The post Gerçek kişisel bilgiler kullanılmadan oluşturulmuş profiller appeared first on DOKURER.NET.
]]>The post Gerçek kişisel bilgiler kullanılmadan oluşturulmuş profiller appeared first on DOKURER.NET.
]]>The post Facebook çılgınlığı appeared first on DOKURER.NET.
]]>The post Facebook çılgınlığı appeared first on DOKURER.NET.
]]>The post Deep Freeze Adli Bilişim İncelemesi appeared first on DOKURER.NET.
]]>The post Deep Freeze Adli Bilişim İncelemesi appeared first on DOKURER.NET.
]]>The post IstSec’09 İstanbul Bilgi Güvenliği Konferansı appeared first on DOKURER.NET.
]]>The post IstSec’09 İstanbul Bilgi Güvenliği Konferansı appeared first on DOKURER.NET.
]]>The post Adli Tıp Kurumundan Bilişim Suçları Atağı appeared first on DOKURER.NET.
]]>The post Adli Tıp Kurumundan Bilişim Suçları Atağı appeared first on DOKURER.NET.
]]>The post Adli Bilişim Sözlüğünde Güncelleme appeared first on DOKURER.NET.
]]>The post Adli Bilişim Sözlüğünde Güncelleme appeared first on DOKURER.NET.
]]>The post Encase 6.14.1 yayınlandı appeared first on DOKURER.NET.
]]>Encase’in en son sürümü 6.14.1 yayınlandı. Kurmadan evvel Encase ürün verisiyonu uyumluluğu tablosunu kontrol ediniz.
The post Encase 6.14.1 yayınlandı appeared first on DOKURER.NET.
]]>The post Black Hole Attack in Wireless Ad-Hoc Networks appeared first on DOKURER.NET.
]]>One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur.
There are lots of detection and defense mechanisms to eliminate the intruder that carry out the black hole attack. In this work, we simulated the black hole attack in various wireless ad-hoc network scenarios and have tried to find a response system in simulations.
The below links are prepared for the student who wants to study about security in Wireless Ad-hoc Networks and coders who write in NS2. You can learn how we implement a new Protocol to Ad-hoc Wireless Network in NS2 with master thesis. In the Journal, there are detailed results about the subject. The C++ Code of the Black Hole Attack and the Intrusion Detection System are in the below links. You can implement the codes, fallowing the steps in the master thesis.
* Upon request, I add below the files, Blackhole and Greyhole attack with IDS solution protocols for NS2. You can not compile ns2 putting these files under appropriate folder in NS2. These files dont work as you change whole ns2 according to the information at thesis.
In addition, Cygwin (and the other Linux versions) and NS2 is not installed no longer in my computer. So that, I cant answer, your request about installation error. To understand the error you encountered, I need to analyze the codes. And also, I compile the codes in NS 2.6 under Cygwin. Same code may give error in other versions. This is my request, please dont ask me the errors you encountered.
Content | Link |
---|---|
Master Thesis | [Abstract] [Özet] Simulation of Black Hole Attack in Wireless Ad-Hoc Network |
Southeastcon Journal | Performance analysis of ad hoc networks under black hole attacks |
C++ Code | “Black Hole Attack to AODV Network” in NS2 File size: 36.219 bytes MD5: d30b7c6a6047607d7afe80a2df35e8d5 |
C++ Code | “IDS Solution for Black Hole Attack” in NS2 File size: 35.459 bytes MD5: ef8a95e32d74b48c2fe1e5706a3fa304 |
Zip file | “Black Hole Attack” in NS2 File size: 46.696 bytes MD5: a9fe75f1d3d361aa9745445aa8f606e3 |
Zip file | “Grey Hole Attack” in NS2 File size: 37.850 bytes MD5: 775a99740b8f185a15c5655f76b67c40 |
Zip file | “IDS Solution for Black Hole Attack” in NS2 File size: 45.835 bytes MD5: dc5b7502d58cfaaeb62789d5795e9fa8 |
The post Black Hole Attack in Wireless Ad-Hoc Networks appeared first on DOKURER.NET.
]]>The post Adli Bilişim Sözlüğü appeared first on DOKURER.NET.
]]>English | Türkçe |
---|---|
Interface | Ara yüzey |
Hard disc | Sabit disk |
Floppy disc | Disket |
Removable memory | Taşınabilir bellek |
Formating | Biçimlendirme |
Low level format | Alt seviye biçimlendirme |
Mid level format | Orta seviye biçimlendirme |
High level format | Üst seviye biçimlendirme |
Reinitializing | Tekrardan ilkelendirmek |
Operating system | İşletim sistemi |
File sistem | Dosya sistemi |
Boot | |
Sector | Sektör |
Track | İz |
Head | Kafa |
Cylinder | Silindir |
Bad sector | Bozuk sektör |
Data | Veri |
Bit | İkil |
Byte | Sekiz ikil |
Zoned recording | Bölümlendirilmiş kayıt |
Wipe | Süpürme |
Zero-fill | Sıfırla doldurma |
Partition | Bölümlendirme |
Removeble memory | Taşınabilir hafıza |
Platter | Plak |
Root | Kök |
Directory | Dizin |
Folder | Klasör |
Cluster | Sektör kümesi |
Spindle | Mil |
Unallocated cluster | Atanmamıþ sektörler kümesi |
Allocated | Atanmış sektörler kümesi |
Chip | Yonga |
Jumper | Bağlanyı teli |
Internet browser | İnternet tarayıcısı |
Unicode | Evrensel kod |
Spindle speed | Motor devir hızı |
Spin-up time | Devir alma süresi |
Seek time | Arama süresi |
Rotational latency | Devirsel bekleme |
Disc access time | Disk erişim süresi |
Remapped | Tekrar eşleme |
File allocation table | Dosya tahsis tablosu |
Directory structure | Klasör yapısı |
Meta data | Ön veri |
The post Adli Bilişim Sözlüğü appeared first on DOKURER.NET.
]]>