[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (4)

Search Parameters:
Keywords = educational routers

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
18 pages, 2255 KiB  
Article
A Lightweight Anomaly Detection System for Black Hole Attack
by Ashraf Abdelhamid, Mahmoud Said Elsayed, Anca D. Jurcut and Marianne A. Azer
Electronics 2023, 12(6), 1294; https://doi.org/10.3390/electronics12061294 - 8 Mar 2023
Cited by 22 | Viewed by 3458
Abstract
Mobile ad hoc networks (MANETs) are now key in today’s new world. They are critically needed in many situations when it is crucial to form a network on the fly while not having the luxury of time or resources to configure devices, build [...] Read more.
Mobile ad hoc networks (MANETs) are now key in today’s new world. They are critically needed in many situations when it is crucial to form a network on the fly while not having the luxury of time or resources to configure devices, build infrastructure, or even have human interventions. Ad hoc networks have many applications. For instance, they can be used in battlefields, education, rescue missions, and many other applications. Such networks are characterized by high mobility, low resources of power, storage, and processing. They are infrastructure-less; this means that they don’t use infrastructure equipment for communication. These networks rely instead on each other for routing and communication. MANETs use a hopping mechanism where each node in a network finds another node within its communication range and use it as a hop for delivering the message through another node and so on. In standard networks, there is dedicated equipment for specific functions such as routers, servers, firewalls, etc., while in ad hoc networks, every node performs multiple functions. For example, the routing function is performed by nodes. Hence, they are more vulnerable to attacks than standard networks. The main goal of this paper is to propose a solution for detecting black hole attacks using anomaly detection based on a support vector machine (SVM). This detection system aims at analyzing the traffic of the network and identifying anomalies by checking node behaviors. In the case of black hole attacks, the attacking nodes have some behavioral characteristics that are different from normal nodes. These characteristics can be effectively detected using our lightweight detection system. To experiment with the effectiveness of this solution, an OMNET++ simulator is used to generate traffic under a black hole attack. The traffic is then classified into malicious and non-malicious based on which the malicious node is identified. The results of the proposed solution showed very high accuracy in detecting black hole attacks. Full article
Show Figures

Figure 1

Figure 1
<p>Classification of MANET routing protocols.</p>
Full article ">Figure 2
<p>Malicious node (M) drops packets in a black hole attack.</p>
Full article ">Figure 3
<p>Classification of the mitigation techniques proposed by other researchers.</p>
Full article ">Figure 4
<p>Methodology used in the paper to mitigate a black hole attack.</p>
Full article ">Figure 5
<p>A snapshot from OMNET++ while a node sends packets (RReq) to adjacent nodes.</p>
Full article ">Figure 6
<p>Feature selection based on malicious node behaviors.</p>
Full article ">Figure 7
<p>Intrusion detection system methodology.</p>
Full article ">Figure 8
<p>Support vector machine (SVM).</p>
Full article ">Figure 9
<p>Results of the simulator in the absence of a black hole attack.</p>
Full article ">Figure 10
<p>Results of the simulator in the presence of a black hole attack.</p>
Full article ">Figure 11
<p>Intrusion detection system methodology.</p>
Full article ">
18 pages, 3086 KiB  
Article
Forest Education with the Use of Educational Infrastructure in the Opinion of the Public-Experience from Poland
by Natalia Korcz and Emilia Janeczko
Sustainability 2022, 14(3), 1915; https://doi.org/10.3390/su14031915 - 8 Feb 2022
Cited by 5 | Viewed by 2990
Abstract
In Poland, informal forest education is carried out mostly on forest educational paths, equipped with educational boards. Due to the diverse audience, an attempt was made to assess the elements supporting forest education from the perspective of forest users. The aim of the [...] Read more.
In Poland, informal forest education is carried out mostly on forest educational paths, equipped with educational boards. Due to the diverse audience, an attempt was made to assess the elements supporting forest education from the perspective of forest users. The aim of the study is to determine the basic criteria that, in the opinion of path users, determine the use, attractiveness, and importance of educational boards in education. In an anonymous questionnaire, 504 people participated during meetings with an educator on paths in forests of the Regional Directorate of the State Forests in Lublin. In the opinion of trail users, boards are not an important element that should be present on educational trails; in their opinion, they moderately support informal forest education activities. Users generally paid attention to between one to two or three to four boards. The attractiveness of the boards is determined by the graphics of the whole board. Respondents would also prefer boards on which information is presented in graphical rather than text form. Our study indicates a somewhat negative perception of educational boards in forest education, which has prompted the authors to conduct further research in order to clarify forest users’ perceptions of the issues analyzed. Full article
(This article belongs to the Special Issue The Role of Forest Education)
Show Figures

