79 resultados para VPN
Resumo:
This document briefs network managers on Janet’s current position as regards VPN, the different flavours of VPN available, and the current position of VPN on other networks around the globe. The appendix is a technical supplement that provides background information about VPN-enabling technologies. JL
Resumo:
Il documento riporta, con prove sperimentali, un confronto tra le prestazioni che diverse tecnologie VPN hanno all'interno dello scenari wired e wireless. Il protocollo di tunneling utilizzato per la creazione delle VPN incide in modo particolare sulle performance della rete. L'obiettivo è proprio quello di valutare il protocollo che fornisce una qualità migliore a livello prestazionale, il tutto tramite un insieme mirato di test.
Resumo:
Network-based Intrusion Detection Systems (NIDSs) analyse network traffic to detect instances of malicious activity. Typically, this is only possible when the network traffic is accessible for analysis. With the growing use of Virtual Private Networks (VPNs) that encrypt network traffic, the NIDS can no longer access this crucial audit data. In this paper, we present an implementation and evaluation of our approach proposed in Goh et al. (2009). It is based on Shamir's secret-sharing scheme and allows a NIDS to function normally in a VPN without any modifications and without compromising the confidentiality afforded by the VPN.
Resumo:
Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.
Resumo:
Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides being used to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted Networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor such encrypted traffic. We therefore describe how our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment.
Resumo:
Network-based Intrusion Detection Systems (NIDSs) monitor network traffic for signs of malicious activities that have the potential to disrupt entire network infrastructures and services. NIDS can only operate when the network traffic is available and can be extracted for analysis. However, with the growing use of encrypted networks such as Virtual Private Networks (VPNs) that encrypt and conceal network traffic, a traditional NIDS can no longer access network traffic for analysis. The goal of this research is to address this problem by proposing a detection framework that allows a commercial off-the-shelf NIDS to function normally in a VPN without any modification. One of the features of the proposed framework is that it does not compromise on the confidentiality afforded by the VPN. Our work uses a combination of Shamir’s secret-sharing scheme and randomised network proxies to securely route network traffic to the NIDS for analysis. The detection framework is effective against two general classes of attacks – attacks targeted at the network hosts or attacks targeted at framework itself. We implement the detection framework as a prototype program and evaluate it. Our evaluation shows that the framework does indeed detect these classes of attacks and does not introduce any additional false positives. Despite the increase in network overhead in doing so, the proposed detection framework is able to consistently detect intrusions through encrypted networks.
Resumo:
The research reported in this paper documents the use of Web2.0 applications with six Western Australian schools that are considered to be regional and/or remote. With a population of two million people within an area of 2,525,500 square kilometres Western Australia has a number of towns that are classified as regional and remote. Each of the three education systems have set up telecommunications networks to improve learning opportunities for students and administrative services for staff through a virtual private network (VPN) with access from anywhere, anytime and ultimately reduce the feeling of professional and social dislocation experienced by many teachers and students in the isolated communities. By using Web2.0 applications including video conferencing there are enormous opportunities to close the digital divide within the broad directives of the Networking the Nation plan. The Networking the Nation plan aims to connect all Australians regardless of where they are hence closing the digital divide between city and regional living. Email and Internet facilities have greatly improved in rural, regional and remote areas supporting every day school use of the Internet. This study highlights the possibilities and issues for advanced telecommunications usage of Web2.0 applications discussing the research undertaken with these schools. (Contains 1 figure and 3 tables.)
Resumo:
A detailed study of surface laser damage performed on a nonlinear optical crystal, urea L-malic acid, using 7 ns laser pulses at 10 Hz repetition rate from a Q-switched Nd:YAG laser at wavelengths of 532 and 1064 nm is reported. The single shot and multiple shot surface laser damage threshold values are determined to be 26.64±0.19 and 20.60±0.36 GW cm−2 at 1064 nm and 18.44±0.31 and 7.52±0.22 GW cm−2 at 532 nm laser radiation, respectively. The laser damage anisotropy is consistent with the Vickers mechanical hardness measurement performed along three crystallographic directions. The Knoop polar plot also reflects the damage morphology. Our investigation reveals a direct correlation between the laser damage profile and hardness anisotropy. Thermal breakdown of the crystal is identified as the possible mechanism of laser induced surface damage.
