نتایج جستجو برای: keywords network security
تعداد نتایج: 2667445 فیلتر نتایج به سال:
Intrusion Detection System (IDS) is one of a crucial issue and a major research problem in network security. This work, An Adaptive multi-Layer Intrusion Detection System (ALIDS) is designed and developed to achieve high efficiency, scalability, flexibility and improve the detection and classification rate accuracy. We apply C5 decision tree on our model. Our experimental results showed that th...
We propose a CDMA network implementation that enhances security at the physical layer. By using an active star topology supporting both point-to-point and point-to-multipoint communication, 128 ONUs can transmit simultaneously at rates of at least 12 Mbps, with a reach of 20 km, thus addressing access network applications. Numerical simulations demonstrate the feasibility of the proposed scheme...
An ad-hoc network is a collection of mobile nodes equipped with wireless communication adapters. These nodes dynamically form a temporary network without the need of any existing network infrastructure. Nodes in MANETs use radio signals with a finite range to communicate making it possible for any intermediate node to intercept the communication. Also the frequently changing topology, with high...
The number of mobile and IoT devices connected to home and enterprise networks is growing fast. These devices offer new services and experiences for the users; however, they also present new classes of security threats pertaining to data and device safety and user privacy. In this article, we first analyze the potential threats presented by these devices connected to edge networks. We then prop...
Sensor networks are primarily designed for real-time collection and analysis of low level data in hostile environments. Basically sensor networks are application dependent. Wireless sensor network (WSN) applications can be classified into two event based and Continuous monitoring. This paper focuses on continuous monitoring application. One of the major challenges of wireless sensor network is ...
To assure enterprise security, typically a SIEM (Security Information and Event Management) system is built to correlate security events from different preventive technologies and flag alerts. Analysts in a security operations center (SOC) investigate the alerts to decide whether the related hosts are malicious or not. However, the number of alerts is overwhelming which exceeds the SOC’s capaci...
The goal of reaching a high level of security in wireless and wired communication networks is continuously proving difficult to achieve. The speed at which both keepers and violators of secure networks are evolving is relatively close. Nowadays, network infrastructures contain a large number of event logs captured by Firewalls and Domain Controllers (DCs). However, these logs are increasingly b...
Wireless Sensor Networks (WSN) is an emerging technology now-a-days and has a wide range of applications such as battlefield surveillance, traffic surveillance, forest fire detection, flood detection etc. But wireless sensor networks are susceptible to a variety of potential attacks which obstructs the normal operation of the network. The security of a wireless sensor network is compromised bec...
Existing active network architectures depend on using statically typed languages for protection and performance. Unfortunately this limits some of the more dynamic features of an active network. In this paper we present PANTS a dynamically extensible active network architecture. We describe a new architecture for an active node which does not depend on language based security, but provides the ...
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید