• Title/Summary/Keyword: NET-SNMP

Search Result 6, Processing Time 0.018 seconds

The development of a ship's network monitoring system using SNMP based on standard IEC 61162-460

  • Wu, Zu-Xin;Rind, Sobia;Yu, Yung-Ho;Cho, Seok-Je
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.10
    • /
    • pp.906-915
    • /
    • 2016
  • In this study, a network monitoring system, including a secure 460-Network and a 460-Gateway, is designed and developed according with the requirements of the IEC (International Electro-Technical Commission) 61162-460 network standard for the safety and security of networks on board ships. At present, internal or external unauthorized access to or malicious attack on a ship's on board systems are possible threats to the safe operation of a ship's network. To secure the ship's network, a 460-Network was designed and implemented by using a 460-Switch, 460-Nodes, and a 460-Gateway that contains firewalls and a DMZ (Demilitarized Zone) with various application servers. In addition, a 460-firewall was used to block all traffic from unauthorized networks. 460-NMS (Network Monitoring System) is a network-monitoring software application that was developed by using an simple network management protocol (SNMP) SharpNet library with the .Net 4.5 framework and a backhand SQLite database management system, which is used to manage network information. 460-NMS receives network information from a 460-Switch by utilizing SNMP, SNMP Trap, and Syslog. 460-NMS monitors the 460-Network load, traffic flow, current network status, network failure, and unknown devices connected to the network. It notifies the network administrator via alarms, notifications, or warnings in case any network problem occurs. Once developed, 460-NMS was tested both in a laboratory environment and for a real ship network that had been installed by the manufacturer and was confirmed to comply with the IEC 61162-460 requirements. Network safety and security issues onboard ships could be solved by designing a secure 460-Network along with a 460-Gateway and by constantly monitoring the 460-Network according to the requirements of the IEC 61162-460 network standard.

Design and Implementation of NMS for Mobile IPv4 (Mobile IPv4를 위한 네트워크 관리 시스템 설계 및 구현)

  • Park Jin-Soo;Kim Hyun-Jin;Kim Seong-Ho;Kim Sok-Hyong;Suh Young-Joo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.172-174
    • /
    • 2005
  • 시간과 장소에 무관하게 네트워크에 접속하여 필요한 정보를 얻으려는 요구가 증가하면서, 이동환경에서 사용되는 장비를 모니터링하거나 장비로부터 수집한 정보를 분석하여 유선환경에 비해 빈약한 무선환경을 효율적으로 사용할 필요성이 증가하고 있다. 그러나 Mobile IP MIB이 구현되어 있지 않은 상황에서는 무선환경에 필요한 정보를 수집하기 어렵다. 이에 본 연구실에서는 Mobile IP MIB을 구현하고 SNMP를 이용하여 정보를 수집함으로써, 기존 모니터링 개념과 더불어 단말의 이동성 추적 등과 같은 무선환경에서 필요한 기능들을 접목한 네트워크 관리 시스템인 POSTECH MIP NMS를 구현하였으며, 이를 통해 부하분산 등의 기능을 능동적으로 처리할 수 있는 네트워크 관리 시스템의 기반을 마련하였다.

  • PDF

Design and Implementation of Web-based Home PNA Device Management System (웹 기반 Home PNA 장치 관리 시스템의 설계 및 구현)

  • An, Byeong-O;An, Seong-Jin;Jeong, Jin-Uk
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.865-874
    • /
    • 2001
  • In this paper, we have designed and implemented Web based Home Phoneline Neworking Aliance(Home PNA)device management, system which can resolve the unfair bandwidth service form may subscribers and manage subscribes using these devices. To manage Home PNA device with Simple Network Management Protocol(SNMP) management elements are classified into system. Port performance, fault functional area based on Management Information Base(MIB) objects from Multi Dwelling Unit(MDU) devices MIB. System management provides configuration information of each MDU devices, and port management provides the current state of subscribes and performs filtering operation against the unauthorized users. And performance management provides traffic information about trunk and subscriber lines. Finally fault management provides fault logging fo the unexpected events and trap message from devices To verify the operability of the proposed system, we have tested it in real network environment.

  • PDF

Design and Implementation of Integrated Network Performance Management System (통합적인 통신망 성능관리 시스템의 설계 및 구현)

  • Chung Youn-Ky;Moon Hea-Eun;Na Youn-Kyoung
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.10
    • /
    • pp.1389-1399
    • /
    • 2004
  • Modern computer networks are growing wider, more complicated. Therefore, we have needed so much the function of the performance management to, by making this kind of the network performance best fitted, guarantee Quality of Service which the users require. Currently, Netflow, RMON and Packet Capture methods are used to analyze Traffic, the principal function of the performance management, but they are not the fundamental solution from the integrated point of view. In this paper, we suggest the integrated performance management architecture and, by means of it, design and implement the performance man-agement system so that we can manage the performance of multi-technology and multi-vender devices.

  • PDF

Attack Detection Algorithm Using Exponential Smoothing Method on the IPv6 Environment (IPv6 환경에서 지수 평활법을 이용한 공격 탐지 알고리즘)

  • Koo Hyang-Ohk;Oh Chang-Suk
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.378-385
    • /
    • 2005
  • Mistaking normal packets for harmful traffic may not offer service in conformity with the intention of attacker with harmful traffic, because it is not easy to classify network traffic for normal service and it for DDoS(Distributed Denial of Service) attack. And in the IPv6 environment these researches on harmful traffic are weak. In this dissertation, hosts in the IPv6 environment are attacked by NETWOX and their attack traffic is monitored, then the statistical information of the traffic is obtained from MIB(Management Information Base) objects used in the IPv6. By adapting the ESM(Exponential Smoothing Method) to this information, a normal traffic boundary, i.e., a threshold is determined. Input traffic over the threshold is thought of as attack traffic.

  • PDF

RMCS Plan and the Embodiment for the Home Network Service which is Safeent (안전한 Home Network 서비스를 위한 RMCS 설계 및 구현)

  • Sun, Jae-Hoon;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.19-27
    • /
    • 2005
  • As home network is increasing to use, home network industry is developing too. Also, it is to be a popular subject in the network's topics. In this reasons, home network become a important thing because home gateway function is working between access network and home network. In the home network, it relates on the personal computer, home pad, and digital television. But, home gateway is not prepared standard point about techniques. Therefore, many kind of technique want to try for developing of home gateway's functions. Usually, we use ID/PASSWORD method in network control system. But, we found a lot of problems about classical network system while we experienced Jan/25 big trouble. We are considering about that home network system are using same network net. Therefore, seriously we have to check about security and safety at the home network's environment. This report focus on the home network's environment to control for using and efficiency and then it wants to find ways to protect from the internal and external attacks. Existing ID/PASSWORD method it used a electronic signature and the security against the approach from of external watch, the MIB structure of role base and the security of the Home network which leads the authority control which is safe even from the Home network inside it strengthened it used compared to it proposed.

  • PDF