DIAGNOSING AND COUNTERACTING NETWORK THREATS
نویسندگان
چکیده
منابع مشابه
Diagnosing Advanced Persistent Threats: A Position Paper
When a computer system is hacked, analyzing the root-cause (for example entry-point of penetration) is a diagnostic process. An audit trail, as defined in the National Information Assurance Glossary, is a securityrelevant chronological (set of) record(s), and/or destination and source of records that provide evidence of the sequence of activities that have affected, at any time, a specific oper...
متن کاملCounteracting Network Distributed Attacks: An Intelligent Approach to Minimise the TCP/IP Protocol Threats using Agents Technology
Today, communications, information networks, e-Commerce, e-Education, and all other e-Services and infrastructures tend to play a major role in our daily life and global economy. Nowadays, in modern society, Information and Communications Technology (ICT) is the force that drives productivity and creates a higher standard of living. The growing dependence on such systems, however, increased the...
متن کاملCounteracting Active Attacks in Social Network Graphs
The growing popularity of social networks has generated interesting data analysis problems. At the same time, it has raised important privacy concerns, because social networks contain personal and sensitive information. Consequently, social graphs, which express the relations between the actors in a social network, ought to be sanitized or anonymized before being published. Most work on privacy...
متن کاملNetwork Security Threats and Protection Models
In a brave new age of global connectivity and e-commerce, interconnections via networks have heightened, creating for both individuals and organizations, a state of complete dependence upon vulnerable systems for storage and transfer of information. Never before, have so many people had power in their own hands. The power to deface websites, access personal mail accounts, and worse more the pot...
متن کاملSYNERGY: Detecting and Diagnosing Correlated Network Anomalies
Network anomalies occur in operational networks and may be logged by a number of network measurement tools such as SNMP and NetFlow. However, accurate and efficient detection of these anomalies in the logged data is very challenging due to the huge data volume and complex characteristics of anomalies. The existing approaches are limited by the nature of underlying mathematical models and might ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Management of Development of Complex Systems
سال: 2020
ISSN: 2412-9933,2219-5300
DOI: 10.32347/2412-9933.2020.42.125-131