Resumo:
Con el fin de evaluar la efectividad de cinco bioplaguicidas para el manejo del gusano cogollero (Spodoptera frugiperdaJ. E. Smith) en el cultivo de maíz, se estableció el presente ensayo en el Centro experimental de Campos Azules municipio de Masatepe, en época de primera del año 2003. Los bioplaguicidas evaluados corresponden a los nombres de Spintor, Dipel 8L, Dipel 6.4 WP, Dipel 2X, y VPN (Virus de la poliedrosis nuclear) junto a ellos se evaluó Cypermetrina como testigo químico y aplicación de agua como testigo absoluto. El genotipo utilizado fue la variedad NB-6. Los tratamientos fueron arreglados en diseño de bloques completos al azar con cuatro réplicas y las variables evaluadas fueron sometidas a análisis de varianza y separación múltiple de medias. Al evaluar el porcentaje de eficacia de los bioplaguicidas, los tratamientos Spintor y Dipel 6.4 WP mostraron los mayores promedios respectivamente en las dos evaluaciones realizadas presentando diferencias altamente significativas. El número de larvas por planta a los 33, 37, 44 y 51 días después de la siembra fue también altamente significativo. Para la variable altura de planta, se registraron diferencias estadísticas entre los tratamientos; a los 89 días después de la siembra, las plantas tratadas con Spintor presentaron la mayor altura promedio. En cuanto al rendimiento la diferencia entre los tratamientos fue altamente significativa obteniendo el mayor promedio el tratamiento con Spintor. No se observó diferencias significativas entre los tratamientos para las variables de mazorcas sanas, mazorcas podridas, mazorcas dañadas y peso de mil granos. En cuanto al análisis económico se demostró que económicamente el tratamiento con Spintor fue el más rentable presentando una taza de retorno marginal de 208.1 % con respecto al tratamiento con Cypermetrina (tratamiento tradicional) la cual fue de 741 %.
Resumo:
El gusano cogollero [Spodoptera fnugiperda (J.E. Smith) (lnsecta: Lepidoptera: Noctuidae)], es uno de los principales insectos que afectan el cultivo de sorgo en El Salvador. En vista de lo anterior, durante los meses de septiembre de 2001 y enero de 2002, se realizó una investigación en la estación experimental dos del Centro Nacional de Tecnología Agropecuaria y Forestal (CENTA), ubicado en el valle de San Andrés, departamento de La Libertad. El objetivo de la investigación fue determinar la efectividad de productos químicos, botánicos y biológicos para el control del gusano cogollero. Se utilizó un diseño de bloques completos al azar, con nueve tratamientos y cuatro repeticiones. Los tratamientos fueron: insecticida botánico (Agrolnagor), Aceite de Nim, Beauveria bassiana, Virus de la Poliedrosis Nuclear (VPN), Lufenuron, Teflubanzuron, Agua azucarada, testigo relativo ( clorpirifos) y testigo absoluto (sin aplicación). Los datos de mortalidad se obtuvieron 24 horas y cuatro días después de las aplicaciones. Los resultados muestran diferencias significativas entre tratamientos en los porcentajes de mortalidad de la plaga. Los insecticidas inhibidores de la quitina, lufeneron y tetlubenzuron, mostraron mayor efectividad (superior al 90 por ciento) comparados con los otros tratamientos insecticidas, los cuales mostraron niveles de mortalidad interior al 65 por ciento cuatro días después de su aplicación. El porcentaje de mortalidad obtenido en parcelas tratadas con chlorpyrifos fue de 63.3 por ciento durante el primer muestreo. La mortalidad fue superior en larvas de los primeros estadios, comparada con larvas de los últimos estadios. Los tratamientos con Neem, productos biológicos (Beauveria bassiana y el virus de la poliedrosis nuclear) y agua azucarada presentaron los más bajos niveles de mortalidad. Hubo diferencias significativas en el rendimiento del cultivo, sin embargo, dichas diferencias no siempre estuvieron relacionadas a los niveles de mortalidad presentados por los tratamientos insecticidas.