Figure 1

Figure 1
<p>Location of the analyzed routes in the field.</p>
Full article ">Figure 2
<p>Frequency of forest visits by different age groups of respondents (correspondence analysis).</p>
Full article ">Figure 3
<p>Frequency of forest visitation by respondents versus place of residence (correspondence analysis).</p>
Full article ">Figure 4
<p>Number of boards highlighted by respondents vs. the age group they belonged to (correspondence analysis).</p>
Full article ">Figure 5
<p>Number of boards highlighted by respondents vs. their education (correspondence analysis).</p>
Full article ">Figure 6
<p>Degree of support of informal forest education activities by educational boards according to different age groups of respondents (correspondence analysis).</p>
Full article ">Figure 7
<p>Factors determining the attractiveness of an educational board vs. frequency of visiting forests by respondents (correspondence analysis).</p>
Full article ">
16 pages, 2507 KiB  
Article
SD-BROV: An Enhanced BGP Hijacking Protection with Route Validation in Software-Defined eXchange
by Pang-Wei Tsai, Aris Cahyadi Risdianto, Meng Hui Choi, Satis Kumar Permal and Teck Chaw Ling
Future Internet 2021, 13(7), 171; https://doi.org/10.3390/fi13070171 - 30 Jun 2021
Cited by 4 | Viewed by 4108
Abstract
In global networks, Border Gateway Protocol (BGP) is widely used in exchanging routing information. While the original design of BGP did not focus on security protection against deliberate or accidental errors regarding to routing disruption, one of fundamental vulnerabilities in BGP is a [...] Read more.
In global networks, Border Gateway Protocol (BGP) is widely used in exchanging routing information. While the original design of BGP did not focus on security protection against deliberate or accidental errors regarding to routing disruption, one of fundamental vulnerabilities in BGP is a lack of insurance in validating authority for announcing network layer reachability. Therefore, a distributed repository system known as Resource Public Key Infrastructure (RPKI) has been utilized to mitigate this issue. However, such a validation requires further deployment steps for Autonomous System (AS), and it might cause performance and compatibility problems in legacy network infrastructure. Nevertheless, with recent advancements in network innovation, some traditional networks are planning to be restructured with Software-Defined Networking (SDN) technology for gaining more benefits. By using SDN, Internet eXchange Point (IXP) is able to enhance its capability of management by applying softwarized control methods, acting as a Software-Defined eXchange (SDX) center to handle numerous advertisement adaptively. To use the SDN method to strengthen routing security of IXP, this paper proposed an alternative SDX development, SD-BROV, an SDX-based BGP Route Origin Validation mechanism that establishes a flexible route exchange scenario with RPKI validation. The validating application built in the SDN controller is capable of investigating received routing information. It aims to support hybrid SDN environments and help non-SDN BGP neighbors to get trusted routes and drop suspicious ones in transition. To verify proposed idea with emulated environment, the proof-of-concept development is deployed on an SDN testbed running over Research and Education Networks (RENs). During BGP hijacking experiment, the results show that developed SD-BROV is able to detect and stop legitimate traffic to be redirected by attacker, making approach to secure traffic forwarding on BGP routers. Full article
(This article belongs to the Special Issue Software Defined Networking and Cyber Security)
Show Figures

