Academic literature on the topic 'Computer networks Firewalls (Computer security) TCP'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks Firewalls (Computer security) TCP.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer networks Firewalls (Computer security) TCP"

1

Cheng, Haosu, Jianwei Liu, Jian Mao, Mengmeng Wang, Jie Chen, and Jingdong Bian. "A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN." Security and Communication Networks 2018 (November 15, 2018): 1–20. http://dx.doi.org/10.1155/2018/8392080.

Full text
Abstract:
Software-defined networking (SDN) is a representative next generation network architecture, which allows network administrators to programmatically initialize, control, change, and manage network behavior dynamically via open interfaces. SDN is widely adopted in systems like 5G mobile networks and cyber-physical systems (CPS). However, SDN brings new security problems, e.g., controller hijacking, black-hole, and unauthorized data modification. Traditional firewall or IDS based solutions cannot fix these challenges. It is also undesirable to develop security mechanisms in such an ad hoc manner, which may cause security conflict during the deployment procedure. In this paper, we propose OSCO (Open Security-enhanced Compatible OpenFlow) platform, a unified, lightweight platform to enhance the security property and facilitate the security configuration and evaluation. The proposed platform supports highly configurable cryptographic algorithm modules, security protocols, flexible hardware extensions, and virtualized SDN networks. We prototyped our platform based on the Raspberry Pi Single Board Computer (SBC) hardware and presented a case study for switch port security enhancement. We systematically evaluated critical security modules, which include 4 hash functions, 8 stream/block ciphers, 4 public-key cryptosystems, and key exchange protocols. The experiment results show that our platform performs those security modules and SDN network functions with relatively low computational (extra 2.5% system overhead when performing AES-256 and SHA-256 functions) and networking performance overheads (73.7 Mb/s TCP and 81.2Mb/s UDP transmission speeds in 100Mb/s network settings).
APA, Harvard, Vancouver, ISO, and other styles
2

Zain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.

Full text
Abstract:
In recent times, secure communication protocols over web such as HTTPS (Hypertext Transfer Protocol Secure) are being widely used instead of plain web communication protocols like HTTP (Hypertext Transfer Protocol). HTTPS provides end-to-end encryption between the user and service. Nowadays, organizations use network firewalls and/or intrusion detection and prevention systems (IDPS) to analyze the network traffic to detect and protect against attacks and vulnerabilities. Depending on the size of organization, these devices may differ in their capabilities. Simple network intrusion detection system (NIDS) and firewalls generally have no feature to inspect HTTPS or encrypted traffic, so they rely on unencrypted traffic to manage the encrypted payload of the network. Recent and powerful next-generation firewalls have Secure Sockets Layer (SSL) inspection feature which are expensive and may not be suitable for every organizations. A virtual private network (VPN) is a service which hides real traffic by creating SSL-protected channel between the user and server. Every Internet activity is then performed under the established SSL tunnel. The user inside the network with malicious intent or to hide his activity from the network security administration of the organization may use VPN services. Any VPN service may be used by users to bypass the filters or signatures applied on network security devices. These services may be the source of new virus or worm injected inside the network or a gateway to facilitate information leakage. In this paper, we have proposed a novel approach to detect VPN activity inside the network. The proposed system analyzes the communication between user and the server to analyze and extract features from network, transport, and application layer which are not encrypted and classify the incoming traffic as malicious, i.e., VPN traffic or standard traffic. Network traffic is analyzed and classified using DNS (Domain Name System) packets and HTTPS- (Hypertext Transfer Protocol Secure-) based traffic. Once traffic is classified, the connection based on the server’s IP, TCP port connected, domain name, and server name inside the HTTPS connection is analyzed. This helps in verifying legitimate connection and flags the VPN-based traffic. We worked on top five freely available VPN services and analyzed their traffic patterns; the results show successful detection of the VPN activity performed by the user. We analyzed the activity of five users, using some sort of VPN service in their Internet activity, inside the network. Out of total 729 connections made by different users, 329 connections were classified as legitimate activity, marking 400 remaining connections as VPN-based connections. The proposed system is lightweight enough to keep minimal overhead, both in network and resource utilization and requires no specialized hardware.
APA, Harvard, Vancouver, ISO, and other styles
3

Menkus, Belden. "Firewalls in Information Systems Security." EDPACS 23, no. 3 (1995): 9–15. http://dx.doi.org/10.1080/07366989509451685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Harris, B., and R. Hunt. "TCP/IP security threats and attack methods." Computer Communications 22, no. 10 (1999): 885–97. http://dx.doi.org/10.1016/s0140-3664(99)00064-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nour, Boubakr, Hakima Khelifi, Rasheed Hussain, Spyridon Mastorakis, and Hassine Moungla. "Access Control Mechanisms in Named Data Networks." ACM Computing Surveys 54, no. 3 (2021): 1–35. http://dx.doi.org/10.1145/3442150.

Full text
Abstract:
Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean-slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the entities that can access the content. In TCP/IP-based AC systems, due to the client-server communication model, the servers control which client can access a particular content. In contrast, ICN-based networks use content names to drive communication and decouple the content from its original location. This phenomenon leads to the loss of control over the content, causing different challenges for the realization of efficient AC mechanisms. To date, considerable efforts have been made to develop various AC mechanisms in NDN. In this article, we provide a detailed and comprehensive survey of the AC mechanisms in NDN. We follow a holistic approach towards AC in NDN where we first summarize the ICN paradigm, describe the changes from channel-based security to content-based security, and highlight different cryptographic algorithms and security protocols in NDN. We then classify the existing AC mechanisms into two main categories: Encryption-based AC and Encryption-independent AC . Each category has different classes based on the working principle of AC (e.g., Attribute-based AC, Name-based AC, Identity-based AC). Finally, we present the lessons learned from the existing AC mechanisms and identify the challenges of NDN-based AC at large, highlighting future research directions for the community.
APA, Harvard, Vancouver, ISO, and other styles
6

Bellovin, S. M. "Security problems in the TCP/IP protocol suite." ACM SIGCOMM Computer Communication Review 19, no. 2 (1989): 32–48. http://dx.doi.org/10.1145/378444.378449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Prabadevi, B., and N. Jeyanthi. "Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks." Cybernetics and Information Technologies 17, no. 4 (2017): 69–86. http://dx.doi.org/10.1515/cait-2017-0042.

Full text
Abstract:
AbstractThe bridge protocol (Address Resolution Protocol) ARP, integrating Ethernet (Layer 2) and IP protocol (Layer 3) plays a vital role in TCP/IP communication since ARP packet is the first packet generated during any TCP/IP communications and they are the first traffic from the host. In the large data center, as the size of the broadcast domain (i.e., number of hosts on the network) increases consequently the broadcast traffic from the communication protocols like ARP also increases. This paper addresses the problem faced by Layer 2 protocols like insecured communication, scalability issues and VM migration issues. The proposed system addresses these issues by introducing two new types of messaging with traditional ARP and also combat the ARP Cache poisoning attacks like host impersonation, MITM, Distributed DoS by making ARP stateful. The components of the proposed methodology first start the process by decoding the packets, updates the invalid entry made by the user with Timestamp feature and messages being introduced. The system has been implemented and compared with various existing solutions.
APA, Harvard, Vancouver, ISO, and other styles
8

Kent, S. "Comments on “security problems in the TCP/IP protocol suite”." ACM SIGCOMM Computer Communication Review 19, no. 3 (1989): 10–19. http://dx.doi.org/10.1145/74674.74675.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bodei, Chiara, Lorenzo Ceragioli, Pierpaolo Degano, et al. "FWS: Analyzing, maintaining and transcompiling firewalls." Journal of Computer Security 29, no. 1 (2021): 77–134. http://dx.doi.org/10.3233/jcs-200017.

Full text
Abstract:
Firewalls are essential for managing and protecting computer networks. They permit specifying which packets are allowed to enter a network, and also how these packets are modified by IP address translation and port redirection. Configuring a firewall is notoriously hard, and one of the reasons is that it requires using low level, hard to interpret, configuration languages. Equally difficult are policy maintenance and refactoring, as well as porting a configuration from one firewall system to another. To address these issues we introduce a pipeline that assists system administrators in checking if: (i) the intended security policy is actually implemented by a configuration; (ii) two configurations are equivalent; (iii) updates have the desired effect on the firewall behavior; (iv) there are useless or redundant rules; additionally, an administrator can (v) transcompile a configuration into an equivalent one in a different language; and (vi) maintain a configuration using a generic, declarative language that can be compiled into different target languages. The pipeline is based on IFCL, an intermediate firewall language equipped with a formal semantics, and it is implemented in an open source tool called FWS. In particular, the first stage decompiles real firewall configurations for iptables, ipfw, pf and (a subset of) Cisco IOS into IFCL. The second one transforms an IFCL configuration into a logical predicate and uses the Z3 solver to synthesize an abstract specification that succinctly represents the firewall behavior. System administrators can use FWS to analyze the firewall by posing SQL-like queries, and update the configuration to meet the desired security requirements. Finally, the last stage allows for maintaining a configuration by acting directly on its abstract specification and then compiling it to the chosen target language. Tests on real firewall configurations show that FWS can be fruitfully used in real-world scenarios.
APA, Harvard, Vancouver, ISO, and other styles
10

Buduri, Reddaiah, SrinivasaRao Kanusu, Swetha Chinthakunta, Amruthavani Godina, and Sivajyothi Siddavatam. "Linear Congruential Pseudorandom Numbered Hybrid Crypto-System with Genetic Algorithms." International Journal of Engineering and Advanced Technology 10, no. 2 (2020): 159–63. http://dx.doi.org/10.35940/ijeat.b2092.1210220.

Full text
Abstract:
While using networks that may be in any form more and more problems related to securityrises within the network as well as outside the network. To resolve the security problems network security is the science that facilitatesto safeguard the resources and the quality of the network and data. At different workstations filters and firewalls are used in protecting the resources. But while the data is in transmission security services are needed to protect. These services are to be altered frequently to prevent from attacks. In developing such system, this work uses linear congruential pseudorandom number with multiple genetic algorithms. In small business applications these types of hybrid systems can be used to prevent from hackers.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer networks Firewalls (Computer security) TCP"

1

Snyder, Walter C. "Evaluating the effectiveness of packet filter firewall applications in a "dual stack" Internet Protocol environment /." Online version of thesis, 2010. http://hdl.handle.net/1850/12263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rumelioglu, Sertac. "Evaluation of Embedded Firewall System." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FRumelioglu.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Farley, Ryan Joseph. "Parallel firewall designs for high-speed networks /." Electronic thesis, 2005. http://etd.wfu.edu/theses/available/etd-12142005-194043/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Felker, Keith A. "Security and efficiency concerns with distributed collaborative networking environments /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FFelker.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Atkins, William Dee. "Design and implementation of a hardened distributed network endpoint security system for improving the security of internet protocol-based networks." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.umr.edu/thesis/pdf/Final_Thesis_09007dcc8031d3b0.pdf.

Full text
Abstract:
Thesis (M.S.)--University of Missouri--Rolla, 2007.<br>Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed April 11, 2007) Includes bibliographical references (p. 54-55).
APA, Harvard, Vancouver, ISO, and other styles
6

Asarcıklı, Şükran Tuğlular Tuğkan. "Firewall monitoring using intrusion detection systems/." [s.l.]: [s.n.], 2005. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000390.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Felker, Keith A. "Security and efficiency concerns with distributed collaborative networking environments." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/852.

Full text
Abstract:
Approved for public release, distribution unlimited<br>The progression of technology is continuous and the technology that drives interpersonal communication is not an exception. Recent technology advancements in the areas of multicast, firewalls, encryption techniques, and bandwidth availability have made the next level of interpersonal communication possible. This thesis answers why collaborative environments are important in today's online productivity. In doing so, it gives the reader a comprehensive background in distributed collaborative environments, answers how collaborative environments are employed in the Department of Defense and industry, details the effects network security has on multicast protocols, and compares collaborative solutions with a focus on security. The thesis ends by providing a recommendation for collaborative solutions to be utilized by NPS/DoD type networks. Efficient multicast collaboration, in the framework of security is a secondary focus of this research. As such, it takes security and firewall concerns into consideration while comparing and contrasting both multicast-based and non-multicast-based collaborative solutions.
APA, Harvard, Vancouver, ISO, and other styles
8

Savacool, Richard. "Firewall resistance to metaferography in network communications /." Online version of thesis, 2010. http://hdl.handle.net/1850/12272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Givens, Mark Allen. "Modeling and analyzing intrusion attempts to a computer network operating in a defense-in-depth posture." Thesis, View thesis View thesis via DTIC web site, 2004. http://handle.dtic.mil/100.2/ADA427180.

Full text
Abstract:
Thesis (M.S.)--Naval Postgraduate School, 2004.<br>Title from title screen (viewed Mar. 15, 2005). "September 2004." "ADA427180"--URL. Includes bibliographical references (p. 89-90). Also issued in paper format.
APA, Harvard, Vancouver, ISO, and other styles
10

Tang, Jin. "Mobile IPv4 Secure Access to Home Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11536.

Full text
Abstract:
With the fast development of wireless networks and devices, Mobile IP is expected to be used widely so that mobile users can access the Internet anywhere, anytime without interruption. However, some problems, such as firewall traversal and use of private IP addresses, restrict use of Mobile IP. The objective of this thesis is to design original schemes that can enable a mobile node at abroad to access its home network as well as the Internet securely and that can help Mobile IP to be used widely and commercially. Our solutions are secure, efficient, and scalable. They can be implemented and maintained easily. In this thesis, we mainly consider Mobile IPv4, instead of Mobile IPv6. Three research topics are discussed. In each topic, the challenges are investigated and the new solutions are presented. The first research topic solves the firewall traversal problems in Mobile IP. A mobile node cannot access its firewall-protected home network if it fails the authentication by the firewall. We propose that an IPsec tunnel be established between the firewall and the foreign agent for firewall traversal and that an IPsec transport security association be shared by the mobile node and a correspondent node for end-to-end security. The second topic researches further on firewall traversal problems and investigates the way of establishing security associations among network entities. A new security model and a new key distribution method are developed. With the help of the security model and keys, the firewall and the relevant network entities set up IPsec security associations to achieve firewall traversal. A mobile node from a private home network cannot communicate with other hosts with its private home address when it is visiting a public foreign network. A novel and useful solution is presented in the third research topic. We suggest that the mobile node use its Network Access Identifier (NAI) as its identification and obtain a public home address from its home agent. In addition, a new tunnel between the mobile node and its home agent is proposed.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer networks Firewalls (Computer security) TCP"

1

The book of PF: A no-nonsense guide to the OpenBSD firewall. 2nd ed. No Starch Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

The book of PF: A no-nonsense guide to the OpenBSD firewall. No Starch Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Network security firewalls & VPNs. Jones & Bartlett Learning, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stewart, James Michael. Network security firewalls & VPNs. Jones & Bartlett Learning, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cisco Pix firewalls. Osborne/McGraw-Hill, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pagan, Kevin. Intranet firewalls. Ventana, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

B, Oakes Edward, ed. Firewalls and VPNs: Principles and practices. Pearson Prentice Hall, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vacca, John R. Firewalls clearly explained. 2nd ed. Morgan Kaufmann, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Deploying zone-based firewalls. Cisco Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Preetham, V. V. Internet security and firewalls. Premier Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer networks Firewalls (Computer security) TCP"

1

Costa Cardoso, Rui, and Mário Marques Freire. "Intelligent Assessment of Distributed Security in TCP/IP Networks." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25969-5_101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hadi, Ali H., and Hussein Al-Bahadili. "A Hybrid Port-Knocking Technique for Host Authentication." In Simulation in Computer Network Design and Modeling. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0191-8.ch016.

Full text
Abstract:
This chapter presents the detail description of a Port-Knocking (PK) technique, which should avert all types of port attacks and meets all other network security requirements. The new technique utilizes four well-known concepts, these are: PK, cryptography, steganography, and mutual authentication; therefore, it is referred to as the Hybrid Port-Knocking (HPK) technique. It is implemented as two separate modules. One is installed and run on the server computer, either behind the network firewall or on the firewall itself, and the other one is installed and run on the client computer. The first module is referred to as the HPK server, while the second is the HPK client. In terms of data processing, the technique consists of five main processes; these are: request packetization and transmission, traffic monitoring and capturing, mutual authentication, request extraction and execution, and port closing. The HPK technique demonstrates immunity against two vital attacks, namely, the TCP replay and Denial-of-Service (DoS) attacks.
APA, Harvard, Vancouver, ISO, and other styles
3

Hadi, Ali H., and Hussein Al-Bahadili. "A Hybrid Port-Knocking Technique for Host Authentication." In IT Policy and Ethics. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2919-6.ch023.

Full text
Abstract:
This chapter presents the detail description of a Port-Knocking (PK) technique, which should avert all types of port attacks and meets all other network security requirements. The new technique utilizes four well-known concepts, these are: PK, cryptography, steganography, and mutual authentication; therefore, it is referred to as the Hybrid Port-Knocking (HPK) technique. It is implemented as two separate modules. One is installed and run on the server computer, either behind the network firewall or on the firewall itself, and the other one is installed and run on the client computer. The first module is referred to as the HPK server, while the second is the HPK client. In terms of data processing, the technique consists of five main processes; these are: request packetization and transmission, traffic monitoring and capturing, mutual authentication, request extraction and execution, and port closing. The HPK technique demonstrates immunity against two vital attacks, namely, the TCP replay and Denial-of-Service (DoS) attacks.
APA, Harvard, Vancouver, ISO, and other styles
4

Adogbeji, Oghenevwogaga Benson. "Computer Security in Cybercafés." In Security and Software for Cybercafes. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-903-8.ch002.

Full text
Abstract:
The purpose of this chapter is to address the security breaches in cybercafés and also suggest measures of securing the unsecured computers. In order that cybercafés operate breach free Internet services, there is need for measures to be put in place to secure their network. This chapter of the book therefore unveils the security situation in cybercafés with the view to address network security, network breaches, and methods of protecting cybercafés’ systems. The chapter reveals some ways through which cybercafés encountered breaches such as Trojan horse programs, back door and remote administration programs, unauthorized access, denial of service, and so forth, and equally suggests measures of protecting the computers or networks such as installation of firewalls, use of antivirus, avoidance of opening unknown attachments, disabling of hidden filename extensions, keeping all applications parched, disconnecting from the net when not in use, regular backup of data, virtual private networks, and so forth.
APA, Harvard, Vancouver, ISO, and other styles
5

Al-Hamami, Alaa Hussein. "The State of the Art and Future Prospective of the Network Security." In Simulation in Computer Network Design and Modeling. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0191-8.ch017.

Full text
Abstract:
The continuous deployment of network services over the wide range of public and private networks has led to transactions and services that include personal, and sometimes quite sensitive, data. Examples of services include: pay-per-view, cable telephony, bill payments by phone, credit card charging, and Internet banking. Such services require significant effort not only to protect the sensitive data involved in the transactions and services but to ensure integrity and availability of network services as well. The requirement for employing heterogeneous networks and systems becomes increasingly important, and as the view of traditional distributed systems has changed to a network centric view in all types of application networks, therefore, the complexity of these systems has led to significant security flaws and problems. Existing conventional approaches for security service development over such complex and most often heterogeneous networks and systems are not satisfying and cannot meet users and applications needs; therefore, several approaches have been developed to provide security at various levels and degrees, such as: secure protocols, secure protocol mechanisms, secure services, firewalls, Intrusion Detection Systems (IDS), and later Intrusion Prevention System (IPS), etc. This chapter considers and addresses several aspects of network security in an effort to provide a publication that summarizes the current status and the promising and interesting future directions and challenges. The authors try to present the state-of-the-art in this chapter for the following topics: Internet security, secure services, security in mobile systems and trust, anonymity, and privacy.
APA, Harvard, Vancouver, ISO, and other styles
6

Meghanathan, Natarajan. "Network Security." In Network Security Technologies. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4789-3.ch011.

Full text
Abstract:
The focus of this chapter is two-fold: It first presents the classical network attacks (such as Session Hijacking, Man-in-the-Middle attack, DNS attacks, Distributed Denial of Service attacks, and other miscellaneous attacks), which have exploited the various vulnerabilities of computer networks in the past, and reviews the solutions that have been implemented since then to mitigate or reduce the chances of these attacks. The authors then present the different network security controls, including the protocols and standards (such as IPSec, Kerberos, Secure Shell, Transport Layer Security, Virtual Private Networks, Firewalls, and S/MIME) that have been adopted in modern day computer networks to control the incidence of attacks in modern day computer networks.
APA, Harvard, Vancouver, ISO, and other styles
7

Mogollon, Manuel. "Information Assurance." In Cryptography and Security Services. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-837-6.ch002.

