Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 31 dokumen yang sesuai dengan query
cover
"This book constitutes the refereed proceedings of three workshops colocated with NETWORKING 2012, held in Prague, Czech Republic, in May 2012: the Workshop on Economics and Technologies for Inter-Carrier Services (ETICS 2012), the Workshop on Future Heterogeneous Network (HetsNets 2012), and the Workshop on Computing in Networks (CompNets 2012). The 21 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers cover a wide range of topics addressing the main research efforts in the fields of network management, quality of services, heterogeneous networks, and analysis or modeling of networks."
Heidelberg: Springer, 2012
e20410466
eBooks  Universitas Indonesia Library
cover
cover
Fakultas Teknik Universitas Indonesia, 1993
S38666
UI - Skripsi Membership  Universitas Indonesia Library
cover
Ying-Dar, Lin
New York: McGraw-Hill, 2012
004.6 LIN c
Buku Teks SO  Universitas Indonesia Library
cover
Monk, Ellen F.
Singapore : Corse Technology Cengage Learning, 2013
338.7 MON c (1)
Buku Teks  Universitas Indonesia Library
cover
Marquezan, Clarissa Cassales
"The authors explore the issues behind the joint use of self-* properties and P2P, and present: a survey relating autonomic computing and self-* properties, P2P, and network and service management, the design of solutions that explore parallel and cooperative behavior of management peers, the change in angle of network management solution development from APIs, protocols, architectures, and frameworks to the design of management algorithms."
London: Springer, 2012
e20408172
eBooks  Universitas Indonesia Library
cover
Qin, Jun
"Qin and Fahringer present a novel workflow language called Abstract Workflow Description Language (AWDL) and the corresponding standards-based, knowledge-enabled tool support, which simplifies the development of scientific workflow applications. AWDL is an XML-based language for describing scientific workflow applications at a high level of abstraction. It is designed in a way that allows users to concentrate on specifying such workflow applications without dealing with either the complexity of distributed computing environments or any specific implementation technology. This research monograph is organized into five parts: overview, programming, optimization, synthesis, and conclusion, and is complemented by an appendix and an extensive reference list."
Berlin: [, Springer-Verlag], 2012
e20409163
eBooks  Universitas Indonesia Library
cover
Sergey Andreev, editor
"This book constitutes the joint refereed proceedings of the 12 International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking, NEW2AN, and the 5th Conference on Internet of Things and Smart Spaces, ruSMART 2012, held in St. Petersburg, Russia, in August 2012. The total of 42 papers was carefully reviewed and selected for inclusion in this book. The 14 papers selected from ruSMART are organized in topical sections named, defining an internet-of-things ecosystem, future services, and smart space governing through service mashups. The 28 papers from NEW2AN deal with the following topics, wireless cellular networks, ad-hoc, mesh, and delay-tolerant networks, scalability, cognition, and self-organization, traffic and internet applications, and wireless sensor networks. They also contain 4 selected papers from the NEW2AN 2012 winter session."
Berlin: [Springer, ], 2012
e20409488
eBooks  Universitas Indonesia Library
cover
"The two-volume set LNCS 7289 and 7290 constitutes the refereed proceedings of the 11th International IFIP TC 6 Networking Conference held in Prague, Czech Republic, in May 2012. The 64 revised full papers presented were carefully reviewed and selected from a total of 225 submissions. The papers feature innovative research in the areas of network architecture, applications and services, next generation Internet, wireless and sensor networks, and network science. The first volume includes 32 papers and is organized in topical sections on content-centric networking, social networks, reliability and resilience, virtualization and cloud services, IP routing, network measurement, network mapping, and LISP and multi-domain routing."
Heidelberg: Springer-Verlag, 2012
e20410523
eBooks  Universitas Indonesia Library
cover
Aditya Putra
"ABSTRAK
Melihat serangan DNS Amplification Attack DAA terus melakukan evolusi wujud dan ukuran, perlu dilakukan penelitian lebih lanjut tentang cara yang efektif dan implementasi yang tepat untuk menangkal serangan tersebut. Penelitian ini berfokus untuk melakukan pendekatan yang sederhana yaitu menggunakan Hop Count dari nilai TTL menggunakan konfirmasi ICMP untuk diimplementasikan di Server DNS Recursive Resolver untuk mengkonfirmasi kesamaan jarak hop antara Server DNS dengan Pengirim DNS Request.Penelitian ini dilakukan dengan menambahkan fungsi whitelist dan blacklist pada algoritma Hop-Count. Penambahan ini disinyalir dapat membuat antisipasi searngan menjadi lebih baik dengan mengurangi dampak ICMP Flooding yang disebabkan oleh konfirmasi Hop Count. Simulasi serangan dilakukan dalam topologi yang dibangun dalam GNS3 dengan memberikan variasi jarak hop count baik dari attacker maupun dari target kepada server DNS.Penelitian ini menyimpulkan bahwa algoritma ini berhasil mencegah serangan DAA secara efektif. Penambahan server yang digunakan pada penelitian ini juga memperlihatkan dampak penambahan efek serangan yang disebabkan olehnya dan berhasil dicegah dan algoritma HC berhasil mencegahnya. Penelitian ini juga berhasil mencegah potensi munculnya serangan ICMP Flooding hingga 99.

ABSTRACT
As DNS Amplification Attack DAA attack keeps evolving in form and size, it is urge to take further research on how to prevent the attack effectively and using the proper implementation. This research focus to do a simple approach using Hop Count value based on TTL value which utilize ICMP confirmation to be implemented in a DNS Recursive Resolver Server to confirm that DNS Server and DNS Reques sender have the same hop distance.This research is done by adding whitelist and blacklist to Hop Count algorithm. This addition allegedly will reduce ICMP Flooding as the consequences of Hop Count confirmation. The simulation will run in GNS3 based topology which will vary the hop count distance from either attacker or target to DNS Server.This research concluded that our algorithm succeeded preventing the DAA. The increasing number of DNS Server used also showed the increasing of attack size, but the HC algorithm could still manage. This research also manage to prevent the potential ICMP Floodinng up to 99 ."
Depok: Fakultas Teknik Universitas Indonesia, 2018
T51430
UI - Tesis Membership  Universitas Indonesia Library
<<   1 2 3 4   >>