To see the other types of publications on this topic, follow the link: Computer networks Firewalls (Computer security) TCP.

Journal articles on the topic 'Computer networks Firewalls (Computer security) TCP'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer networks Firewalls (Computer security) TCP.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Cheng, Haosu, Jianwei Liu, Jian Mao, Mengmeng Wang, Jie Chen, and Jingdong Bian. "A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN." Security and Communication Networks 2018 (November 15, 2018): 1–20. http://dx.doi.org/10.1155/2018/8392080.

Full text
Abstract:
Software-defined networking (SDN) is a representative next generation network architecture, which allows network administrators to programmatically initialize, control, change, and manage network behavior dynamically via open interfaces. SDN is widely adopted in systems like 5G mobile networks and cyber-physical systems (CPS). However, SDN brings new security problems, e.g., controller hijacking, black-hole, and unauthorized data modification. Traditional firewall or IDS based solutions cannot fix these challenges. It is also undesirable to develop security mechanisms in such an ad hoc manner,
APA, Harvard, Vancouver, ISO, and other styles
2

Zain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (October 29, 2019): 1–17. http://dx.doi.org/10.1155/2019/7924690.

Full text
Abstract:
In recent times, secure communication protocols over web such as HTTPS (Hypertext Transfer Protocol Secure) are being widely used instead of plain web communication protocols like HTTP (Hypertext Transfer Protocol). HTTPS provides end-to-end encryption between the user and service. Nowadays, organizations use network firewalls and/or intrusion detection and prevention systems (IDPS) to analyze the network traffic to detect and protect against attacks and vulnerabilities. Depending on the size of organization, these devices may differ in their capabilities. Simple network intrusion detection sy
APA, Harvard, Vancouver, ISO, and other styles
3

Menkus, Belden. "Firewalls in Information Systems Security." EDPACS 23, no. 3 (1995): 9–15. http://dx.doi.org/10.1080/07366989509451685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Harris, B., and R. Hunt. "TCP/IP security threats and attack methods." Computer Communications 22, no. 10 (1999): 885–97. http://dx.doi.org/10.1016/s0140-3664(99)00064-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nour, Boubakr, Hakima Khelifi, Rasheed Hussain, Spyridon Mastorakis, and Hassine Moungla. "Access Control Mechanisms in Named Data Networks." ACM Computing Surveys 54, no. 3 (2021): 1–35. http://dx.doi.org/10.1145/3442150.

Full text
Abstract:
Information-Centric Networking (ICN) has recently emerged as a prominent candidate for the Future Internet Architecture (FIA) that addresses existing issues with the host-centric communication model of the current TCP/IP-based Internet. Named Data Networking (NDN) is one of the most recent and active ICN architectures that provides a clean-slate approach for Internet communication. NDN provides intrinsic content security where security is directly provided to the content instead of communication channel. Among other security aspects, Access Control (AC) rules specify the privileges for the ent
APA, Harvard, Vancouver, ISO, and other styles
6

Bellovin, S. M. "Security problems in the TCP/IP protocol suite." ACM SIGCOMM Computer Communication Review 19, no. 2 (1989): 32–48. http://dx.doi.org/10.1145/378444.378449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Prabadevi, B., and N. Jeyanthi. "Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks." Cybernetics and Information Technologies 17, no. 4 (2017): 69–86. http://dx.doi.org/10.1515/cait-2017-0042.

Full text
Abstract:
AbstractThe bridge protocol (Address Resolution Protocol) ARP, integrating Ethernet (Layer 2) and IP protocol (Layer 3) plays a vital role in TCP/IP communication since ARP packet is the first packet generated during any TCP/IP communications and they are the first traffic from the host. In the large data center, as the size of the broadcast domain (i.e., number of hosts on the network) increases consequently the broadcast traffic from the communication protocols like ARP also increases. This paper addresses the problem faced by Layer 2 protocols like insecured communication, scalability issue
APA, Harvard, Vancouver, ISO, and other styles
8

Kent, S. "Comments on “security problems in the TCP/IP protocol suite”." ACM SIGCOMM Computer Communication Review 19, no. 3 (1989): 10–19. http://dx.doi.org/10.1145/74674.74675.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bodei, Chiara, Lorenzo Ceragioli, Pierpaolo Degano, et al. "FWS: Analyzing, maintaining and transcompiling firewalls." Journal of Computer Security 29, no. 1 (2021): 77–134. http://dx.doi.org/10.3233/jcs-200017.

Full text
Abstract:
Firewalls are essential for managing and protecting computer networks. They permit specifying which packets are allowed to enter a network, and also how these packets are modified by IP address translation and port redirection. Configuring a firewall is notoriously hard, and one of the reasons is that it requires using low level, hard to interpret, configuration languages. Equally difficult are policy maintenance and refactoring, as well as porting a configuration from one firewall system to another. To address these issues we introduce a pipeline that assists system administrators in checking
APA, Harvard, Vancouver, ISO, and other styles
10

Buduri, Reddaiah, SrinivasaRao Kanusu, Swetha Chinthakunta, Amruthavani Godina, and Sivajyothi Siddavatam. "Linear Congruential Pseudorandom Numbered Hybrid Crypto-System with Genetic Algorithms." International Journal of Engineering and Advanced Technology 10, no. 2 (2020): 159–63. http://dx.doi.org/10.35940/ijeat.b2092.1210220.

Full text
Abstract:
While using networks that may be in any form more and more problems related to securityrises within the network as well as outside the network. To resolve the security problems network security is the science that facilitatesto safeguard the resources and the quality of the network and data. At different workstations filters and firewalls are used in protecting the resources. But while the data is in transmission security services are needed to protect. These services are to be altered frequently to prevent from attacks. In developing such system, this work uses linear congruential pseudorando
APA, Harvard, Vancouver, ISO, and other styles
11

Filippov, M. V., N. Yu Ryazanova, and B. I. Ryazantsev. "The Outgoing and Incoming Network Packets Intercepting Method." Mechanical Engineering and Computer Science, no. 12 (January 4, 2018): 45–56. http://dx.doi.org/10.24108/1217.0001344.

Full text
Abstract:
In connexion with the rapidly growing computer network information capacities, information security of local networks connected with global networks becomes a critical challenge. One of the information security aspects is to control and filter the network traffic by intercepting the incoming and outgoing network packets. This is accomplished owing to firewalls. The Linux kernel 2.4.x included the Netfilter firewall and the iptables utility, which allow us to analyse only the packets headers and their pertaining to specific network connections. In addition, the practice of rewriting the Linux k
APA, Harvard, Vancouver, ISO, and other styles
12

Mahfouz, Ahmed, Abdullah Abuhussein, Deepak Venugopal, and Sajjan Shiva. "Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset." Future Internet 12, no. 11 (2020): 180. http://dx.doi.org/10.3390/fi12110180.

Full text
Abstract:
Due to the extensive use of computer networks, new risks have arisen, and improving the speed and accuracy of security mechanisms has become a critical need. Although new security tools have been developed, the fast growth of malicious activities continues to be a pressing issue that creates severe threats to network security. Classical security tools such as firewalls are used as a first-line defense against security problems. However, firewalls do not entirely or perfectly eliminate intrusions. Thus, network administrators rely heavily on intrusion detection systems (IDSs) to detect such net
APA, Harvard, Vancouver, ISO, and other styles
13

Remlein, Piotr, and Urszula Stachowiak. "Security Verification in the Context of 5G Sensor Networks." Journal of Telecommunications and Information Technology 2 (March 30, 2021): 107–19. http://dx.doi.org/10.26636/jtit.2021.153221.

Full text
Abstract:
In order to develop reliable safety standards for 5G sensor networks (SN) and the Internet of Things, appropriate verification tools are needed, including those offering the ability to perform automated symbolic analysis process. The Tamarin prover is one of such software-based solutions. It allows to formally prove security protocols. This paper shows the modus operandi of the tool in question. Its application has been illustrated using an example of an exchange of messages between two agents, with asynchronous encryption. The scheme may be implemented, for instance, in the TLS/DTLS protocol
APA, Harvard, Vancouver, ISO, and other styles
14

Caprolu, Maurantonio, Simone Raponi, and Roberto Di Pietro. "FORTRESS: An Efficient and Distributed Firewall for Stateful Data Plane SDN." Security and Communication Networks 2019 (February 19, 2019): 1–16. http://dx.doi.org/10.1155/2019/6874592.

Full text
Abstract:
The Software Defined Networking (SDN) paradigm decouples the logic module from the forwarding module on traditional network devices, bringing a wave of innovation to computer networks. Firewalls, as well as other security appliances, can largely benefit from this novel paradigm. Firewalls can be easily implemented by using the default OpenFlow rules, but the logic must reside in the control plane due to the dynamic nature of their rules that cannot be handled by data plane devices. This leads to a nonnegligible overhead in the communication channel between layers, as well as introducing an add
APA, Harvard, Vancouver, ISO, and other styles
15

Lee, Se-Yul, and Yong-Soo Kim. "Design and Analysis of Probe Detection Systems for TCP Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 8, no. 4 (2004): 369–72. http://dx.doi.org/10.20965/jaciii.2004.p0369.

Full text
Abstract:
Advanced computer network technology enables the connectivity of computers in an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and cannot detect new hacking patterns, making it vulnerable to previously unidentified attack patterns and variations in attack and increasing false negatives. Intrusion detection and prevention technologies are thus required. We propose a n
APA, Harvard, Vancouver, ISO, and other styles
16

LY, SUNG, and ABBAS BIGDELI. "EXTENDABLE AND DYNAMICALLY RECONFIGURABLE MULTI-PROTOCOL FIREWALL." International Journal of Software Engineering and Knowledge Engineering 15, no. 02 (2005): 363–71. http://dx.doi.org/10.1142/s0218194005001926.

Full text
Abstract:
Security issues within a networking environment are critical, as attacks or intrusions can come from many different sources. Firewalls are an effective tool used for intrusion detection and provide protection against attacks on a system or network. In the past, protection barriers for a local network have been provided using software solutions. Emerging multi-gigabit networking technology and the high uptake of gigabit Ethernet has rendered these solutions inefficient as it cannot cope with the high data rate. In this paper, a new approach using reconfigurable hardware such as Field Programmab
APA, Harvard, Vancouver, ISO, and other styles
17

Suherman, Suherman, Deddy Dikmawanto, Syafruddin Hasan, and Marwan Al-Akaidi. "Embedding the three pass protocol messages into transmission control protocol header." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 1 (2021): 442. http://dx.doi.org/10.11591/ijeecs.v22.i1.pp442-449.

Full text
Abstract:
<span>Transmission control protocol provides reliable communication between two or more parties. Each transmitted packet is acknowledged to make sure successful deliveries. Transport layer security protocols send security information exchange as TCP loads. As results, the handshaking stage experiences longer delay as TCP acknowledgement process has already been delay prone. Furthermore, the security message transfers may have their own risks as they are not well protected yet. This paper proposes TCP-embedded three pass protocol for dynamic key exchange. The key exchange is embedded into
APA, Harvard, Vancouver, ISO, and other styles
18

Prakash N Kalavadekar, Mr, and Dr Shirish S. Sane. "Effect of Mutation and Crossover Probabilities on Genetic Algorithm and Signature Based Intrusion Detection System." International Journal of Engineering & Technology 7, no. 4.19 (2018): 1011. http://dx.doi.org/10.14419/ijet.v7i4.19.28277.

Full text
Abstract:
Conventional methods of intrusion prevention like firewalls, cryptography techniques or access management schemes, have not provided complete protection to computer systems and networks from refined malwares and attacks. Intrusion Detection Systems (IDS) are giving the right solution to the current issues and became an important part of any security management system to detect these threats and will not generate widespread harm. The basic goal of IDS is to detect attacks and their nature that may harm the computer system. Several different approaches for intrusion detection have been reported
APA, Harvard, Vancouver, ISO, and other styles
19

Obanaik, Venkatesh, Lillykutty Jacob, and A. L. Ananda. "Secure performance enhancing proxy: To ensure end-to-end security and enhance TCP performance over IPv6 wireless networks." Computer Networks 50, no. 13 (2006): 2225–38. http://dx.doi.org/10.1016/j.comnet.2005.08.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Cabaj, Krzysztof, Marcin Gregorczyk, Wojciech Mazurczyk, Piotr Nowakowski, and Piotr Żórawski. "Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System." Security and Communication Networks 2019 (February 21, 2019): 1–22. http://dx.doi.org/10.1155/2019/4930908.

Full text
Abstract:
Currently 5G communication networks are envisioned to offer in a near future a wide range of high-quality services and unfaltering user experiences. In order to achieve this, several issues including security, privacy, and trust aspects need to be solved so that the 5G networks can be widely welcomed and accepted. Considering above, in this paper, we take a step towards these requirements by proposing a dedicated SDN-based integrated security framework for the Internet of Radio Light (IoRL) system that is following 5G architecture design. In particular, we present how TCP SYN-based scanning ac
APA, Harvard, Vancouver, ISO, and other styles
21

Murakami, Tadashi, Fukuko Yuasa, Ryouichi Baba, et al. "Long-term experiences in keeping balance between safety and usability in research activities in KEK." EPJ Web of Conferences 214 (2019): 08001. http://dx.doi.org/10.1051/epjconf/201921408001.

Full text
Abstract:
This work aims to provide KEK general-purpose network to support various research activities in the fields of high-energy physics, material physics, and accelerator physics. Since the end of the 20th century, on a daily basis, networks experience cyber-attacks and the methods of attack have rapidly evolved to become more sophisticated over the years. Security measures have been developed to mitigate the effects of cyber-attacks. While security measures may improve safety, restrictions might reduce usability. Therefore, we must keep a balance between safety and usability of the network for a sm
APA, Harvard, Vancouver, ISO, and other styles
22

Statkus, Arūnas, Šarūnas Paulikas, and Audrius Krukonis. "TCP Acknowledgment Optimization in Low Power and Embedded Devices." Electronics 10, no. 6 (2021): 639. http://dx.doi.org/10.3390/electronics10060639.

Full text
Abstract:
Paper investigates transport control protocol (TCP) acknowledgment (ACK) optimization in low power or embedded devices to improve their performance on high-speed links by limiting the ACK rate. Today the dominant protocol for interconnecting network devices is the TCP and it has a great influence on the entire network operation if the processing power of network devices is exhausted to the processing data from the TCP stack. Therefore, on high-speed not congested networks the bottleneck is no longer the network link but low-processing power network devices. A new ACK optimization algorithm has
APA, Harvard, Vancouver, ISO, and other styles
23

Hu, F. F., S. T. Zhang, X. B. Lin, L. Wu, and N. D. Liao. "Classification of Abnormal Traffic in Smart Grids Based on GACNN and Data Statistical Analysis." Security and Communication Networks 2021 (June 16, 2021): 1–19. http://dx.doi.org/10.1155/2021/9927325.

Full text
Abstract:
With the continuous development of smart grids, communication networks carry more and more power services, and at the same time, they are also facing more and more security issues. For example, some malicious software usually uses encryption technology or tunnel technology to bypass firewalls, intrusion detection systems, etc., thereby posing a serious threat to the information security of smart grids. At present, the classification of network traffic mainly depends on the correct extraction of network protocol characteristics. However, the process of extracting network features by some tradit
APA, Harvard, Vancouver, ISO, and other styles
24

Feltus, Frank A., Joseph R. Breen, Juan Deng, et al. "The Widening Gulf between Genomics Data Generation and Consumption: A Practical Guide to Big Data Transfer Technology." Bioinformatics and Biology Insights 9s1 (January 2015): BBI.S28988. http://dx.doi.org/10.4137/bbi.s28988.

