نتایج جستجو برای: network security
تعداد نتایج: 818903 فیلتر نتایج به سال:
Most discussions of network security focus on the tools and techniques used to fortify networks: firewalls, biometrics, access controls, encryption. This paper presents an outline of tools that assist an administrator in verifying and maintaining the security of a networked system – Active Security tools. It discusses why there is a need for such tools and how security mechanisms are attacked. ...
This paper deals with the issue of computer security, which aims to develop a robust and independent security architecture. This architecture consists of several probes spatially distributed to several locations in the network (sensitive servers, DMZ, workstations, etc.). These probes are NIDPS, HIDPS, KIDPS and Arduino Yun Board. These same probes were semantically distributed according to thr...
The project entails the implementation of a web firewall for the LUMS community having the features of filtering traffic on the basis of specified rules. The filtering criterion includes content as well as the source and destination addresses. Moreover, it allows monitoring of individual users through keeping record of their searches made on famous search engines. The firewall is incorporated i...
Purpose: discuss the role of the neural network (NN) theory in the computer network security evaluation. Method: propose three-level and four-class indicator system suitable for network security evaluation, establish the network security evaluation system model based on NN, optimize the NN model by using the particle swarm, collect 100group data on the computer network security evaluation of di...
چکیده ندارد.
In this paper we present a general framework for an Intrusion Detection System which we call as the Layer Based Intrusion Detection System (LBIDS). We base our framework on the fact that any network needs to ensure the confidentiality, integrity and availability of data and/or services which can be compromised only sequentially one after the other, i.e. availability followed by authentication a...
Wireless networking is inherently insecure. From jamming to eavesdropping, from man-inthe middle to spoofing, there are a variety of attack methods that can be used against the users of wireless networks. Modern wireless data networks use a variety of cryptographic techniques such as encryption and authentication to provide barriers to such infiltrations. However, much of the commonly used secu...
Wireless networking is becoming increasingly prevalent in modern networked environments. This paper examined methods used to secure wireless networks from intrusion and eavesdropping. WEP, WPA and RSN were examined to see the progression from weak to much stronger security for wireless LANs. WEP was incredibly insecure, but these vulnerabilities were addressed to produce significantly more secu...
Computer Network and Internet is growing every day. Computer networks allow communicating faster than any other facilities. These networks allow the user to access local and remote databases. It is impossible to protect every system on the network. In industries, the network and its security are important issues, as a breach in the system can cause major problems. Intrusion detection system (ID...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید