http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
An Experimental Study Analysis of Security Attacks at IEEE 802.11 Wireless Local Area Network
Md Waliullah,A B M Moniruzzaman,Md. Sadekur Rahman,Member, IEEE 보안공학연구지원센터 2015 International Journal of Future Generation Communi Vol.8 No.1
IEEE802.11 wireless networks have become one of the most widely used networks. Due to open nature of wireless medium, hackers and intruders can make utilization of the loopholes of the wireless communication; as a result, there are many security threats associated with Wireless Local Area Network (WLAN). In this paper, we have worked an experimental analysis to study some of the well known attacks pertaining to IEEE 802.11 WLAN. At first, some of the open issues related to this fragile technology have been discussed. Based on this vulnerabilities and threats categories some of the major attack has been performed in a live environment by using open source software tools i.e Aircrak-nj, kismet. etc. The analysis and finding from this paper’s proved that the complexity of attacks had increased by time and the Wifi technology are becoming more dangerous to the end users and business environment.
A. B. M. Moniruzzaman,Md. Waliullah,Md. Sadekur Rahman 보안공학연구지원센터 2015 International Journal of Grid and Distributed Comp Vol.8 No.1
This paper designs and implements a high availability clusters and incorporated with load balance infrastructure of web servers. The paper described system can provide full facilities to the website hosting provider and large business organizations. This system can provide continuous service though any system components fail uncertainly with the help of Linux Virtual Server (LVS) load-balancing cluster technology and combined with virtualization as well as shared storage technology to achieve the three-tier architecture of Web server clusters. This technology not only improves availability, but also affects the security and performance of the application services being requested. Benefits of the system include node failover overcome; network failover overcome; storage limitation overcome and load distribution.
Analysis of Topology Based Routing Protocols for Vehicular Ad-HocNetwork (VANET)
A B M Moniruzzaman,Md. Waliullah,Md. Sadekur Rahman 보안공학연구지원센터 2015 International Journal of Future Generation Communi Vol.8 No.3
Now-a-days vehicles are one of the most important parts of our life. We need them to cross distances in our everyday life. In this paper we discuss Vehicular Ad-Hoc Network (VANET) technology that can ensure the maintenance of traffic rules and regulation. By applying this technology we can save life, save time, corruption, vehicle security, avoid collision and so on. Vehicular Ad Hoc Network (VANET) is a part of Mobile Ad Hoc Network (MANET). Every node or vehicle can move freely and they will communicate each other by wireless technology in coverage. The main goal of this research is to study the existing routing protocols for ad-hoc network system and compared between AODV (Reactive) and DSDV (Proactive). We have studied different types of routing protocols such as topology based, position based, cluster based, geo-cast based and broadcast based. We have simulated and compared AODV (Reactive) and DSDV (Proactive) to find out their efficiency and detect their flaws.