The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The article issue is the enterprise information protection within the internet of things concept. The aim of research is to develop arrangements set to ensure secure enterprise IPv6 network operating. The object of research is the enterprise IPv6 network. The subject of research is modern switching equipment as a tool to ensure network protection. The research task is to prioritize functioning of...
Recent years people have witnessed a surge of interest in APT attack, due to its complex and persistent attack characteristics. In order to prevent APT attacks, this article studies and analyzes a large number of APT attack cases which have been disclosed, gives an overview of APT attack lifecycle and attack techniques. This paper discusses the purposes of APT attacks and APT attack characteristics...
in this work, SDN has been utilized to alleviate and eliminate the problem of ARP poisoning attack. This attack is the underlying infrastructure for many other network attacks, such as, man in the middle, denial of service and session hijacking. In this paper we propose a new algorithm to resolve the problem of ARP spoofing. The algorithm can be applied in two different scenarios. The two scenarios...
The Internet is a notoriously two-way street. If multiple computers can communicate sensitive data across the Internet, malicious entities can access the network and collect this data also. The range and number of connected devices is increasing dramatically and with this expansion so is the security risk. Collection of ever rising quantities of data, especially sensitive and personal data, raises...
In recent years, Botnets have become an important security problem on the Internet. Botnets have been used for many attacks, such as banking information theft, spam, distributed denial-of-service, identity theft and phishing. Then, they have been proposed as a major research topic in the network security. Although there are several surveys on the Botnets, they usually do not include a complete review...
Network forensic is a offset of digital forensics used for the monitoring and analysis of computer network traffic intended for collecting information, lawful proof against illegal activity, or intrusion detection in the network. Network examination manage unstable and persuasive data. Network traffic movement is spread and afterward lost, so organize legal sciences is frequently a devoted examination...
Honeynet represents a new strategy in defending the computer networks and systems against unauthorized access or hacking attempts. Not only it can detect and display the attack pattern or the tools utilized, it can also help in eliminating access to real systems by representing an emulation of the physical systems and services present within the network, thus delaying or confusing the intruder. In...
After careful consideration of security problems of WiMAX network and based on the specification of the WiMAX itself, in this paper we have taken a novel approach to these issues by designing a WiMAX-based energy efficient intrusion detection system that has better performance and is more efficient. Our investigations indicate that this intrusion detection system can provide both an acceptable application...
Network architecture with its security is a growing concern in the present time. A campus network faces challenges to address core issues of security which are governed by network architecture. This paper is mainly targeted towards campus networks which deliver required security. This is essential because, it prevents the institution from suffering any significant attacks associated with network....
With the rapid development of computer network technology, the security of computer network becomes increasingly important. Three main threats facing computer network security include: hackers, computer virus and denial of service attack. Things leading to the safety of the network are mainly: resources sharing, data communication, computer virus and TCP/IP protocol security flaws. A safety network...
This paper analyzes the basic principle of buffer overflow, and describes the basic methods of using the buffer overflow to attack the computer system. Through two sections of programs, this paper shows the process of the buffer overflow and its attacking actions in details. At last, several effective countermeasures to avoid the buffer overflow attacks are discussed.
The school network as the important infrastructure plays many roles such as school teaching, research, management and foreign exchange, and so on. School network directly affects the security situation in the school's teaching activities. In the early stages of the network, security may not be prominent. With the deeply application, various data online in the school network will increase sharply,...
Computer network and communication technology have already been widely used in all aspects of our daily life, but the network security problem is getting more and more prominent, while the network wiretap is one of the biggest challenges of the network security. With the security problem caused by network wiretap becoming more serious, how to monitor the network wiretaps has been the primary problem...
Due to amazing development of network technology and increasing prevalence of network application, network is bound to penetrate into various arenas of social life. Naturally, as a significant infrastructure in colleges and universities, CAN is supposed to develop with high speed for the purpose of innovating education, elevating system of administration and teaching quality. However, security of...
Network filters are designed and deployed to enforce restrictions for a variety of political, social, economical or merely security reasons. However, network filters can potentially be violated by attackers and thus may not be completely adequate to fulfill their tasks. This paper approaches the network filtering from a software engineering perspective by utilizing an automated method to analyze the...
This research presents a technique to protect computer networks communication by modifying communication protocol identifier. The main advantage of this technique is preventing "man in the middle" meddling from reconstructing sessions from collected data. Consequently, this approach can overcome seamless attacks performed by passive tapping and nonintrusive data captu ring techniques.
In the context of the SysSec Network of Excellence call for consolidating the European (and international) systems security research community, this position paper aims at summarizing the current research activities in the Communication Systems Group (CSG) of ETH Zurich relating to network security. Our research is aligned along three projects: 1) identifying, validating, and characterizing computer...
A network security situation awareness model based on cooperative artificial immune system is discussed in this paper. In this model, efficient memory detectors in different computers can share the differences and improve the coverage and scalability of AIS. These detectors spread in the whole system can be organized by a cooperative channel. The function of the cooperative module is sending and receiving...
To resolve this issue of the documentation description and refined extent of the enhanced attack tree model, defined and formated to the type and the properties of the enhanced attack tree nodes, by the inductive analysis of the attack behavior, determined the level of abstraction of the enhanced attack tree model, achieved the format description of the attack behavior, established an effective attack...
Over recent years the depth to which we have grown to rely on networked computer systems as part of the critical national infrastructure has become ever more apparent. Concern over difficulties caused by accidental failures has led to a realisation of the potential for damage that could be caused by targeted attacks and cyber warfare. Current approaches to addressing these problems have tended to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.