Results 41 to 50 of about 3,896 (237)
Simulating SQL-Injection Cyber-Attacks Using GNS3 [PDF]
Network Forensics is a subtopic of Digital Forensics\ud wherein research on artificat investigations and intrusions evidence acquisition is addressed. Among many challenges in the field, the problem of losing data artifacts in the state of flux, (i.e., live volatile data), when network devices are suddenly non-operational remains a topic of interest to
Tobin, Patrick +3 more
openaire +1 more source
State of the Art Systematic Literature Review on Selection of Top Ten WSN Simulators – Part A
The proliferation of technology has led to numerous advancements in various fields, including the field of simulation. Simulators, in particular, have proven to be a valuable tool for researchers and students as they eliminate the need for physical ...
Jibran Rasheed Khan +3 more
doaj +1 more source
Computer Networks Virtualization with GNS3: Evaluating a solution to optimize resources and achieve a distance learning [PDF]
Designing educational resources allow students to modify their learning process. In particular, on-line and downloadable educational resources have been successfully used in engineering education the last years [1].
Calderón, Antonio +5 more
core +1 more source
IPSec-VPN Simulation Based on GNS3 [PDF]
For the problem that the practical teaching of network engineering specialty in universities lacks actual network engineering cases, we choose IPSec-VPN as the study object, and based on GNS3 network simulator, we have constructed IPSec-VPN network topology and established a dynamic executable IPSec-VPN network case through the combined application of ...
Lizhen Zhao, Fan Yang
openaire +1 more source
Simulasi Routing Protokol Berbasis Distance Vector Menggunakan Gns3 Versi 0.8. [PDF]
Measurement of routing protocol performance in a network can be done with the help of simulation. The writers are trying to simulate package delivery data over Virtual Private Network (VPN) with the use of Graphical Network Simulator version 0.8.6 (GNS3).
Nurhayati, A. (Ade), Pangestu, A. (Adam)
core +12 more sources
Application of Quality of Service on Internet Network using Hierarchical Token Bucket Method
One of the problems frequently encountered by internet users is slow internet access. In particular, when there are many users share the internet bandwidth. This problem may occur as there is no bandwidth management system employed.
Claudi Priambodo Antodi +2 more
doaj +1 more source
LDDoS Emulation Method Based on Lightweight Virtualization [PDF]
Low-rate Distributed Denial-of-Service(LDDoS) attack,as a complex large-scale network attack,is one of the major threats faced by modern networks.It is necessary to establish an emulation platform to study LDDoS attack and defense method,so as to improve
SONG He, WANG Xiaofeng
doaj +1 more source
Interactive Network Learning: An Assessment of EVE-NG Platform in Educational Settings
This article compares EVE-NG, a network emulation software, to other commonly used network simulation tools such as Cisco Packet Tracer and GNS3. EVE-NG’s features, benefits, and drawbacks are assessed in terms of system requirements, support platforms ...
Harahus Maroš +3 more
doaj +1 more source
Routing adalah proses pemilihan rute terbaik untuk suatu paket data agar dapat sampai ke tujuannya. Proses routing sangat dibutuhkan dalam proses pengiriman data.
Nur Indah, Yulita Salim, Ramdan Satra
doaj +1 more source
Pengujian Serangan UDP Flood di Jaringan Software-Defined pada GNS3
Alimuddin Yasin, Salman Suleman
exaly +3 more sources

