Research on Constructing an Internet - based Multi - step Security System
نویسنده
چکیده
Due to the side effects of the increasing Internet population and the proliferation of new cyberspace culture on the current Internet culture, this research seeks to construct a multi-step security system as a counter measure. This multi-step security system utilizes the existing legacy security solution firewall, intrusion detection system, and intrusion prevention system and virus wall to provide a new security system, which maximizes the effectiveness of the entire system, and also presents an ideal security system by enforcing security steps. It is also a momentous security system model which can successfully defend the system from hacking, worm virus, spam mails, and DDoS attack..
منابع مشابه
Designing an Expert System for Internet Connection Problems Troubleshooting for wired network users
Man, is living in an era that the knowledge is estimated to be doubled in a relatively short time. The fast rate of technology's growth in the "Century of information", is caused by fast growth of communication technologies like the internet which has become one of the best tools for a quick, cheap, effective and vastly supported communication. For an efficient and effective usage of tools and ...
متن کاملDesigning an Expert System for Internet Connection Problems Troubleshooting for wired network users
Man, is living in an era that the knowledge is estimated to be doubled in a relatively short time. The fast rate of technology's growth in the "Century of information", is caused by fast growth of communication technologies like the internet which has become one of the best tools for a quick, cheap, effective and vastly supported communication. For an efficient and effective usage of tools and ...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملA multi-stage stochastic programming for condition-based maintenance with proportional hazards model
Condition-Based Maintenance (CBM) optimization using Proportional Hazards Model (PHM) is a kind of maintenance optimization problem in which inspections of a system relevant to its failure rate depending on the age and value of covariates are performed in time intervals. The general approach for constructing a CBM based on PHM for a system is to minimize a long run average cost per unit of time...
متن کاملPrediction of University Students\' Internet Addiction Based on Brain-Behavioral Systems
Background and Aim: Internet addiction means excessive and unnecessary use of the Internet. The aim of this study was to investigate the role of brain-behavioral systems in Internet addiction among university students. Materials and Methods: This was a descriptive and correlational research. The statistical population was all the students of Islamic Azad University, Karaj Branch in the academi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006