects
A sample network will be virtually created consisting of three routers, one switch, and three hosts. The network will be secured using various methods such as enabling passwords and encryption. After the network has been properly secured, various attacks will be attempted with the goal of breaking into the network. These attacks include reconnaissance (gathering information), penetrating the network using the tool Metasploit, and attempting to get a credential phishing email to end users. If successful in the attacks, the network will be revisited and analyzed for any weaknesses or oversights.
Small Business Office Network, Michael Gerome
Small Business Office Network, Michael Gerome
Williams Honors College, Honors Research Projects
This project will emulate a small office network environment. The project will demonstrate the process of building and configuring the network to meet the requirements laid out in the project plan. This network includes four subnets with Windows 10 end devices and a Kali Linux device, it also includes five Cisco layer 2 switches and three Cisco routers. There are also three subnets connecting the routers to each other to enable routing between the subnets. After the network environment is set up, various penetration tests are performed from the Kali Linux device to gather information. The Nmap reconnaissance tool is …
A Different Way To Penetrate Nba Defenses, Trey Trucksis
A Different Way To Penetrate Nba Defenses, Trey Trucksis
Williams Honors College, Honors Research Projects
This project proposal will document the design, configuration, and penetration testing of a network consisting of three routers (labeled as Lakers, Celtics, Cavaliers), one switch (labeled as NBA), and three end devices (labeled as Kali, Windows 10, and Ubuntu) each connected to one of three routers present on the network. Each router will be attached to a different subnet on the network. The network will be secured using encrypted passwords on the router interfaces, OSPF MD5 authentication between the routers, port security on the switch, as well as Access Control Lists to to control the privileges of each subnetwork accordingly. …
Secure Network Access Via Ldap, Nicholas Valaitis
Secure Network Access Via Ldap, Nicholas Valaitis
Williams Honors College, Honors Research Projects
Networks need the ability to be access by secure accounts and users. The goal of this project is to configure and expand on LDAP configurations with considerations for AAA via TACACS+ and Radius for network equipment. This will provide adequate security for any given network in terms of access and prevent lose of access to devices which happens all to often with locally configured accounts on devices.
Preforming A Vulnerability Assessment On A Secured Network, Mathias Sovine
Preforming A Vulnerability Assessment On A Secured Network, Mathias Sovine
Williams Honors College, Honors Research Projects
A computer network will be built using 3 routers, 1 switch, and 4 computers. The network will be used to simulate the connections between an at home office and the internet. The network will be divided into 3 sub-networks. The routers will be secured using methods like access control lists, changing default admin passwords, and network encryption. The switch will be secured using methods like switchport security and setting access passwords. Once the network is secured, three penetration testing techniques and three exploits will be performed on the network. The results of the exploits and penetration testing techniques will be …
Gaming Lan Setup With Local And Remote Access And Downloads, Ethelyn Tran
Gaming Lan Setup With Local And Remote Access And Downloads, Ethelyn Tran
Williams Honors College, Honors Research Projects
The Gaming LAN Setup project aims to design and implement a basic functioning, hardened network that could be utilized locally and remotely to allow users access to respective servers for the option to host a session or join. Users will have the ability to securely log into the internal network to download files via a web interface. The network allows the designated user to take a management position in order to perform basic penetration testing and discover vulnerabilities through various scans to maintain the network
Pip: An Abstract Dataplane And Virtual Machine, Samuel Goodrick
Pip: An Abstract Dataplane And Virtual Machine, Samuel Goodrick
Williams Honors College, Honors Research Projects
We present an abstract machine and S-expression-based programming language to describe OpenFlow-style software-defined networking. The implemented Pip virtual machine and language provide facilities for packet decoding, safely writing and setting bitfields within packets, and switching based on packet contents. We have outlined an abstract syntax and structural operational semantics for Pip, thus allowing Pip programs to have predictable and provable properties. Pip allows for easy and safe access and writing to packet fields, as well as a programmable packet pipeline that will rarely stall.
Enhanced Child’S Play Lan Design, Nicholas B. Bordo
Enhanced Child’S Play Lan Design, Nicholas B. Bordo
Williams Honors College, Honors Research Projects
Child’s Play is a charity event hosted by the student chapter of the Association for Computing Machinery at the University of Akron. This event allows people to compete in various video game tournaments while simultaneously raising money for charity. In order to make this possible, a network is crucial. However, in previous years, the performance has been poor. The goal of this project is to implement a new network design which will offer more functionality and reliability than in previous years. This network will be able to operate completely inside of an existing network on a temporary basis. This design …