Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
With the development of the Internet, application programs on the web page become widespread. Information appearing on the web page has evolved from static presentation to dynamic presentation and even being interactive with the users. Some malicious users employ malicious browsing behaviors, such as flooding attack, to cause waste of resources and bandwidth of the host for the web page. Since the...
Due to the impact of the rapid popularization of Internet and e-commerce, most organizations and enterprises take great effort to protect their information systems against malicious attacks and invasions. The firewall is the most familiar method among relevant technologies for Internet security. However, the firewall systems in use today are either application software or utilities running on the...
Web servers face all kinds of users; some of them engage malicious activities to degrade or completely block network services, such as flooding attacks. As a result, lots of resource and bandwidth on web sites might be wasted. In this paper, we propose a detection method based on reverse proxy servers to detect the flooding attacks. Our proposed method can be incorporated in a priority queue-based...
A Distributed Denial-of-Service attack affects the bandwidth or resources of a targeted system. By flooding networks and disrupting access to services, it may cause damage on multimedia network services and Internet Service Providers. In the paper, we propose to analyze the behavior of packet flows and adopt a priority queue-based algorithm that assign packets from normal users to a high priority...
Intrusion detection is the means to identify the intrusive behaviors and provides useful information to intruded systems to respond fast and to avoid or reduce damages. In recent years, learning machine technology is often used as a detection method in anomaly detection. In this research, we use support vector machine as a learning method for anomaly detection, and use LibSVM as the support vector...
As most documents have been digitized and transmitted over the Internet, it becomes very crucial to protect the integrity of them. Integrity is the process of ensuring that a document is changed by unauthorized users. In this paper, inspired by the Yang and Kot's method, we proposed a novel scheme to verify the integrity of binary documents by using its digital patterns. We compute the black patterns...
In the age of Internet, it is crucial to protect the integrity of multimedia documents for its financial values. Integrity is the process of ensuring that a document is not changed by unauthorized parties. As the progress of information technology, we can protect the intellectual property right of our information assets by using digital watermarking. In this paper, inspired by the Yang and Kot's method,...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.