Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Network monitoring is an important method of network management and preserving safe operation. This paper presents a switched LAN (local area network) monitor mechanism based on ARP spoofing. Using WinPcap library function to capture the packets in switched LAN, the method contributes to the follow-up data analysis and detection of attack. Experimental data and analysis results show the effectiveness...
Trust management techniques must be adapted to the unique needs of the system architectures and problem domains to which they are applied. Certain characteristics of swarms, such as their lightweight, ephemeral nature and indirect communication, make this adaptation especially challenging. In this paper we look at the trust issues and opportunities in swarm-based autonomic computing systems and find...
The major technical objectives of the RC-NSPES are to provide a framework for the concurrent operation of reactive and pro-active security functions to deliver efficient and optimised intrusion detection schemes as well as enhanced and highly correlated rule sets for more effective alerts management and root-cause analysis. The design and implementation of the RC-NSPES solution includes a number of...
We present an architecture for self-configuration of network entities for QoS and Security, based on the health of the network. In the architecture, we firstly present a novel data collection mechanism that integrates various network inputs such as flow data, packet data and SNMP values. Secondly we present our analysis of these inputs based on QoS and Security aspects and discuss analysis mechanisms...
Increasingly, a computer network administrator's job is pre-occupied with user behavioral problems rather than physical failures of network and system components. A small number of malicious users can cause problems that affect a large number of users; more often, by not following proper procedures a user may let his/her system be used by malicious users; and there are various other misuses that all...
The advances of network technology bring many more kinds of network form, such as SDH network, PON network, video network, power network and so on. On the one hand it leads to the network complication and on the other hand also puts forward higher requirement on business network management system. Database-centric network management would improve network security and reliability; provide effective,...
As a opening global network, Internet now is facing more and more attacks and complex methods of attack, which causes the network security problem becoming the focal point that people pay attention to.The single firewall strategy can not satisfy the need of network security, intrusion detection system which is used at present has very high rate of false alarm. However, intrusion detection system based...
Using high-level security policy rules to regulate low-level system, the security management system with a high level of expansibility and flexibility was made. For purpose of managing network security policy duly and flexibly in the complex network environment, and resolving its issue efficiency, a dynamic and self-adaptive security policy realization mechanism is proposed. The accident monitor and...
Firewalls are important elements in today's network security. This paper presents a flexible policy-based firewall management framework. The framework provides policy-based management to manage different types of firewalls, such as packet filter firewall, application layer firewall. It is important to know whether the firewall policy configuration and enforcement is correct. We believe that there...
Recent development of microgrids in power systems, introduction of open access competition by governments in electricity industries, and increased use of network-controlled devices in power systems have resulted utilities in a greater reliance on computer networks for proper power-grid operations. This paper proposes a new network access control strategy and role-based model to increase the power-grid...
Operations of electricity power systems have recently become more intricate due to development of microgrids, execution of open access competition, and use of network-controlled devices, etc. Computer networks therefore turn into an integral component of modern power-grid operations. This paper proposes a new utility computer network security management and authentication for actions / commands requests...
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variable properties, like Denial of Service (DoS). The proposed architecture performs dynamic and adaptive clustering of the network traffic for taking fast and effective countermeasures against such high-volume attacks. INIDS...
Peer-to-peer file-sharing systems have gained tremendous popularity in the past few years. More users are continually joining such systems and more objects are being made available, seducing even more users to join. Today, the traffic generated by P2P systems accounts for a major fraction of the Internet traffic and is bound to increase. An accurate mapping of traffic to their applications can be...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.