The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid development of Internet attack has posed severe threats to information security. Therefore, it's of great interest to both the Internet security companies and researchers to develop novel methods which are capable of protecting users against new threats. However, the sources of these network attack varies. Existing malware detectors and intrusion detectors mostly treat the web logs separately...
Domain Name System (DNS) is one of the most crucial components of the Internet. However, due to the vulnerability of DNS, its security has been continuously challenged in recent years. In order to thoroughly understand the root cause of the security risks in the DNS, researches in DNS security are surveyed, and vulnerabilities in DNS and corresponding countermeasures are summarized. First, based on...
The popularity of using Internet brings some risks of network attacks. The technology of intrusion detection is an important component of network security. The traditional Intrusion Detection System (IDS) generally has the following disadvantages: the first one is that it could not detect the new type attacks even the variation of existed attacks; the second one is the detection time is so long that...
In spite of the large effort behind the development of the WBEM and CIM standards for the management of distributed systems, there has been very little work addressing security in those standards. In this paper we present a role-based access control (RBAC) policy language to render fine-grained access control policies for WBEM and CIM. The language is an extension of CIM-SPL, a preliminary DMTF policy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.