The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper based on the developed information technology, computer network traffic monitoring was implemented. The developed software for traffic monitoring was described. Traffic trend forecasting based on the Ateb-functions theory was realized. Based on the results of prediction of traffic and maximum permissible load of network node for providing of quality of service the redistribution of network...
With the development of the computer network, and the great change in the demands of network management, any Network Management System is a process of development and perfection. Therefore, designing a rational system structure is the foundation to ensure the good scalability of the system. The main issues and characteristics of Network Management in Campus Network at present were analyzed in the...
This contribution presents validation results of an intuitive approach named `GrADAR' for automatically selecting response measures to DoS attacks. It creates and maintains a model of a computer network and of the availability of its resources from the observations of deployed monitoring systems. The graph-based model is able to express both the effects of DoS attacks and response measures as reactions...
Considering servers being the core position in network, this paper introduces how to monitor servers through simple network management protocol (SNMP). We expand MIB resources by defining MIB objects to monitor the resources of sever, and use multi-threading technology to collect data and process them, which can improve the collection efficiency. The experimental results prove that it is a successful...
The rapid and accurate detection of anomalies in network traffic has always been a challenging task, and is absolutely critical to the efficient operation of the network. The availability of numerous different detection algorithms makes it difficult to choose a suitable configuration. An algorithm may have a high detection rate for high rate attacks, but might behave unfavorably when faced with attacks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.