Securing a Local Area Network by IDPS Open Source

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Layer 2 in Local Area Networks

Network security problems have been well known and addressed in the application, transport, or network layers. However, the Data Link Layer (Layer 2) security has not been adequately addressed yet. To secure Local or Metropolitan Area Networks, the IEEE 802.1AE Media Access Control (MAC) Security Task Group has proposed the IEEE P802.1AE Standard for Local and Metropolitan Area Networks: MAC Se...

متن کامل

Network Security: Hybrid IDPS

This paper deals with the issue of computer security, which aims to develop a robust and independent security architecture. This architecture consists of several probes spatially distributed to several locations in the network (sensitive servers, DMZ, workstations, etc.). These probes are NIDPS, HIDPS, KIDPS and Arduino Yun Board. These same probes were semantically distributed according to thr...

متن کامل

Ntop: a Lightweight Open-Source Network IDS

Almost every new company that connects to the Internet installs a firewall to protect company assets hence prevent unauthorised access to its private network. Despite this general goal, many network administrators decided to improve network security by adding a network-based intrusion detection system (NIDS) able to detect potentially hostile traffic. Although commercial NIDS are quite powerful...

متن کامل

Open Source Lexical Information Network

Currently, there is a large number of lexical resources available: GENELEX, PAROLE, EuroWordNet and its follow-ups like GermaNet, MultiWordNet, etc. With this multitude of resources, the need arises for standardisation, in the guise of for instance the EAGLES, ISLE/ MILE, EMELD, and TC37/SC4 projects. A current attempt in these standardisation framework is the conception of a network of lexical...

متن کامل

Securing personal area networks

We consider the applicability of ID-based cryptography to providing security within a Personal Area Network (PAN). An initialisation process appropriate for use within a PAN is proposed, and a detailed comparison between the ID-based approach and a more conventional PKI approach is given.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia Computer Science

سال: 2017

ISSN: 1877-0509

DOI: 10.1016/j.procs.2017.06.106