Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Computer network operation (CNO) decision making activity includes three sub-activities: mission definition, scheme design and scheme evaluation. Scheme design produces many attack schemes of the same target. During scheme evaluation, attack schemes are evaluated and the comparatively optimal one is selected as course of action (COA) based on certain criterions. In this study, a multiple criteria...
Computer networks are vulnerable to attacks, where the network infrastructure itself is targeted. Emerging router designs, which use software-programmable embedded processors, increase the vulnerability to such attacks. We present the design of a secure packet processing platform (SPPP) that can protect these router systems. We use an instruction-level monitoring system to detect deviations in processing...
This paper combines the results of research on social psychology, and has designed a trust model for rumor spreading. It is considered that when information exchanges between people, the trust of information is related to the interpersonal closeness. In addition, this paper uses Monte Carlo method to find the key source nodes in rumor spreading by comparing the total number of spread nodes and spreading...
Under intrusion or abnormal attack, how to autonomously supply service, without being degraded, to users is the ultimate goal of network security technology. Based on Martingale Difference Approximation principle, a System Service Optimization Model (MDAO) is proposed. According to the prior self optimizing knowledge and parameter information of inner environment, MDAO searches the convergence trend...
We perform a game theoretic investigation of the effects of deception on the interactions between an attacker and a defender of a computer network. The defender can employ camouflage by either disguising a normal system as a honeypot, or by disguising a honeypot as a normal system. We model the interactions between defender and attacker using a signaling game, a non-cooperative two player dynamic...
To address the scalability problem in attack graphs generation, we propose a novel method to generate attack graphs automatically. Our approach constructs a two- tier attack graph framework, which includes a host access graph and some sub-attack graphs. A sub-attack graph describes concrete attack scenarios from one source host to one target host, while the host access graph describes the attacker's...
The botnet construction mechanism (BCM) is one of the key technologies of the botnets and the most important issue to both the attackers and the defenders. To the best of our knowledge, although the BCM has been mentioned in many researching papers, it has not been systemically studied. In this paper, we attempt to discuss the BCM methodically. We first give both the definition and its formalized...
Computer networks are one of those unique gifts of modern science which enriched human life with the blessing of global connectivity. But as the network advanced, intrusions and misuses followed. Consequently, network security has come into issue. Now-a-days intrusion detection systems have become a standard component in security infrastructures. Intrusions typically start with intruders infiltrating...
With the multiplication of attacks on computer networks, system administrators need to monitor carefully the networks. But all the techniques or tools that they use still heavily rely on human detection. In this paper a visual interactive network connection system called NetViewer is designed in 3D view for representing traffic activities that reside in network flows and their patterns. The experiments...
Intrusion detection systems (IDS) and intrusion prevention systems (IPS) are now considered a mainstream security technology. IDS and IPS are designed to identify security breaches. However, one of the most important problems with current IDS and IPS is the lack of the ldquoenvironmental awarenessrdquo (i.e. security policy, network topology and software). This ignorance triggers many false positives...
With the progression of time, we have been blessed with the gifts of science. Computer networks are one of those gifts. But as the network proceeded, intrusions and misuses followed. Consequently, network security has come to the fore front and has become one of the most important issues. Now-a-days intrusion detection systems have become a standard component in security infrastructures. Intrusions...
Network security management plays a crucial role in protecting organization assets and its computer infrastructure by identifying an effective control that reduces the risk of attacks and failures. Network risk assessment is a subjective process that is affected by multiple distinctive variables. These variables are associated with the organization assets and their impact on the health of the organization...
Intrusion detection system will produce large numbers of alerts, most of which are fasle positives. This paper wants to associate multiple intrusion detection systems in large-scale network to reduce overwhelming false alerts and discover real security events in real time. For processing these alerts, two algrithms named reduce and cluster will be developed in this paper, which can remove false alerts...
This paper presents a taxonomy of anomaly detection techniques that is then used to survey and classify a number of research prototypes and commercial products. Commercial products and solutions based anomaly detection techniques are beginning to establish themselves in mainstream security solutions alongside firewalls, intrusion prevention systems and network monitoring solutions. These solutions...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Outlier deTector (SPOT), to deal with the problem of anomaly detection from high-dimensional data streams. We conduct a case study of SPOT in this paper by deploying it on 1999 KDD Intrusion Detection application. Innovative approaches for training...
The following topics are dealt with: knowledge management, reasoning, neural networks, and evolutionary programming; image processing and pattern recognition; machine learning and data mining; natural language processing and speech recognition; information retrieval; multi-agent systems and ontologies; bioinformatics and medical applications; intelligent tutoring systems; formal languages and automations;...
The following topics are dealt with: computer engineering and systems; computer architecture; computer aided design; control systems; embedded systems; hardware-software codesign; computer networks and security; signal processing; multimedia; Web applications; mobile and ubiquitous computing; artificial intelligence; evolutionary computing; database and data mining
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.