Table 1 - uploaded by isredza rahmi A Hamid
Content may be subject to copyright.
Comparison on network monitoring system
Source publication
The Network Monitoring System to Detect Unauthorized Connection is a network analytic tool that use to review
local area network usage. The main purpose of the application is monitoring the internet protocol traffic between
local area network and Internet. In addition, this system aimed to detect unauthorized Internet Protocol addresses
that are in...
Context in source publication
Context 1
... three existing systems are Fanatech Advanced IP Scanner, Microsoft Network Monitor and Total Network Monitor system. Table 1 shows the comparison between current network monitoring systems with the proposed system. The proposed system is Network Monitoring System to Detect Unauthorized Connection. ...
Similar publications
LTSP allows computers of a LAN to boot through the network from a single server. The benefits of using it are reduced hardware costs and reduced time of maintenance (with the later one becoming more important over time, as hardware becomes cheaper). It has other benefits as well in administration and maintenance. In this article we will see some of...
In this research, the object was taken from one of the hotels in Palembang, namely Harvani Hotel Palembang. This hotel is one of the hotels in South Sumatra Province, where this hotel has 4 floors. Harvani Hotel Palembang has a Local Area Network (LAN) which consists of several computers. LAN is very important to be applied to Harvani Hotel Palemba...
The Man-in-the-Middle (MitM) attack is a cyber-attack in which an attacker intercepts traffic, thus harming the confidentiality, integrity, and availability of the network. It remains a popular attack vector due to its simplicity. However, existing solutions are either not portable, suffer from a high false positive rate, or are simply not generic....
Citations
... The work in [7] built a system that mainly focuses on monitoring the internet protocol traffic between local area network and Internet. Their system presented to detect unauthorized IP addresses that are in the network range. ...
Technology takes a part of our daily life, it also became a confidant of our privacy such as the surveillance camera which is available everywhere and its presence has prevented many cases of robberies and crimes. Despite the wide spread of IP camera, a serious drawback is present in it, where there is the probability of being hacked and therefore there will always be the fear of being under threat. In this paper, the IP camera traffic will be monitored to detect if there is any attack that stopped the camera from work, we propose an algorithm that splits the IP camera traffic into a set of streams, then calculates the time difference and its mean for each stream to determine whether the camera is attacked or not. After calculating the standard deviation which affects positively on reducing the false alarm, the results showed high accuracy which reflects higher level in security and more confidence in IP camera performance.
With the increase of mobile equipment and transmission data, Common Public Radio Interface (CPRI) between Building Base band Unit (BBU) and Remote Radio Unit (RRU) suffers amounts of increasing transmission data. It is essential to compress the data in CPRI if more data should be transferred without congestion under the premise of restriction of fiber consumption. A data compression scheme based on Discrete Sine Transform (DST) and Lloyd-Max quantization is proposed in distributed Base Station (BS) architecture. The time-domain samples are transformed by DST according to the characteristics of Orthogonal Frequency Division Multiplexing (OFDM) baseband signals, and then the coefficients after transformation are quantified by the Lloyd-Max quantizer. The simulation results show that the proposed scheme can work at various Compression Ratios (CRs) while the values of Error Vector Magnitude (EVM) are better than the limits in 3GPP.