NetSEC: metrology-based application for network security

نویسندگان

  • Jean-François Scariot
  • Bernard Martinet
چکیده

We know how to use metrology to discover network functional problems and how to measure error rate to detect active or passive abnormal behaviour items. Even, we can use it to observe the network use and to detect abnormal resources consumption. This leads us to develop a flow analyses application to secure networks. Build around a relational data base system, filled by metrology platform and supporting multi-criteria sort queries, NetSEC allows analyzing unusual traffic in order to find its roots. A user friendly web interface allows using NetSEC application close to final users.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

جانمایی دوربین در طراحی شبکه‌های فتوگرامتری صنعتی با استفاده از بهینه‌سازی تکاملی چندگانه

Nowadays, the subject of vision metrology network design is local enhancement of the existing network. In the other words, it has changed from first to third order design concept. To improve the network, locally, some new camera stations should be added to the network in drawback areas. The accuracy of weak points is enhanced by the new images, if the related vision constraints are satisfied si...

متن کامل

A Novel Index for Online Voltage Stability Assessment Based on Correlation Characteristic of Voltage Profiles

Abstract: Voltage instability is a major threat for security of power systems. Preserving voltage security margin at a certain limit is a vital requirement for today’s power systems. Assessment of voltage security margin is a challenging task demanding sophisticated indices. In this paper, for the purpose of on line voltage security assessment a new index based on the correlation characteristic...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

ملزومات امنیتی پیاده‌سازی IMS SIP سرور امن

IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Future Generation Comp. Syst.

دوره 19  شماره 

صفحات  -

تاریخ انتشار 2003