Securing a Local Area Network by IDPS Open Source
نویسندگان
چکیده
منابع مشابه
Securing Layer 2 in Local Area Networks
Network security problems have been well known and addressed in the application, transport, or network layers. However, the Data Link Layer (Layer 2) security has not been adequately addressed yet. To secure Local or Metropolitan Area Networks, the IEEE 802.1AE Media Access Control (MAC) Security Task Group has proposed the IEEE P802.1AE Standard for Local and Metropolitan Area Networks: MAC Se...
متن کاملNetwork Security: Hybrid IDPS
This paper deals with the issue of computer security, which aims to develop a robust and independent security architecture. This architecture consists of several probes spatially distributed to several locations in the network (sensitive servers, DMZ, workstations, etc.). These probes are NIDPS, HIDPS, KIDPS and Arduino Yun Board. These same probes were semantically distributed according to thr...
متن کاملNtop: a Lightweight Open-Source Network IDS
Almost every new company that connects to the Internet installs a firewall to protect company assets hence prevent unauthorised access to its private network. Despite this general goal, many network administrators decided to improve network security by adding a network-based intrusion detection system (NIDS) able to detect potentially hostile traffic. Although commercial NIDS are quite powerful...
متن کاملOpen Source Lexical Information Network
Currently, there is a large number of lexical resources available: GENELEX, PAROLE, EuroWordNet and its follow-ups like GermaNet, MultiWordNet, etc. With this multitude of resources, the need arises for standardisation, in the guise of for instance the EAGLES, ISLE/ MILE, EMELD, and TC37/SC4 projects. A current attempt in these standardisation framework is the conception of a network of lexical...
متن کاملSecuring personal area networks
We consider the applicability of ID-based cryptography to providing security within a Personal Area Network (PAN). An initialisation process appropriate for use within a PAN is proposed, and a detailed comparison between the ID-based approach and a more conventional PKI approach is given.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2017
ISSN: 1877-0509
DOI: 10.1016/j.procs.2017.06.106