The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The frequency and the extent of damages caused by network attacks have been actually increasing greatly in recent years, although many approaches to avoiding and detecting attacks have been proposed in the community of network security. Thus, how to fast detect actual or potential attacks has become an urgent issue. Among the detection strategies, behavior-based ones, which use normal access patterns...
DHCP starvation attack is one of problems that has occured over the network communication. A number of researches have been proposed to solve this problem. However, traditional solutions had some limitation which can lead to denial of service to legitimate users. This paper proposed the solution for detecting the abnormal DHCPREQUEST originated by malicious users in a period of time in order to prevent...
To increase the security of network system, we propose a network security situation awareness method based on intercepting the threat spread. This method firstly merges security data from different sensors to get the normalization data of network nodes, threats and vulnerability. And secondly, the method intercepts the threat spread by the normalization data. Finally, the method constructs the game...
Network architecture with its security is a growing concern in the present time. A campus network faces challenges to address core issues of security which are governed by network architecture. This paper is mainly targeted towards campus networks which deliver required security. This is essential because, it prevents the institution from suffering any significant attacks associated with network....
CAPTCHA (also known as verification code) is mainly used to guarantee the login security of the interactive websites. At present, the most popular verification code is image CAPTCHA which can distinguish the human user from the computer by identifying characters in the image. Although the image CAPTCHA is safe at beginning, great deals of CAPTCHAs have been cracked by the computers along with the...
Security is one of the important P2P storage cloud issues. RCM (the Resource Chain Model) is a trust model for the security. One problem of RCM for P2P storage cloud to be considered is which the best path is for each neighbor. Usually, for each neighbor, it is possible to get more than one resource path and such resource paths can be good candidates for use. The most widely used and easiest tree...
In this paper, the recent research on secure transmission of network coding in wireless networks is reviewed. Security risks have become a major problem to the development of wireless networks, and network coding is the development trend of next generation secure networks. Firstly, the brief concept of network coding is introduced. Secondly, up to date related research on secure network coding in...
This paper analyzes the basic principle of buffer overflow, and describes the basic methods of using the buffer overflow to attack the computer system. Through two sections of programs, this paper shows the process of the buffer overflow and its attacking actions in details. At last, several effective countermeasures to avoid the buffer overflow attacks are discussed.
The school network as the important infrastructure plays many roles such as school teaching, research, management and foreign exchange, and so on. School network directly affects the security situation in the school's teaching activities. In the early stages of the network, security may not be prominent. With the deeply application, various data online in the school network will increase sharply,...
Security is an important concern in Voice over IP (VoIP) applications. An approach to securing the signaling, such as the Session Initiation Protocol (SIP) and Location to Service Translation (LoST) messages, is to use Transport Layer Security (TLS). Several studies have measured the impact of using TLS on SIP. However, there have not been any tests on the impact of TLS or Internet Protocol Security...
Network security has become a growing challenge in academic institutions. Higher education institutions are beginning to look at areas to improve the protection of their information technology structure due to the increase of viruses, spam, hackers, and identity theft. Educational institutions have the highest vulnerability to network security threats. Open access admission to college allows for open...
With the development of internet and information technology network security has become the hot spots of computer science. Effective monitoring operational status of every equipment is very important in the Local Area Network (LAN). This paper studies key techniques for monitoring LAN, such as process automatic loading and hidden, network covert communications, network data secure transmission, to...
Computer network and communication technology have already been widely used in all aspects of our daily life, but the network security problem is getting more and more prominent, while the network wiretap is one of the biggest challenges of the network security. With the security problem caused by network wiretap becoming more serious, how to monitor the network wiretaps has been the primary problem...
Based on EIR's MS (mobile station) legality control ability, discuss on how to improved mobile communication network security. Innovative ideas are proposed to enhance network security. Indicate the role of EIR deployment in communication network security.
Analyze the characteristics of network security courses and the use of task-driven teaching practical significance. Discuss the detailes to carry out all aspects of curriculum, including classroom teaching, task-driven experimental procedures, evaluation system of the re-establishment and task-driven implementation of teaching effectiveness.
Due to amazing development of network technology and increasing prevalence of network application, network is bound to penetrate into various arenas of social life. Naturally, as a significant infrastructure in colleges and universities, CAN is supposed to develop with high speed for the purpose of innovating education, elevating system of administration and teaching quality. However, security of...
To resolve this issue of the documentation description and refined extent of the enhanced attack tree model, defined and formated to the type and the properties of the enhanced attack tree nodes, by the inductive analysis of the attack behavior, determined the level of abstraction of the enhanced attack tree model, achieved the format description of the attack behavior, established an effective attack...
With the development and application of network technology, the issues of network security has become prominent increasingly. Network security risk assessment has become the key process in solve network security. Support Vector Machine(SVM)is one of novel learning machine methods, its advantages are simple structure, strong compatibility, global optimization, least raining time and better generalization...
With the quick development of computer network, the network scale in school campus has been keeping on expanding. Therefore, security problems of network become a focus of research, a well-operated network management becomes the key issue for a normal and effective school campus network This article mainly analyzes the problems and solutions of the campus E-government network security, studies the...
Security always comes with a price in terms of performance degradation, which should be carefully quantified. This is especially the case for wireless ad hoc networks (WANETs), which offer communications over a shared wireless channel without any preexisting infrastructure. Forming end-to-end secure paths in such WANETs is more challenging than in conventional networks due to the lack of central authorities,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.