A Survey on Computer and Network Security Attacks

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey on Cloud Security and Various Attacks on Cloud

Cloud computing provides a means to store and process data through a collection of resources which can be accessed online. Cloud is a collection of storage and physical machines which are termed as datacenter. Cloud consists of many datacenters located at geographically different places. Every physical machine of datacenter can handle more than one user. Virtualization is the technology behind ...

متن کامل

A survey on RPL attacks and their countermeasures

RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...

متن کامل

A Survey of Security Attacks, Defenses and Security Mechanisms in Wireless Sensor Network

The main objective of the paper is to present different types of Security attacks, their effects and defense mechanisms in Wireless Sensor Network which is vulnerable to security attacks and threats due to its characteristics and limitations. Security attacks are identified and classified from different perspectives e.g. based on network layer in which the attack occurs, specifically network la...

متن کامل

A survey of security visualization for computer network logs

Network security is an important area in computer science. Although great efforts have already been made regarding security problems, networks are still threatened by all kinds of potential attacks, which may lead to huge damage and loss. Log files are main sources for security analysis. However, log files are not user friendly. It is laborious work to obtain useful information from log files. ...

متن کامل

Building Computer Network Attacks

In this work we start walking the path to a new perspective for viewing cyberwarfare scenarios, by introducing conceptual tools (a formal model) to evaluate the costs of an attack, to describe the theater of operations, targets, missions, actions, plans and assets involved in cyberwarfare attacks. We also describe two applications of this model: autonomous planning leading to automated penetrat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IJARCCE

سال: 2019

ISSN: 2319-5940,2278-1021

DOI: 10.17148/ijarcce.2019.8806