Full text
Abstract:
The TCP/IP protocol is becoming the world standard for network and computer communications. The number of TCP/IP applications on the Internet and in corporate networks is continually growing, with a resulting increase in network vulnerability. When data communications security is discussed in this text, it refers to communications security for the TCP/IP protocol and to the security mechanisms implemented at the different layers of the TCP/IP stack protocol. This chapter also describes, in a general way, which security mechanisms are used for specific security services.
APA, Harvard, Vancouver, ISO, and other styles
8

M., Thangavel, Pavithra V., and Guru Roja R. "Network Manipulation Using Network Scanning in SDN." In Artificial Intelligence and Security Challenges in Emerging Networks. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7353-1.ch004.

Full text
Abstract:
Network scanning commonly implies the use of the computer network to collect information about the target systems. This type of scanning is performed by hackers for attacking the target and also by the system administrators for assessment of security and maintaining the system. Network scanning mainly analyzes the UDP and TCP network services that are running on the target, the operating system that is used by the target, and the security systems that are placed between the user and targeted hosts. Network scanning includes both the network port scanning and vulnerability scanning. Network manipulation is an effort that is made by the user to modify the network or structure of a network and thus using online network tools to achieve the target. Software-defined networking is a term that comprises several network technologies with the aim of making it adapt the features of flexibility. Key terms for SDN implementation include separation of functionality, virtualization in the network, and configuring programmatically. This chapter explores network manipulation using network scanning in SDN.
APA, Harvard, Vancouver, ISO, and other styles
9

Boyte, Kenneth James. "The Evolution of Cyber Warfare in Information Operations Targeting Estonia, the U.S., and Ukraine." In Developments in Information Security and Cybernetic Wars. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8304-2.ch007.

Full text
Abstract:
This comparative international case study provides a context for considering the evolution of cyber technologies as elements of hybrid warfare, including information operations (IO), capable of killing people, as well as impacting political elections and physical infrastructure (such as power grids and satellite-based communications and weapons systems). Threatened by “autonomous battle networks,” the “Internet of Battle Things” has been considered a domain of modern warfare by the United States since 2011 and by NATO since 2016. Focusing on three historic cyberattacks against three modern democracies—Estonia in 2007, the United States in 2012, and Ukraine during the 2013-2015 conflict—the study shows how computer warfare, first reported in the 1990s, has become integral in warfare for both state and non-state actors—particularly for information warfare waged by proxies to create confusion and manipulate public opinion via satellites that can penetrate national boundaries and firewalls with armies of zombies and botnets.
APA, Harvard, Vancouver, ISO, and other styles
10

Baruah, Siddhartha, Anjana Kakoty Mahanta, and Kanak Ch Sarma. "Security and Authentication Issues of an Embedded System Designed and Implemented for Interactive Internet Users." In Threats, Countermeasures, and Advances in Applied Information Security. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0978-5.ch011.

Full text
Abstract:
Though embedded applications were originally built on standalone devices, nowadays these devices require a growing integration with other systems through their interconnection with TCP/IP networks. Web Services, which provide a service oriented distributed architecture for the interconnection of systems through TCP/IP networks, have been widely adopted for the integration of business applications, but this sort of integration is still not widely provided by embedded applications. The present work aims to demonstrate the feasibility of using Web Services for the integration of embedded applications running on heterogeneous architectures. This is achieved through the provision of a support for the development and deployment of web services for embedded applications. Basic objective of the system developed is to monitor and control Humidity and Temperature through Internet using interactive computer front end. The feasibility of this approach in terms of security and authentications of its Internet users is demonstrated by developing an mail server along with application deployed. Mail server keeps track of authorised users’ with login password and email ID in a database table. This information is used to identify authorised users who are allowed to make changes in control parameters of the stated embedded application.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer networks Firewalls (Computer security) TCP"

1

Alferaidi, Khaled, Robert Piechocki, and F. Alfordy. "Improving TCP Performance in Multi-Hop Coded Wireless Networks." In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2019. http://dx.doi.org/10.1109/cais.2019.8769518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

TANG, Hong-wei, Sheng-zhong FENG, and Xiao-fang ZHAO. "TOSEC: A TCP/IP Offload based Virtual Network Security Framework in NFV Environment." In International Conference on Computer Networks and Communication Technology (CNCT 2016). Atlantis Press, 2017. http://dx.doi.org/10.2991/cnct-16.2017.117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!