Defense-through-Deception Network Security Model: Securing University Campus Network from DOS/DDOS Attack

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Attack and Defense

Whoever thinks his problem can be solved using cryptography, doesn't understand his problem and doesn't understand cryptography. If you spend more on coffee than on IT security, then you will be hacked. What's more, you deserve to be hacked. So far we've seen a large number of attacks against individual computers and other devices. But attacks increasingly depend on connectivity. Consider the f...

متن کامل

On Campus Network Security System of College and University

The rapid development and wide application of computer network effectively promoted the development of China’s economy and information technology, but network and information security problems also came. In our view, we should focus on management on one hand and grasp network security technique on the other hand. Both are equally important. Without the support of management, even the best techn...

متن کامل

Research on Network Defense Graph Model in Network Security

Security analysis and attack-defense modeling are effective method to identify the vulnerabilities of information systems for proactive defense. The attack graph model reflects only attack actions and system state changes, without considering the perspective of the defenders. To assess the network information system and comprehensively show attack and defense strategies and theirs cost, a defen...

متن کامل

Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures

This report documents the program and the outcomes of Dagstuhl Seminar 14292 “Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures”. The main objective of the seminar was to discuss new approaches and ideas for securing industrial control systems. It is the sequel of several previous Dagstuhl seminars: (1) the series “Network Attack Detection an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Bulletin of Electrical Engineering and Informatics

سال: 2018

ISSN: 2302-9285,2089-3191

DOI: 10.11591/eei.v7i4.1349