Internal Threat Defense using Network Access Control and Intrusion Prevention System

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Characterizing Network Intrusion Prevention System

In the last few years, the Internet has experienced explosive growth. Along with the widespread evolution of new emerging services, the quantity and impact of attacks have been continuously increases, attackers continuously find vulnerabilities at various levels, from the network it self to operating system and applications, exploit the to crack system and services. Defense system and network m...

متن کامل

Rapid Decentralized Network Intrusion Defense System on Multiple Virtual Machines

Data breaches and cloud service abuse are the greatest cloud security threats according to cloud security alliance. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service (DDoS). DDoS attacks usually takes place at early stage actions such as exploitation in multiple number of steps, vulne...

متن کامل

Artificial Neural Network Modeling of Intrusion Detection and Prevention System

With the rapid proliferation of computer networks during the past decade, security has become a crucial issue for computer systems. Different soft computing based methods have been proposed in recent years for the development of intrusion detection systems. However due to the vulnerabilities of the networks towards attacks and to keep our sensitive data safe from attacks, detection is not enoug...

متن کامل

Access and Mobility Policy Control at the Network Edge

The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...

متن کامل

neural classifier ensemble using error-correcting output codes: access control application

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Advanced Computer Science and Applications

سال: 2019

ISSN: 2156-5570,2158-107X

DOI: 10.14569/ijacsa.2019.0100948