Explore chapters and articles related to this topic
Network Security for EIS and ECS Systems
Published in Barney L. Capehart, Timothy Middelkoop, Paul J. Allen, David C. Green, Handbook of Web Based Energy Information and Control Systems, 2020
Internet protocol (IP) facilitates speedy, reliable and asynchronous communications between machines by dividing information into small packets that are easier to transmit across a network or between networks than if a dedicated communications channel were used. Each of these packets contains the IP address of the source of the transmission in a “header.”Since the IP header can act as type of return address, many attackers will engage in IP spoofing in order to falsify the identity of the network and computer from which they are attacking a targeted system. IP spoofing involves changing the IP address in packet headers in order to impersonate a different machine. When an attacker knows the address of other trusted computers with which the targeted machine communicates, he can route his impending attack through one of those machines and conceal his identity and location.
Internet of Things (IoT) Computing
Published in Vivek Kale, Digital Transformation of Enterprise Architecture, 2019
The assignment of an IP address to an individual computer can be permanent or temporary. Typically, the computers providing server functions have permanent IP addresses. Also, ISPs assign IP addresses permanently to broadband modems. However, almost all client computers in an enterprise do not have permanent IP addresses. Once a range of IP addresses are allocated to subnet, the assignment of individual IP addresses to individual computers are usually performed dynamically via a server called Dynamic Host Control Protocol (DHCP) server. This eliminates the tedious task of assigning addresses manually to every client computer in the network. When a computer connected to the subnet is turned on, it communicates with a DHCP server requesting an IP address (along with the subnet mask and gateway address). The server, from the existing pool, determines an available IP address and assigns it to this computer. When the computer is turned off, the IP address is returned to the pool and may be assigned to some other computers. There is no guarantee that the same IP will be assigned next time to the same computer.
5 Ip Networking Basics
Published in Wes Simpson, Video Over IP, 2013
The difference between MAC addresses and IP addresses can be illustrated with a simple analogy. When an automobile is manufactured, it is assigned a serial number that is unchanging and stays with that car permanently. This is similar to a MAC address for a piece of hardware. When an owner goes to register the auto, he or she receives a license plate (a.k.a. number plate or marker tag). The number of the license plate is controlled by the rules of the local jurisdiction, such as a state in the United States, a province in Canada, or a country in Europe. During its lifetime, one auto may have several different license plate numbers, as it changes owners or if the owner registers the car in another jurisdiction. Similarly, one piece ofphysical hardware may have different IP addresses assigned at different times in its life, as the hardware moves from network to network. Stretching the analogy a bit further, an auto's serial number is somewhat private information, of interest only to the owner of the car and the agency that issues the license plates. In contrast, the number of the license plate is public information and is emblazoned on the auto for all to see. Similarly, a MAC address is important only to the local Ethernet connection, commonly on a private network. The IP address is public and is used by other computers all over the Internet to communicate with a particular machine.
Attitudes of Jordanian architecture students toward scientific research: A single-institution survey-based study
Published in Cogent Engineering, 2023
Bushra Obeidat, Laith M. Obeidat
The questionnaire was developed using the electronic platform Qualtrics. The sole identification associated with each completed questionnaire was an untraceable IP address. Upon receipt, each completed questionnaire was sequentially numbered by the survey program. These allocated numbers were then used to identify the completed surveys. The goal and significance of the research were described on the first page of the questionnaire, along with a statement assuring the anonymity and confidentiality of the participants. The first section consisted of seven questions about the students’ profiles. Three of these pertained to participants’ characteristics (age, gender, and academic year). The rest of the questions focused on knowledge or experience of scientific research (i.e., whether the students had previously taken part in research activities; had an experience of scientific research; or regularly consumed architectural publications or broadcasts and/or participated in meetings, conferences, seminars, or similar activities).The second section assessed students’ attitudes toward scientific research with questions based on relevant literature (Halabi, 2016; Ünver et al., 2018). The responses were scored on a 5-point Likert scale, with answers ranging from 1 (strongly agree) to 5 (strongly disagree). Hence, lower scores indicated positive attitudes.
Intelligent information flow management system in innovative scientific and industrial clusters
Published in International Journal of Parallel, Emergent and Distributed Systems, 2022
Artur Zaenchkovski, Alexey Lazarev, Dmitrii Tukaev, Victor Epifanov
The main advantage of the IPv6 protocol is an extended IP address standard using additional network prefixes. For example, IPv6 address fc00:00:14:1:/64 allows one to use the prefix range [0000-ffff] with a length of up to 128 bits. The process of generating addresses pool under consideration in the traditional form is carried out using the values of the starting and ending IP addresses according to the specified mask [12]. Considering the existing application software solution for the representation of a DHCP server isc-dhcp-server, its basic parameters such as subnet and the rank of allocated IP addresses are highlighted. The main problem from the point of the security DHCP servers view, in particular iscdhcp-server, which can be distinguished by the algorithm of operation and in the standard view is created to allocate an address to the client. At the same time, the client does not re-cheque the received address. On the other hand, the rejection of IP addresses automatic distribution in the direction of manual distribution allows to control client devices. But it should be noted that this technique is not appropriate in the case of a significant number of clients, as in our case with entities of scientific and industrial clusters. As can be seen from Figure 2, at the stage of connecting the network adapter to the gateway, the device is allocated a DHCP IPv4/IPv6 address without additional verification of the servers originality.
Protocol construction for preventing the cyber nuclear terrorism in the nuclear power plants (NPPs) using the nonlinear algorithm
Published in Journal of Nuclear Science and Technology, 2020
Kyung Bae Jang, Chang Hyun Baek, Tae Ho Woo
For the extensive security of nuclear facilities, the nuclear security has been considered as the aspect of the industrial terrorism preventions. There have been several cyber cases in the nuclear sites, which are in Table 1 [1]. Considering the fourth industrial revolution era, our life related systems are connected each other, which means the internet based networking is spread anywhere. For example, in the case of the cyber terrorism on South Korean nuclear power plant (NPP), the internet protocol (IP) address was a city in China where there were some espionages of North Korea [2]. So, it has been doubtful that the attack was committed by the nation. The civilian internetworking could be used for the attacking to the industrial facilities, especially the nuclear energy stuffs. This is different from the conventional terrorism in which the direct bombing or intentional suicide assault could be happened. The cyber terrorism is not seen easily. However, the consequences have been gradually displayed to the public and wide ranged area. In the results, the effects are much severer than the physical attacks.