Results 41 to 50 of about 3,896 (237)

Simulating SQL-Injection Cyber-Attacks Using GNS3 [PDF]

open access: yesInternational Journal of Computer Theory and Engineering, 2016
Network Forensics is a subtopic of Digital Forensics\ud wherein research on artificat investigations and intrusions evidence acquisition is addressed. Among many challenges in the field, the problem of losing data artifacts in the state of flux, (i.e., live volatile data), when network devices are suddenly non-operational remains a topic of interest to
Tobin, Patrick   +3 more
openaire   +1 more source

State of the Art Systematic Literature Review on Selection of Top Ten WSN Simulators – Part A

open access: yesJISR on Computing, 2023
The proliferation of technology has led to numerous advancements in various fields, including the field of simulation. Simulators, in particular, have proven to be a valuable tool for researchers and students as they eliminate the need for physical ...
Jibran Rasheed Khan   +3 more
doaj   +1 more source

Computer Networks Virtualization with GNS3: Evaluating a solution to optimize resources and achieve a distance learning [PDF]

open access: yes, 2014
Designing educational resources allow students to modify their learning process. In particular, on-line and downloadable educational resources have been successfully used in engineering education the last years [1].
Calderón, Antonio   +5 more
core   +1 more source

IPSec-VPN Simulation Based on GNS3 [PDF]

open access: yesAdvances in Computer Science Research, 2015
For the problem that the practical teaching of network engineering specialty in universities lacks actual network engineering cases, we choose IPSec-VPN as the study object, and based on GNS3 network simulator, we have constructed IPSec-VPN network topology and established a dynamic executable IPSec-VPN network case through the combined application of ...
Lizhen Zhao, Fan Yang
openaire   +1 more source

Simulasi Routing Protokol Berbasis Distance Vector Menggunakan Gns3 Versi 0.8. [PDF]

open access: yes, 2016
Measurement of routing protocol performance in a network can be done with the help of simulation. The writers are trying to simulate package delivery data over Virtual Private Network (VPN) with the use of Graphical Network Simulator version 0.8.6 (GNS3).
Nurhayati, A. (Ade), Pangestu, A. (Adam)
core   +12 more sources

Application of Quality of Service on Internet Network using Hierarchical Token Bucket Method

open access: yesJurnal Teknologi dan Sistem Komputer, 2017
One of the problems frequently encountered by internet users is slow internet access. In particular, when there are many users share the internet bandwidth. This problem may occur as there is no bandwidth management system employed.
Claudi Priambodo Antodi   +2 more
doaj   +1 more source

LDDoS Emulation Method Based on Lightweight Virtualization [PDF]

open access: yesJisuanji gongcheng, 2020
Low-rate Distributed Denial-of-Service(LDDoS) attack,as a complex large-scale network attack,is one of the major threats faced by modern networks.It is necessary to establish an emulation platform to study LDDoS attack and defense method,so as to improve
SONG He, WANG Xiaofeng
doaj   +1 more source

Interactive Network Learning: An Assessment of EVE-NG Platform in Educational Settings

open access: yesActa Electrotechnica et Informatica, 2023
This article compares EVE-NG, a network emulation software, to other commonly used network simulation tools such as Cisco Packet Tracer and GNS3. EVE-NG’s features, benefits, and drawbacks are assessed in terms of system requirements, support platforms ...
Harahus Maroš   +3 more
doaj   +1 more source

ANALISIS PERBANDINGAN ROUTING PROTOKOL OPEN SHORTES PATH FIRST (OSPF) DENGAN ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL (EIGRP)

open access: yesIlkom Jurnal Ilmiah, 2018
Routing adalah proses pemilihan rute terbaik untuk suatu paket data agar dapat sampai ke tujuannya. Proses routing sangat dibutuhkan dalam proses pengiriman  data.
Nur Indah, Yulita Salim, Ramdan Satra
doaj   +1 more source

Pengujian Serangan UDP Flood di Jaringan Software-Defined pada GNS3

open access: diamondJurnal Teknologi Informasi Indonesia (JTII), 2018
Alimuddin Yasin, Salman Suleman
exaly   +3 more sources

Home - About - Disclaimer - Privacy