The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of database technology and the popularity of Internet, the database applications have been increasingly widespread; we must face on some serious database security. The database system is the aggregates of the message, and it is the core components of the computer message system. The security of database is very important; it is related to the success of enterprise and national...
This paper described the current network of primary language XML in network applications, introduced its own XML language features and development to illustrate aspects of XML technology in the application of network security and significance. The network security is a systems engineering which is need to carefully consider the security needs of the system, and a variety of security technologies,...
Network intrusion detection is one of the hottest research issues on the network security recently. In the paper, three kinds intrusion detection model are introduced. By using Bayesian methods, Fuzzy Decision Engine and Immunity-Based Model, we can improve the performance of intrusion detection system and effectively reduce the false positive alarm. Based on the three models, some drawbacks of NIDS...
Situational assessment is significant for host-level security. Most existing approaches are generally limited to network security that is different from host-level security. In this paper, we introduce an approach to assess host security. Analyzing process and file behaviors, we propose a series of security indices, based on which we compute the value of process situation (PS) and file situation (FS)...
In the Age of Information, network education pays more attention to the application of IT technology and the training of talents, which makes learning more of customization and of opening up. In order to better enable learners to go beyond the limitations of space and time to acquire knowledge; in order to provide excellent learning environment for greater freedom and greater choice of learning activities...
Networks are protected using many firewalls and encryption software's. But many of them are not sufficient and effective. Most intrusion detection systems for mobile ad hoc networks are focusing on either routing protocols or its efficiency, but it fails to address the security issues. Some of the nodes may be selfish, for example, by not forwarding the packets to the destination, thereby saving the...
Recently the concern about network security has been increasing rapidly, certain malicious programs like Trojan horses are highly hazardous to the Internet security. In this paper, we firstly discuss the current research and developing trend to anti-Trojan approach on behavioral analysis. Moreover the behavioral features of Trojan at the stage of installation will be analyzed and summarized. Further...
Distributed denial of service (DDoS) attack is one of the latest and most powerful threats that have appeared to the Internet. The main aim of such attacks is to prevent access to resources by legitimate users for which they have authorization. In this paper, a novel flow-volume based DDoS detection approach (FVBA) is proposed, which deals with detection of variety of DDoS attacks by monitoring the...
Denial of service attacks constitute one of the greatest problem in network security. Monitoring traffic is one of the main techniques used in order to find out the existence of possible outliers in the traffic patterns. In this paper, we propose an approach that detects denial of service attacks using emergent self-organizing maps. The approach is based on classifying "normal" traffic against...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.