Figure 1

Figure 1
<p>An example of ROA record.</p>
Full article ">Figure 2
<p>An example of IXP Architecture [<a href="#B17-futureinternet-13-00171" class="html-bibr">17</a>].</p>
Full article ">Figure 3
<p>The operation scenario of SDX Virtual Fabric.</p>
Full article ">Figure 4
<p>The designed logic of BGP route validation in SDX.</p>
Full article ">Figure 5
<p>Physical network connection of the testbed.</p>
Full article ">Figure 6
<p>Example of BGP Route Origin Validation.</p>
Full article ">Figure 7
<p>Hijacking in SDX with direct connection.</p>
Full article ">Figure 8
<p>Received routes for SDX application validating.</p>
Full article ">Figure 9
<p>Created ONOS intents by SDX application.</p>
Full article ">Figure 10
<p>Detected invalid advertisement.</p>
Full article ">Figure 11
<p>BGP routing table on BGP speaker.</p>
Full article ">Figure 12
<p>BGP routing table on Client Network router.</p>
Full article ">Figure 13
<p>Ping test result in first scene.</p>
Full article ">Figure 14
<p>Hijacking in SDX with indirect connection.</p>
Full article ">Figure 15
<p>BGP routing table on Global Crossing router.</p>
Full article ">Figure 16
<p>Ping test resul in second scene.</p>
Full article ">
1358 KiB  
Article
Minimum Interference Channel Assignment Algorithm for Multicast in a Wireless Mesh Network
by Sangil Choi and Jong Hyuk Park
Sensors 2016, 16(12), 2056; https://doi.org/10.3390/s16122056 - 2 Dec 2016
Cited by 5 | Viewed by 5198
Abstract
Wireless mesh networks (WMNs) have been considered as one of the key technologies for the configuration of wireless machines since they emerged. In a WMN, wireless routers provide multi-hop wireless connectivity between hosts in the network and also allow them to access the [...] Read more.
Wireless mesh networks (WMNs) have been considered as one of the key technologies for the configuration of wireless machines since they emerged. In a WMN, wireless routers provide multi-hop wireless connectivity between hosts in the network and also allow them to access the Internet via gateway devices. Wireless routers are typically equipped with multiple radios operating on different channels to increase network throughput. Multicast is a form of communication that delivers data from a source to a set of destinations simultaneously. It is used in a number of applications, such as distributed games, distance education, and video conferencing. In this study, we address a channel assignment problem for multicast in multi-radio multi-channel WMNs. In a multi-radio multi-channel WMN, two nearby nodes will interfere with each other and cause a throughput decrease when they transmit on the same channel. Thus, an important goal for multicast channel assignment is to reduce the interference among networked devices. We have developed a minimum interference channel assignment (MICA) algorithm for multicast that accurately models the interference relationship between pairs of multicast tree nodes using the concept of the interference factor and assigns channels to tree nodes to minimize interference within the multicast tree. Simulation results show that MICA achieves higher throughput and lower end-to-end packet delay compared with an existing channel assignment algorithm named multi-channel multicast (MCM). In addition, MICA achieves much lower throughput variation among the destination nodes than MCM. Full article
(This article belongs to the Special Issue Advances on Resources Management for Multi-Platform Infrastructures)
Show Figures

Figure 1

Figure 1
<p>An example of channel assignment by MCM.</p>
Full article ">Figure 2
<p>Multicast tree and children of S and A.</p>
Full article ">Figure 3
<p>Channel assignment example by MICA.</p>
Full article ">Figure 4
<p>Average packets received by multi-receivers.</p>
Full article ">Figure 5
<p>Standard deviation of all packets received by multi-receivers.</p>
Full article ">Figure 6
<p>Impact of a different number of multi-receivers.</p>
Full article ">Figure 7
<p>Comparison of end-to-end packet delay.</p>
Full article ">
Back to TopTop