A Self-Extension Monitoring for Security Management
نویسندگان
چکیده
In the coming age of information warfare, information security patterns take on a more offensive than defensive stance [1]. However, most existing security systems remain passive and do not provide an active form of security protection. It is necessary to develop an active form of offensive approach to security protection in order to guard vital information infrastructures and thwart hackers. This paper presents a Self-Extension Monitoring, a new approach in monitoring intruders, securing evidence against hackers and identifying them. It also proposes an Intruder Identification System (IIS), which is designed and implemented based on the proposed technique. The Self-Extension Monitoring approach minimizes temporal and spatial limitations, making it possible to collect enough information for disclosure of the intruder’s identity. A system security administrator can prevent any unwanted intrusion and re-attack the intruder by creating and maintaining information regarding the intruder’s identity through the Self-Extension Monitoring.
منابع مشابه
Comparative Advantage, Self-sufficiency and Food Security in Iran: Case Study of Wheat Commodity
Food security has a dynamic notion during the time and may be affected by various domestic and global factors.Nevertheless, Iranian policy makers consider food security as same as self-sufficiency in agricultural food products, particularly wheat production. However, self-sufficiency can contribute to food security only if it is in coincidences with comparative advantage and sustainable resourc...
متن کاملSelf-Starting Control Chart and Post Signal Diagnostics for Monitoring Project Earned Value Management Indices
Earned value management (EVM) is a well-known approach in a project control system which uses some indices to track schedule and cost performance of a project. In this paper, a new statistical framework based on self-starting monitoring and change point estimation is proposed to monitor correlated EVM indices which are usually auto-correlated over time and non-normally distributed. Also, a new ...
متن کاملNode-Level Information Security Monitoring for Mobile Ad Hoc Networks
Inherent freedom due to lack of central authority in selforganized mobile ad hoc networks introduces challenges to security and trust management. Arguably, trust management is the most critical security issue in mobile ad hoc networks. If nodes do not have any prior knowledge of each other, the trust establishment becomes complicated. In this kind of situations, the nodes themselves should be r...
متن کاملFarmers’ Perception and Management of Natural Hazards in Production and Security of Farm Investment in Isuikwuato, Abia State, Nigeria
This study on farmers’ perception and management of natural hazards in production and security of farm investment was carried out in Isuikwuato Local Government Area of Abia State, Nigeria. The study was sought to identify farmers’ perceived natural hazards in food production; identify adopted measures used in mitigating impacts of the hazards and determined factors that influenced farmers from...
متن کاملFarmers Perception about gains from Integrated Pest Management Farmer Field School
The study was conducted among the two farmer groups in Bhaktapur and Kavre districts of Nepal. The main objective of the study is to evaluate the differences in belief, attitude and practices felt by the farmers after participation in the IPM FFS. The study has been based on data collected through personal interview with the farmers, focus group discussion, personal observation in the farmers f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000