نتایج جستجو برای: network security

تعداد نتایج: 818903  

1999
Theuns Verwoerd Ray Hunt

Most discussions of network security focus on the tools and techniques used to fortify networks: firewalls, biometrics, access controls, encryption. This paper presents an outline of tools that assist an administrator in verifying and maintaining the security of a networked system – Active Security tools. It discusses why there is a need for such tools and how security mechanisms are attacked. ...

2015
Youssef Senhaji Hicham Medromi

This paper deals with the issue of computer security, which aims to develop a robust and independent security architecture. This architecture consists of several probes spatially distributed to several locations in the network (sensitive servers, DMZ, workstations, etc.). These probes are NIDPS, HIDPS, KIDPS and Arduino Yun Board. These same probes were semantically distributed according to thr...

2004
Fahad R. Dogar Nazim Ashraf Ihsan A. Qazi

The project entails the implementation of a web firewall for the LUMS community having the features of filtering traffic on the basis of specified rules. The filtering criterion includes content as well as the source and destination addresses. Moreover, it allows monitoring of individual users through keeping record of their searches made on famous search engines. The firewall is incorporated i...

2015
Shujuan Jin

Purpose: discuss the role of the neural network (NN) theory in the computer network security evaluation. Method: propose three-level and four-class indicator system suitable for network security evaluation, establish the network security evaluation system model based on NN, optimize the NN model by using the particle swarm, collect 100group data on the computer network security evaluation of di...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید بهشتی - دانشکده مهندسی برق و کامپیوتر 1388

چکیده ندارد.

2006
Kapil Kumar Gupta Baikunth Nath Kotagiri Ramamohanarao

In this paper we present a general framework for an Intrusion Detection System which we call as the Layer Based Intrusion Detection System (LBIDS). We base our framework on the fact that any network needs to ensure the confidentiality, integrity and availability of data and/or services which can be compromised only sequentially one after the other, i.e. availability followed by authentication a...

2004
Partha Dasgupta Tom Boyd

Wireless networking is inherently insecure. From jamming to eavesdropping, from man-inthe middle to spoofing, there are a variety of attack methods that can be used against the users of wireless networks. Modern wireless data networks use a variety of cryptographic techniques such as encryption and authentication to provide barriers to such infiltrations. However, much of the commonly used secu...

2011
Liam Kiemele

Wireless networking is becoming increasingly prevalent in modern networked environments. This paper examined methods used to secure wireless networks from intrusion and eavesdropping. WEP, WPA and RSN were examined to see the progression from weak to much stronger security for wireless LANs. WEP was incredibly insecure, but these vulnerabilities were addressed to produce significantly more secu...

2013
Abhishek Sharma

Computer Network and Internet is growing every day. Computer networks allow communicating faster than any other facilities. These networks allow the user to access local and remote databases. It is impossible to protect every system on the network. In industries, the network and its security are important issues, as a breach in the system can cause major problems. Intrusion detection system (ID...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید