The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Web Service has been extended to the back-end database. In this paper, we propose a novel method of user behavior analysis in semantic network. We use the weight value to analyze and record user behavior and then check user behavior record with the signatures which are generated by the Intrusion Detection System (IDS). If a user record matches with signatures, the system will pass the record to...
Nowadays, due to the advantage of technology and the Internet popularization, Peer-to-Peer (P2P) computing technology has been gradually becoming the mainstream on the distributed system applications. However, the main purpose of P2P computing technology is to process the large-scale task through the distributed system computer cooperatively. Therefore, how to efficiently assign tasks to every nodes...
The electronic information despite its odds due to security implications and privacy issue cannot be ignored. The entire world has come to embrace the medium as a tool to run its daily activities both in business and information communications. Boundaries in different geographical locations and between sectors of businesses, such as products, services, channels and companies are increasingly wearing...
This paper will introduce IEEE 802.11i, the new generation of security standard for wireless local area network (WLAN), analyze 802.1x authentication and key management mechanisms, elaborate on the 4-way handshake protocol, point out the vulnerability of the protocol and the possible attack it may incur taking into consideration the actual conditions, describe a solution proposed by IEEE 802.11i,...
The purpose of this study is to identify the key security issues within the context of software based VoIP (Voice over Internet Protocol) which are engaged in the process of data exchange on the converged networks. There is no one single solution for VoIP security; it is all depended on the type of customers, existing IT environment and carriers. In order to narrow down the focus we will concentrate...
It is a well known fact that the core concepts and techniques of putting government on-line first emerged in the most technological advanced countries and they were the pioneers in the adoption of the Internet and the e-government has become a prominent strategy for government administrative reform and can potentially increase the quality of government services, generate financial savings, and improve...
The Internet worm infects the computer system, network packet, communication performance, and the traditional method of managing network using SNMP to monitor abnormal network traffic. To monitor suspicious Internet activity and to recognise the Internet worm categories, we proposed FloWorM system that can reduce the misjudgment and detection rate based on NetFlow which analyse the source data from...
The wireless LANs (WLANs) have become more prevalent and are widely deployed in many places such as corporate office conference rooms, industrial warehouses, campus, residences, cafe etc. The IEEE 802.11-based WLAN presents new challenges for network administrators and information security administrators alike. The security of a WLAN is very important, especially for applications hosting valuable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.