ANALYSIS AND MONITORING THE NETWORK TRAFFIC IN THE PROCESS OF CONNECTING TO INDUSTRIAL SIEMENS CONTROLLERS
ANALYSIS AND MONITORING THE NETWORK TRAFFIC IN THE PROCESS OF CONNECTING TO INDUSTRIAL SIEMENS CONTROLLERS
DOI:
https://doi.org/10.46687/jsar.v22i1.339Keywords:
Analysis, Connection, Industrial controller, LAN, Monitoring, Network, Process, Siemens, TrafficAbstract
In this paper analysis and monitoring of network traffic in the process of connecting to industrial Siemens controllers in the Faculty of Technical Sciences is made.
References
Asrodia P., & Patel H., Analysis of Various Packet Sniffing Tools for Network Monitoring and Analysis, International Journal of Electrical, Electronics and Computer Engineering 1(1): 55-58(2012).
BAKRE, Ajay; BADRINATH, B. R. I-TCP: Indirect TCP for mobile hosts. In: Distributed Computing Systems, 1995., Proceedings of the 15th International Conference on. IEEE, 1995. p. 136-143.
Dunaytsev, R. A., Krendzel A. V., Koucheryavy Y. A., & Harju J. J., Estimation of web traffic generated by users in home networks, Proceedings of the eighth IASTED IMSA’, Kauai, Hawaii. Retrieved from/http://www.cs.tut.fi/tlt/npg/-icefin/documents/Hawaii-427-141_Final_Manuscript. pdf, 2004.
Kahya-Özyirmidokuz E., Gezer A., & Ciflikli C., Characterization of Network Traffic Data: A Data Preprocessing and Data Mining Application, In DATA ANALYTICS 2012, The First International Conference on Data Analytics, 2012, September, pp. 18-23.
Kumar P. S., & Arumugam S., Establishing a valuable method of packet capture and packet analyzer tools in firewall, International Journal of Research Studies in Computing, 2012 April, Volume 1 Number 1, 11-20.
Paessler, Dirk. Server Virtualization and Network Management. Database and Network Journal, 2008, 38.5: 13.
Park, Daihee, et al. NetCube: a comprehensive network traffic analysis model based on multidimensional OLAP data cube. International Journal of Network Management, 2013, 23.2: 101-118.
SO-IN, Chakchai. A Survey of Network Traffic Monitoring and Analysis Tools. Cse 576m computer system analysis project, Washington University in St. Louis, 2009.
Song, Yuqian, et al. Towards a framework to support novice users in understanding and monitoring of Home Area Networks. In: Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on. IEEE, 2012. p. 82-87.
Singh G., & Singh A., Campus Network Security Policies: Problems And Its Solutions, International Journal of Innovative Research and Development, June, 2013, Vol 2 Issue 6, pp.294-306.
Stoeva, D., Challenges to Building Critical Infrastructure Policies in a Complicated Cyber Environment, Globalization, the State and the Individual, No 2(14)/2017, pp. 263-267, ISSN 2367-4555.
Stoeva, D., Security zones, Globalization, the State and the Individual, No 2(14)/2017, pp. 31-40, ISSN 2367-4555.
Venkatramulu S., & Rao C. G., Various Solutions for Address Resolution Protocol Spoofing Attacks, International Journal of Scientific and Research Publications, Volume 3, Issue 7, July 2013.
Zaefferer M., Inanir Y. S., & Karanatsios T., Intrusion Detection, University of Applied Sciences Cologne, Faculty for Informatics and Engineering, Gummersbach, February 2012.
Zagorcheva, D., Model of relationships in the management of educational institutions, SocioBrains, Issue 82/2021, pp. 58-64, Journal homepage: www.sociobrains.com, ISSN 2367-5721 (online).
Zagorcheva, D., Pavlov, D., The need for elaboration of a new economic model for business environment analysis, Journal in Entrepreneurship and Innovation, Ruse, 2017, ISSN 1311-3321, с.19-27.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 JOURNAL SCIENTIFIC AND APPLIED RESEARCH
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.