The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of the Internet, application programs on the web page become widespread. Information appearing on the web page has evolved from static presentation to dynamic presentation and even being interactive with the users. Some malicious users employ malicious browsing behaviors, such as flooding attack, to cause waste of resources and bandwidth of the host for the web page. Since the...
Due to the impact of the rapid popularization of Internet and e-commerce, most organizations and enterprises take great effort to protect their information systems against malicious attacks and invasions. The firewall is the most familiar method among relevant technologies for Internet security. However, the firewall systems in use today are either application software or utilities running on the...
Web servers face all kinds of users; some of them engage malicious activities to degrade or completely block network services, such as flooding attacks. As a result, lots of resource and bandwidth on web sites might be wasted. In this paper, we propose a detection method based on reverse proxy servers to detect the flooding attacks. Our proposed method can be incorporated in a priority queue-based...
A Distributed Denial-of-Service attack affects the bandwidth or resources of a targeted system. By flooding networks and disrupting access to services, it may cause damage on multimedia network services and Internet Service Providers. In the paper, we propose to analyze the behavior of packet flows and adopt a priority queue-based algorithm that assign packets from normal users to a high priority...
Intrusion detection is the means to identify the intrusive behaviors and provides useful information to intruded systems to respond fast and to avoid or reduce damages. In recent years, learning machine technology is often used as a detection method in anomaly detection. In this research, we use support vector machine as a learning method for anomaly detection, and use LibSVM as the support vector...
As most documents have been digitized and transmitted over the Internet, it becomes very crucial to protect the integrity of them. Integrity is the process of ensuring that a document is changed by unauthorized users. In this paper, inspired by the Yang and Kot's method, we proposed a novel scheme to verify the integrity of binary documents by using its digital patterns. We compute the black patterns...
In the age of Internet, it is crucial to protect the integrity of multimedia documents for its financial values. Integrity is the process of ensuring that a document is not changed by unauthorized parties. As the progress of information technology, we can protect the intellectual property right of our information assets by using digital watermarking. In this paper, inspired by the Yang and Kot's method,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.