The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Our network infrastructure is exposed to persistent threats of DDoS and many unknown attacks. These threats threaten the availability of ISP's network and services. This paper proposes network-based anomalous traffic detection method and presents an anomalous traffic detection system, its architecture and main function blocks. Every five minutes, traffic information and security events are gathered...
We present an optimization technique for model-based generation of test cases for firewalls. Starting from a formal model for firewall policies in higher-order logic, we derive a collection of semantics-preserving policy transformation rules and an algorithm that optimizes the specification with respect of the number of test cases required for path coverage. The correctness of the rules and the algorithm...
Computer networks are typically a shared resource used by many applications for many different purposes. Sometimes the data transmitted between application processes is confidential, and the application users would prefer that others not be able to read it. A firewall is a specially programmed router that sits between a site and the rest of the network. It is a router in the sense that it is connected...
Computer networks are vulnerable to attacks, where the network infrastructure itself is targeted. Emerging router designs, which use software-programmable embedded processors, increase the vulnerability to such attacks. We present the design of a secure packet processing platform (SPPP) that can protect these router systems. We use an instruction-level monitoring system to detect deviations in processing...
File sharing is a common practice since the introduction of computer networks. It involves using technology that allows network users to share files that are stored on their individual computers. Peer-to-peer or simply P2P applications, such as those used to share multimedia files, are some of the most common forms of file-sharing technology. However, P2P applications are vulnerable to security risks...
This paper presents a model of intelligent content filtering model to resolve the current network security audit system in filtering the information deficiency. First of all, in accordance with the characteristics of network security audit system, as well as the advantages and disadvantages of content filtering methods commonly, this paper choose suitable filter method, and then, optimize the filter...
In order to monitor network transmission effectively and safely and detect suspicious behavior in the network, the intrusion detection software was solidified in embedded hardware development board based on the SBC84620. The system adopted real-time Linux operating system used in the field of industrial widely, achieved real-time detection and prevention to hacking attack including port scans, buffer...
The rapid development of computer network sets off a global wave of enterprise informatization. Enterprisespsila cross-regional telecommuting and internal information sharing platform are more and more dependent on the networks. However, the Internetpsilas open communication protocol and the limitations of the original design lead to increasingly serious problem of Internet security, and it caused...
The electronic commerce is studied from the security issue. Based on the relationships of e-commerce security and computer network security, an e-commerce security model is presented. Then aiming at the different application environments of B2B, B2C and C2C, the research status and existing problems of the e-commerce security support technologies are reviewed. Finally, the further researches are suggested.
Advances in Digital Technology have presented new challenges to both Industry and Law. Technology security experts are enhancing platforms security to protect enterprise and government from intrusions, whereas legal experts are adopting new techniques to investigate ldquoillegalrdquo breaches to systems and networks. This paper provides an overview of Digital Forensics methodologies, computer and...
Availability is one of the main characteristics of Internet security and hence attacks against networks increase trying to stop services on servers. Distributed denial of service attacks are very dangerous for computer networks and services availability. Various defense systems were proposed. Unfortunately, until now, there is no efficient solution. This paper presents a decentralized architecture...
The following topics are dealt with: Internet; network architecture; Web services; security; wireless sensor network; data management; data modelling; networked sensing system; reliability; social responsibility; grid computing middleware; Web-supported learning communities; ubiquitous networking; and mobile systems.
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Outlier deTector (SPOT), to deal with the problem of anomaly detection from high-dimensional data streams. We conduct a case study of SPOT in this paper by deploying it on 1999 KDD Intrusion Detection application. Innovative approaches for training...
Computer system security evaluation by using mean time-to-compromise criteria is presented in this paper. The outcome of the attack highly depends on the attacker skill level. The attacker skill level distribution must be estimated, normal skill level distribution in the skill group is suggested in the model. The article concludes with simulation results and evaluation of the chosen attacker skill...
The following topics are dealt with: computer engineering and systems; computer architecture; computer aided design; control systems; embedded systems; hardware-software codesign; computer networks and security; signal processing; multimedia; Web applications; mobile and ubiquitous computing; artificial intelligence; evolutionary computing; database and data mining
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.