DIAGNOSING AND COUNTERACTING NETWORK THREATS

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Diagnosing Advanced Persistent Threats: A Position Paper

When a computer system is hacked, analyzing the root-cause (for example entry-point of penetration) is a diagnostic process. An audit trail, as defined in the National Information Assurance Glossary, is a securityrelevant chronological (set of) record(s), and/or destination and source of records that provide evidence of the sequence of activities that have affected, at any time, a specific oper...

متن کامل

Counteracting Network Distributed Attacks: An Intelligent Approach to Minimise the TCP/IP Protocol Threats using Agents Technology

Today, communications, information networks, e-Commerce, e-Education, and all other e-Services and infrastructures tend to play a major role in our daily life and global economy. Nowadays, in modern society, Information and Communications Technology (ICT) is the force that drives productivity and creates a higher standard of living. The growing dependence on such systems, however, increased the...

متن کامل

Counteracting Active Attacks in Social Network Graphs

The growing popularity of social networks has generated interesting data analysis problems. At the same time, it has raised important privacy concerns, because social networks contain personal and sensitive information. Consequently, social graphs, which express the relations between the actors in a social network, ought to be sanitized or anonymized before being published. Most work on privacy...

متن کامل

Network Security Threats and Protection Models

In a brave new age of global connectivity and e-commerce, interconnections via networks have heightened, creating for both individuals and organizations, a state of complete dependence upon vulnerable systems for storage and transfer of information. Never before, have so many people had power in their own hands. The power to deface websites, access personal mail accounts, and worse more the pot...

متن کامل

SYNERGY: Detecting and Diagnosing Correlated Network Anomalies

Network anomalies occur in operational networks and may be logged by a number of network measurement tools such as SNMP and NetFlow. However, accurate and efficient detection of these anomalies in the logged data is very challenging due to the huge data volume and complex characteristics of anomalies. The existing approaches are limited by the nature of underlying mathematical models and might ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Management of Development of Complex Systems

سال: 2020

ISSN: 2412-9933,2219-5300

DOI: 10.32347/2412-9933.2020.42.125-131