The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Our network infrastructure is exposed to persistent threats of DDoS and many unknown attacks. These threats threaten the availability of ISP's network and services. This paper proposes network-based anomalous traffic detection method and presents an anomalous traffic detection system, its architecture and main function blocks. Every five minutes, traffic information and security events are gathered...
We discuss the need for adaptive load control in network security environments in order to cope with the increasing bandwidth requirements. In earlier work, we developed a simple model to study the behavior of feedback loops for self-configuring security environments. We primarily considered the traffic between the monitoring probes, the IDS systems, and associated firewalls. We now enhanced the model...
Security of wireless sensor networks (WSN) has become one of the hottest areas. However, insufficiency of memory and battery power of sensors makes sensor networks vulnerable to be attacked. As a second line of defense, intrusion detection system (IDS) is one useful method defending against attacks. In present literatures, most of IDS models in WSN are static IDS (SIDS), which have inherent disadvantages...
Ensuring security of the infrastructure against external attacks across network boundaries constitutes one of primary attributes as well as challenges of the next generation mobile network (NGMN). To allay the possibility of such attacks emancipating the NGMN architecture, it is necessary to identify the attack types. However, detection of the attack types from various traffic flows (as is the case...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.