Dismantling intrusion prevention systems

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusion Prevention System Inspired Immune Systems

In view of new communication and information technologies that appeared with the emergence of networks and Internet, the computer security became a major challenge, and works in this research axis are increasingly numerous. Various tools and mechanisms are developed in order to guarantee a safety level up to the requirements of modern life. Among them, intrusion detection and prevention systems...

متن کامل

Carousel: Scalable Logging for Intrusion Prevention Systems

We address the problem of collecting unique items in a large stream of information in the context of Intrusion Prevention Systems (IPSs). IPSs detect attacks at gigabit speeds and must log infected source IP addresses for remediation or forensics. An attack with millions of infected sources can result in hundreds of millions of log records when counting duplicates. If logging speeds are much sl...

متن کامل

Virtualized Honeynet Intrusion Prevention System in Scada Systems

Nowadays, the medium of wars has changed dramatically from traditional wars to cyber wars. This shift has forced governments to invest more on their infrastructure and security solutions. This paper aims to propose a solution by which network administrators could easily monitor their networks and take action if they find there is any trace of intrusion from outside of the network. Firstly, an i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM SIGCOMM Computer Communication Review

سال: 2012

ISSN: 0146-4833

DOI: 10.1145/2377677.2377733