The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper based on the developed information technology, computer network traffic monitoring was implemented. The developed software for traffic monitoring was described. Traffic trend forecasting based on the Ateb-functions theory was realized. Based on the results of prediction of traffic and maximum permissible load of network node for providing of quality of service the redistribution of network...
Method of proactive detection of faults in computer networks is proposed. For this purpose apply testing states of computer network components with Bayesian belief networks. This approach can be used for procedure of proactive detecting faults of computer network component. Method can be implemented in program application for detect faults in corporate computer networks.
This research presents a technique to protect computer networks communication by modifying communication protocol identifier. The main advantage of this technique is preventing "man in the middle" meddling from reconstructing sessions from collected data. Consequently, this approach can overcome seamless attacks performed by passive tapping and nonintrusive data captu ring techniques.
Computer network is playing an active role in modern business management in power system. Nowadays, information power industry develops rapidely, highlighting the growing importance of information security, and the challenges are increasingly serious. This paper analyzes security risks in power enterprise network and proposes specific corresponding strategies.
This article deals with several kernel technologies applied in vehicle information service. The technology referring to GPS (Global Positioning System), GPRS (General Packet Radio Service), GIS (Geographical Information System), and Computer Network etc, as we have studied, is believed to be able to construct a Vehicle Information Service System which faces the public. Synthesizing the technologies...
We introduce a sensor network to measure the individual power consumption of a large number of network elements in near-real time. A main application of this system is to obtain profiles of the power usage of network elements, i.e., a parameterization of power consumption with respect to workload. We discuss the design and implementation of both hardware and software aspects of the system as well...
Intrusion detection (ID) is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromise the confidentiality, integrity, availability, or to bypass the security mechanisms of a computer or network. Internet services, and the number of Internet users increases every day this makes networks as a window for...
This experiment is based on the theory of process-oriented approach from social cognitive psychology perspective and the theories of genre analysis from the angle of functional linguistics and social-linguistics. It is a practical research which aims for the teaching reform of English writing at the college level in China. It has been implemented in the last four years, which is a continuation of...
Assessment for computer network attack is a technology for assessing hostile attacks against computer network system. In the paper, relevance vector machine is applied to assessment for computer network attack. Compared with support vector machine assessment method, the RVM method can provide better classification accuracy. The experimental data collected in the paper include U2R attack, R2L attack,...
Traffic monitoring and analysis is of critical importance for managing and designing modern computer networks, and constitutes nowadays a very active research field. In most of their studies, researchers use techniques and tools that follow a statistical approach to obtain a deeper knowledge about the traffic behaviour. Network administrators also find great value in statistical analysis tools. Many...
Currently, there are three mainly ways (auction, bidding and listing) to pay for the using of state-owned land which differ in their characteristics and the scope of application as well as some inevitable drawbacks. Under such circumstances, government's ability to regulate and control the land market is relatively weak. In view of the above shortcomings, we introduce a new land auction in this paper,...
With the development of the computer network, and the great change in the demands of network management, any Network Management System is a process of development and perfection. Therefore, designing a rational system structure is the foundation to ensure the good scalability of the system. The main issues and characteristics of Network Management in Campus Network at present were analyzed in the...
Computer networks are vulnerable to attacks, where the network infrastructure itself is targeted. Emerging router designs, which use software-programmable embedded processors, increase the vulnerability to such attacks. We present the design of a secure packet processing platform (SPPP) that can protect these router systems. We use an instruction-level monitoring system to detect deviations in processing...
This contribution presents validation results of an intuitive approach named `GrADAR' for automatically selecting response measures to DoS attacks. It creates and maintains a model of a computer network and of the availability of its resources from the observations of deployed monitoring systems. The graph-based model is able to express both the effects of DoS attacks and response measures as reactions...
This paper presents a novel approach to detecting worms based on particle filter. The approach collects data through honeynet and uses CUSUM to detect the abnormal changes of counts of packet source address in a t sampling. If the change rate exceeds a certain threshold, it will activate particle filter to estimate its growth rate in order to confirm the existence of worms. The experimental results...
Autonomic network management is viewed as the capability of network entities to self-government, which frees IT professionals from time-consuming and tedious configuration tasks. Hence, IT professionals can focus on high level management (business goals, for example). In this paper, we propose an approach of agent-based architecture for autonomic networking on the basis of Motorola's FOCALE architecture...
The security tools for the computer systems and networks require additional hardware/software resources and, therefore, significantly slow down information processing in the network. Thus, the safety control in the modern computer networks requires an adjustable security tool which runs in a real-time mode. The paper gives a comparative analysis of methods and tools for safety control in the computer...
The computer network represented by Internet breaks through time and space limits and regional obstacles of traditional communication modes and makes a wider communication become very easy. And meanwhile, the continuous introduction of network interconnection devices with high performance, high reliability and low cost, such as gateway, router, repeater and network interface chip, etc, also makes...
Computer power management features - standard in Windows and Macintosh operating systems - place monitors and computers (CPU, hard drive, etc.) into low-power ldquosleep modesrdquo after a period of inactivity. Simply touching the mouse or keyboard ldquowakesrdquo the computer and monitor in seconds. While monitors are often configured to sleep, unfortunately fewer than 10% of US-based computers are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.