Resumo:
A leishmaniose visceral americana (LVA) é uma doença em expansão no Brasil, para a qual se dispõem de poucas, e aparentemente ineficientes, estratégias de controle. Um dos grandes problemas para a contenção da leishmaniose visceral americana é a falta de um método acurado de identificação dos cães infectados, considerados os principais reservatórios da doença no meio urbano. Neste sentido, a caracterização de marcadores clínico-laboratoriais da infecção neste reservatório e a avaliação mais adequada do desempenho de testes para diagnóstico da infecção podem contribuir para aumentar a efetividade das estratégias de controle da LVA. Com isso, o presente estudo tem dois objetivos principais: (1) desenvolver e validar um modelo de predição para o parasitismo por Leishmania chagasi em cães, baseado em resultados de testes sorológicos e sinais clínicos e (2) avaliar a sensibilidade e especificidade de critérios clínicos, sorológicos e parasitológicos para detecção de infecção canina por L. chagasi mediante análise de classe latente. O primeiro objetivo foi desenvolvido a partir de estudo em que foram obtidos dados de exames clínico, sorológico e parasitológico de todos os cães, suspeitos ou não de LVA, atendidos no Hospital Veterinário Universitário da Universidade Federal do Piauí (HVU-UFPI), em Teresina, nos anos de 2003 e 2004, totalizando 1412 animais. Modelos de regressão logística foram construídos com os animais atendidos em 2003 com a finalidade de desenvolver um modelo preditivo para o parasitismo com base nos sinais clínicos e resultados de sorologia por Imunofluorescência Indireta (IFI). Este modelo foi validado nos cães atendidos no hospital em 2004. Para a avaliação da área abaixo da curva ROC (auROC), sensibilidade, especificidade, valores preditivos positivo (VPP), valores preditivos negativo (VPN) e acurácia global, foram criados três modelos: um somente baseado nas variáveis clínicas, outro considerando somente o resultado sorológico e um último considerando conjuntamente a clínica e a sorologia. Dentre os três, o último modelo apresentou o melhor desempenho (auROC=90,1%, sensibilidade=82,4%, especificidade=81,6%, VPP=73,4%, VPN=88,2% e acurácia global=81,9%). Conclui-se que o uso de modelos preditivos baseados em critérios clínicos e sorológicos para o diagnóstico da leishmaniose visceral canina pode ser de utilidade no processo de avaliação da infecção canina, promovendo maior agilidade na contenção destes animais com a finalidade de reduzir os níveis de transmissão. O segundo objetivo foi desenvolvido por meio de um estudo transversal com 715 cães de idade entre 1 mês e 13 anos, com raça variada avaliados por clínicos veterinários no HVU-UFPI, no período de janeiro a dezembro de 2003. As sensibilidades e especificidades de critérios clínicos, sorológicos e parasitológicos para detecção de infecção canina por Leishmania chagasi foram estimadas por meio de análise de classe latente, considerando quatro modelos de testes e diferentes pontos de corte. As melhores sensibilidades estimadas para os critérios clínico, sorológico e parasitológico foram de 60%, 95% e 66%, respectivamente. Já as melhores especificidades estimadas para os critérios clínico, sorológico e parasitológico foram de 77%, 90% e 100%, respectivamente. Conclui-se que o uso do exame parasitológico como padrão-ouro para validação de testes diagnósticos não é apropriado e que os indicadores de acurácia dos testes avaliados são insuficientes e não justificam que eles sejam usados isoladamente para diagnóstico da infecção com a finalidade de controle da doença.
Resumo:
Presentacón que recoge el proceso de gestión del TFG en ADDI, desde los modelos de correos electrónicos que reciben alumnos/as, directores/as y miembros de los tribunales, hasta los pasos que deben dar cada uno de ellos a la hora de subir, validar o descargar el TFG. También se incluyen unas recomendaciones acerca los derechos de autor, asi como unas pequeñas indicaciones sobre el uso de VPN para faciliar el acceso a las personas que lo hagan desde fuera de la UPV/EHU.
Resumo:
208 p.
Resumo:
This paper presents a new packet scheduling scheme called agent-based WFQ to control and maintain QoS parameters in virtual private networks (VPNs) within the confines of adaptive networks. Future networks are expected to be open heterogeneous environments consisting of more than one network operator. In this adaptive environment, agents act on behalf of users or third-party operators to obtain the best service for their clients and maintain those services through the modification of the scheduling scheme in routers and switches spanning the VPN. In agent-based WFQ, an agent on the router monitors the accumulated queuing delay for each service. In order to control and to keep the end-to-end delay within the bounds, the weights for services are adjusted dynamically by agents on the routers spanning the VPN. If there is an increase or decrease in queuing delay of a service, an agent on a downstream router informs the upstream routers to adjust the weights of their queues. This keeps the end-to-end delay of services within the specified bounds and offers better QoS compared to VPNs using static WFQ. This paper also describes the algorithm for agent-based WFQ, and presents simulation results. (C) 2003 Elsevier Science Ltd. All rights reserved.