Table 1 - uploaded by isredza rahmi A Hamid
Content may be subject to copyright.
Comparison on network monitoring system 

Comparison on network monitoring system 

Source publication
Article
Full-text available
The Network Monitoring System to Detect Unauthorized Connection is a network analytic tool that use to review local area network usage. The main purpose of the application is monitoring the internet protocol traffic between local area network and Internet. In addition, this system aimed to detect unauthorized Internet Protocol addresses that are in...

Context in source publication

Context 1
... three existing systems are Fanatech Advanced IP Scanner, Microsoft Network Monitor and Total Network Monitor system. Table 1 shows the comparison between current network monitoring systems with the proposed system. The proposed system is Network Monitoring System to Detect Unauthorized Connection. ...

Similar publications

Article
Full-text available
LTSP allows computers of a LAN to boot through the network from a single server. The benefits of using it are reduced hardware costs and reduced time of maintenance (with the later one becoming more important over time, as hardware becomes cheaper). It has other benefits as well in administration and maintenance. In this article we will see some of...
Research
Full-text available
In this research, the object was taken from one of the hotels in Palembang, namely Harvani Hotel Palembang. This hotel is one of the hotels in South Sumatra Province, where this hotel has 4 floors. Harvani Hotel Palembang has a Local Area Network (LAN) which consists of several computers. LAN is very important to be applied to Harvani Hotel Palemba...
Article
Full-text available
The Man-in-the-Middle (MitM) attack is a cyber-attack in which an attacker intercepts traffic, thus harming the confidentiality, integrity, and availability of the network. It remains a popular attack vector due to its simplicity. However, existing solutions are either not portable, suffer from a high false positive rate, or are simply not generic....

Citations

... The work in [7] built a system that mainly focuses on monitoring the internet protocol traffic between local area network and Internet. Their system presented to detect unauthorized IP addresses that are in the network range. ...
Article
Full-text available
Technology takes a part of our daily life, it also became a confidant of our privacy such as the surveillance camera which is available everywhere and its presence has prevented many cases of robberies and crimes. Despite the wide spread of IP camera, a serious drawback is present in it, where there is the probability of being hacked and therefore there will always be the fear of being under threat. In this paper, the IP camera traffic will be monitored to detect if there is any attack that stopped the camera from work, we propose an algorithm that splits the IP camera traffic into a set of streams, then calculates the time difference and its mean for each stream to determine whether the camera is attacked or not. After calculating the standard deviation which affects positively on reducing the false alarm, the results showed high accuracy which reflects higher level in security and more confidence in IP camera performance.
Conference Paper
Full-text available
With the increase of mobile equipment and transmission data, Common Public Radio Interface (CPRI) between Building Base band Unit (BBU) and Remote Radio Unit (RRU) suffers amounts of increasing transmission data. It is essential to compress the data in CPRI if more data should be transferred without congestion under the premise of restriction of fiber consumption. A data compression scheme based on Discrete Sine Transform (DST) and Lloyd-Max quantization is proposed in distributed Base Station (BS) architecture. The time-domain samples are transformed by DST according to the characteristics of Orthogonal Frequency Division Multiplexing (OFDM) baseband signals, and then the coefficients after transformation are quantified by the Lloyd-Max quantizer. The simulation results show that the proposed scheme can work at various Compression Ratios (CRs) while the values of Error Vector Magnitude (EVM) are better than the limits in 3GPP.