scholarly journals Employing Monitoring System to Analyze Incidents in Computer Network

Author(s):  
Lukáš Macura ◽  
Jan Rozhon ◽  
Jerry Chun-Wei Lin
2012 ◽  
Vol 588-589 ◽  
pp. 1086-1090
Author(s):  
Jian Hua Cao ◽  
Ling Ling Wang ◽  
Hong Xia Luo

Along with the construction of the international tourism island, the National Development and Reform Commission plans to build Hainan Island into an important national winter fruit production base. That makes new demands for tropical agricultural products logistics. In order to ensure that winter melon food is supplied regularly in China, it is important to raise the agricultural products logistics level. Transportation environment is a key factor of tropical agricultural production quality and safety in logistics. As we all known, a bad transportation environment will result in food spoilage and waste, and thus it's very necessary to monitor, collect and process environmental information, but scholars less involve in this area now. The key problems about information collection, analysis, diagnosis and early warning prediction are systematically studied in this paper. We emphasize the key technology of information, including sensor, WSN, computer network and database. Based on advanced information technology and developed hardware, we put forward an available information monitoring system of agricultural products transportation environment. Technically, the research will be helpful for monitoring transportation environment and ensuring the quality safety of agricultural products in transit.


Author(s):  
N.N.S. Abdul Rahman ◽  
N.M. Saad ◽  
A.R. Abdullah ◽  
M.R.M. Hassan ◽  
M.S.S.M Basir ◽  
...  

The requirement of product quality inspection in industries for product standardized leads to a development of the quality inspection system. The problem is related to a manual inspection that is done by a human as an inspector. This paper presents an automated real-time vision quality inspection monitoring system as a problem solver to a manual inspection that is tedious and time-consuming task as well as reducing cost especially in small and medium enterprise industries (SME). For the proposed system, soft drink is used as the test product for quality inspection. The system uses computer-network to inspect two quality inspections which are color concentration and water level. The analysis includes pre-processing, color concentration using the histogram and quadratic distance and level inspection using coordinate vertical and horizontal reference levels. The similarities of both experimental and simulation results are obtained for both parameters which are 100% accuracy using 205 samples.


JURTEKSI ◽  
2020 ◽  
Vol 7 (1) ◽  
pp. 23-32
Author(s):  
Yayuk Ike Melani ◽  
Mahmud Mahmud

Abstract: The background of this research is that some of the risks of using technology that are classified as dangerous are often ignored by users of the monitoring system for learning activities at private universities so that there are several obstacles such as not being able to open the system because the system is hacked by irresponsible parties, the computer network used is often disrupted so that hampers the operational process, and the level of computer security is still relatively weak. This study aims to measure the likelihood of threats and risk impacts on the teaching and learning activity monitoring system and to provide recommendations for risk control of security problems that could become a threat that causes losses to universities. The framework used as a tool to measure the level of threat and risk impact is to use the NIST Special Publication 800-30r-1 framework. The framework of the NIST Special Publication 800-30r-1 has nine phases in carrying out risk assessments, namely introduction of system characteristics, recognition of threats, recognition of vulnerabilities, analysis of handling systems, determining likelihood, determining impact, risk determination, recommending control and determination of results. There are six risk assessment systems for monitoring learning activities at private universities, two of which are high so they are classified as very dangerous and the rest are moderate. The results of this study are used as a reference in making risk control standard documents as a form of improving the quality of a private university.            Keywords: Monitoring System; NIST Spesial Publication 800-30r1; Risk Assessment. Abstrak: Latarbelakang penelitian ini adalah resiko penggunaan teknologi yang tergolong berbahaya sering tidak dihiraukan oleh pengguna sistem monitoring kegiatan belajar pada perguruan tinggi swasta sehingga terjadi beberapa kendala seperti tidak bisa membuka sistem karena sistem diretas oleh pihak yang tidak bertanggung jawab, jaringan komputer yang digunakan sering terganggu sehingga menghambat proses operasional, serta tingkat keamanan komputer yang masih tergolong lemah. Penelitian ini mempunyai tujuan yaitu mengukur seberapa besar kemungkinan terjadi ancaman dan dampak resiko terhadap sistem monitoring kegiatan belajar mengajar serta memberikan rekomendasi pengendalian resiko dari permasalahan keamanan yang bisa menjadi suatu ancaman yang menimbulkan kerugian pada perguruan tinggi. Framework yang digunakan sebagai alat untuk mengukur tingkat ancaman dan dampak resiko adalah menggunakan kerangka kerja NIST Special Publication 800-30r-1. Kerangka kerja NIST Special Publication 800-30r-1 ini mempunyai sembilan fase dalam melakukan penilaian resiko yaitu pengenalan karakteristik sistem, pengenalan ancaman, pengenalan kerentanan, analisis penanganan sistem, menentukan kemungkinan terjadi (likelihood), menentukan dampak (impact), risk determination, merekomendasikan pengendalian dan penetapan hasil. Penilaian resiko sistem monitoring kegiatan belajar pada perguruan tinggi swasta ada enam resiko yang dua diantaranya termasuk tinggi sehingga digolongkan sangat berbahaya dan selebihnya termasuk sedang. Hasil dari penelitian ini digunakan sebagai acuan dalam pembuatan dokumen standar pengendalian resiko sebagai bentuk peningkatan mutu suatu perguruan tinggi swasta. Kata kunci: NIST Spesial Publication 800-30r; Penilaian Resiko; Sistem Monitoring


Author(s):  
Bima Putra Winasis ◽  
Bambang Sugiantoro

A network administrator has responsibility and important role in a computer network. Network security and its services depend on the treatment performed by the administrator. Network administrators who understand the workings of a computer network is needed to obtain the necessary computer networks. One of the obligations of the administrator is to monitor a network which can be done by using the system monitor. Monitoring system is a task to check the computer, operating system and services of computer network to keep the network always work in optimal conditions. In an effort to monitor the condition of the network, one of the technologies that can be used is the notification on twitter social media for providing information in real time to the administrator. Twitter is a social media that is very widely used, free, and secure. Moreover, the use of social media twitter experiencing rapid development. Therefore, the selection of twitter as a medium for the use of the notification is expected to be the right strategy. This system will be made by sending notification via twitter when a LAN network is disconnected or attacked by intruders.Results from the development of systems that have been made based on testing the functionality of the system shows all functions of the system has been running well. While usability testing calculation of the total score of the test system interface to get a score of 38.75 out of a maximum scale of 50. This score is in the range 34-42 value (Satisfied) which means that the respondents were satisfied with the system interface. Therefore, this interface is good to be implemented in the system.


2021 ◽  
pp. 12-17
Author(s):  
Gleb Demyanov ◽  
◽  
Natalya Sadovnikova ◽  

The Internet of Things is a concept of a computer network of physical objects equipped with built-in technologies for interacting with each other or with the external environment, considering the organization of such networks as a phenomenon that can restructure economic and social processes, eliminating the need for human participation from part of actions and operations. IoT technology has had a significant impact on the development of information technology and other industries. According to Forbes, the Internet of Things market is expected to reach $520 billion in 2021, up from $235 billion in 2017, indicating a continued growth in demand for such devices in the future. Gartner Research also estimates that the number of devices connected to the Internet will reach 25 billion by 2021, up from 8.4 billion in 2017. Network with IoT devices connected is an indispensable prey for intruders. There are many ways to attack IoT devices. In this article, the authors have identified several methods of protection. Among them, network interaction monitoring through the analysis is highlighted. The paper also describes how to apply this method in practice.


Sign in / Sign up

Export Citation Format

Share Document