Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Physical Sciences and Mathematics
Preforming A Vulnerability Assessment On A Secured Network, Mathias Sovine
Preforming A Vulnerability Assessment On A Secured Network, Mathias Sovine
Williams Honors College, Honors Research Projects
A computer network will be built using 3 routers, 1 switch, and 4 computers. The network will be used to simulate the connections between an at home office and the internet. The network will be divided into 3 sub-networks. The routers will be secured using methods like access control lists, changing default admin passwords, and network encryption. The switch will be secured using methods like switchport security and setting access passwords. Once the network is secured, three penetration testing techniques and three exploits will be performed on the network. The results of the exploits and penetration testing techniques will be …
Understanding Firewalld In Multi-Zone Configurations, Nathan R. Vance, William F. Polik
Understanding Firewalld In Multi-Zone Configurations, Nathan R. Vance, William F. Polik
Faculty Publications
Stories of compromised servers and data theft fill today's news. It isn't difficult for someone who has read an informative blog post to access a system via a misconfigured service, take advantage of a recently exposed vulnerability, or gain control using a stolen password. Any of the many internet services found on a typical Linux server could harbor a vulnerability that grants unauthorized access to the system.
Since it's an impossible task to harden a system at the application level against every possible threat, firewalls provide security by limiting access to a system. Firewalls filter incoming packets based on their …
Packet Filter Performance Monitor (Anti-Ddos Algorithm For Hybrid Topologies), Ibrahim M. Waziri
Packet Filter Performance Monitor (Anti-Ddos Algorithm For Hybrid Topologies), Ibrahim M. Waziri
Open Access Dissertations
DDoS attacks are increasingly becoming a major problem. According to Arbor Networks, the largest DDoS attack reported by a respondent in 2015 was 500 Gbps. Hacker News stated that the largest DDoS attack as of March 2016 was over 600 Gbps, and the attack targeted the entire BBC website.
With this increasing frequency and threat, and the average DDoS attack duration at about 16 hours, we know for certain that DDoS attacks will not be going away anytime soon. Commercial companies are not effectively providing mitigation techniques against these attacks, considering that major corporations face the same challenges. Current security …
Studying The Performance Of A Firewall In Network Courses, José M. Garrido
Studying The Performance Of A Firewall In Network Courses, José M. Garrido
Faculty and Research Publications
This paper presents a simple simulation model of a firewall to derive several performance metrics and briefly argues on the importance and value of modeling and simulation in courses that study various aspects of perimeter defense in network security.
The simulation model mentioned previously is part of an effort by faculty of our department to develop a multi-disciplinary repository of computational models that includes object-oriented discrete-event simulation models. One of the goals of this repository is to build resources that help educate students of computer science, software engineering, and information technology, in modeling and information security.
This and other network …
With Speed The Hacker Cometh, Craig Valli
With Speed The Hacker Cometh, Craig Valli
Research outputs pre 2011
This paper is an examination of six months of IDS reports and firewall logs for a small enterprise that has a new broadband ADSL connection. The paper examines the information contained in the logfiles and the implications of detected activities by would be attackers. An examination of the issues that the deployment of broadband has for home and small business users is also undertaken.