詳細検索結果
以下の条件での結果を表示する: 検索条件を変更
クエリ検索: "Vyatta"
3件中 1-3の結果を表示しています
  • Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto
    Information and Media Technologies
    2013年 8 巻 4 号 1251-1258
    発行日: 2013年
    公開日: 2013/12/15
    ジャーナル フリー
    Gaining complete understanding of the active services and open communication paths is often difficult because of the rapidly expanding complexity of those services and their wide-ranging functions. Furthermore, the IT administrators of hand-designed systems often lack ways to identify and close unnecessary services and communication pathways. In this paper, firstly we propose an automated approach to discover all active services and the permitted communications paths in networked system. Secondly, we propose a method to detect all unexpected services and communication paths in networked system for IT system administrators. We then show how hand-designed networked systems containing such devices are prone to contain numerous unnecessary active services and communication paths, which are exploited by malicious actions such a service denial, information theft, and/or cyber espionage. The evaluation result shows the effectiveness of our proposed approach.
  • Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto
    Journal of Information Processing
    2013年 21 巻 4 号 632-639
    発行日: 2013年
    公開日: 2013/10/15
    ジャーナル フリー
    Gaining complete understanding of the active services and open communication paths is often difficult because of the rapidly expanding complexity of those services and their wide-ranging functions. Furthermore, the IT administrators of hand-designed systems often lack ways to identify and close unnecessary services and communication pathways. In this paper, firstly we propose an automated approach to discover all active services and the permitted communications paths in networked system. Secondly, we propose a method to detect all unexpected services and communication paths in networked system for IT system administrators. We then show how hand-designed networked systems containing such devices are prone to contain numerous unnecessary active services and communication paths, which are exploited by malicious actions such a service denial, information theft, and/or cyber espionage. The evaluation result shows the effectiveness of our proposed approach.
  • 櫻田武嗣, 三島和宏, 萩原洋一
    学術情報処理研究
    2014年 18 巻 1 号 71-80
    発行日: 2014/09/25
    公開日: 2018/12/09
    ジャーナル フリー

    本論文は東京農工大学において2013年10月末に刷新した仮想化基盤を活用した無線LANシステムについて述べる.この刷新では,これまで利用していた多数の自律型無線アクセスポイントを廃止し,コントローラ型のアクセスポイントを再配置すると共に,無線LANシステムで用いるサーバ類,ルータ類を仮想化基盤上に構築し,機器の集約と低コスト化を図った.また来訪者用無線LAN利用アカウントの自動発行システムやクライアントの位置算出システムも導入し,管理と運用の効率化を目指している.これらの刷新に関わる設計,構築とその後の運用について述べる.さらにアクセスポイントの増設位置決定のための簡易的な事前調査方法についても述べる.

feedback
Top