Full text
Abstract:
In the last decade, high-throughput DNA sequencing has become a disruptive technology and pushed the life sciences into a distributed ecosystem of sequence data producers and consumers. Given the power of genomics and declining sequencing costs, biology is an emerging “Big Data” discipline that will soon enter the exabyte data range when all subdisciplines are combined. These datasets must be transferred across commercial and research networks in creative ways since sending data without thought can have serious consequences on data processing time frames. Thus, it is imperative that biologists
APA, Harvard, Vancouver, ISO, and other styles
25

Chandran, Rahul, and Wei Q. Yan. "Attack Graph Analysis for Network Anti-Forensics." International Journal of Digital Crime and Forensics 6, no. 1 (2014): 28–50. http://dx.doi.org/10.4018/ijdcf.2014010103.

Full text
Abstract:
The development of technology in computer networks has boosted the percentage of cyber-attacks today. Hackers are now able to penetrate even the strongest IDS and firewalls. With the help of anti-forensic techniques, attackers defend themselves, from being tracked by destroying and distorting evidences. To detect and prevent network attacks, the main modus of operandi in network forensics is the successful implementation and analysis of attack graph from gathered evidences. This paper conveys the main concepts of attack graphs, requirements for modeling and implementation of graphs. It also co
APA, Harvard, Vancouver, ISO, and other styles
26

Melo-López, Cristian Andrés, Octavio José Salcedo-Parra, and Rómulo Andrés Gallego-Torres. "Networks and their traffic in multiplayer games." Revista Científica 1, no. 24 (2016): 100. http://dx.doi.org/10.14483/10.14483/udistrital.jour.rc.2016.24.a10.

Full text
Abstract:
Computer games called multiplayer real-time, or (MCG) are at the forefront of the use of the possibilities of the network. Research on this subject have been made for military simulations, virtual reality systems, computer support teamwork, the solutions diverge on the problems posed by MCG. With this in mind, this document provides an overview of the four issues affecting networking at the MCG. First, network resources (bandwidth, latency and computing capacity), together with the technical limits within which the MCG must operate. Second, the distribution concepts include communication archi
APA, Harvard, Vancouver, ISO, and other styles
27

Lei, Gang, Lejun Ji, Ruiwen Ji, Yuanlong Cao, Xun Shao, and Xin Huang. "Extracting Low-Rate DDoS Attack Characteristics: The Case of Multipath TCP-Based Communication Networks." Wireless Communications and Mobile Computing 2021 (July 7, 2021): 1–10. http://dx.doi.org/10.1155/2021/2264187.

Full text
Abstract:
The multipath TCP (MPTCP) enables multihomed mobile devices to realize multipath parallel transmission, which greatly improves the transmission performance of the mobile communication network. With the rapid development of all kinds of emerging technologies, network attacks have shown a trend of development with many types and rapid updates. Among them, low-rate distributed denial of service (LDDoS) attacks are considered to be one of the most threatening issues in the field of network security. In view of the current research status, by using the network simulation software NS2, this paper fi
APA, Harvard, Vancouver, ISO, and other styles
28

Sun, Wei, Hao Zhang, Li-jun Cai, Ai-min Yu, Jin-qiao Shi, and Jian-guo Jiang. "A Novel Device Identification Method Based on Passive Measurement." Security and Communication Networks 2019 (June 23, 2019): 1–11. http://dx.doi.org/10.1155/2019/6045251.

Full text
Abstract:
Nowadays, with the continuous integration of production network and business network, more and more Industrial Internet of Things and Internal Office Network have been interconnected and evolved into a large-scale enterprise-level intraindustry network. Terminal devices are the basic units of internal network. Accurate identification of the type of device corresponding to the IP address and detailed description of the communication behavior of the device are of great significance for conducting network security risk assessment, hidden danger investigation, and threat warning. Traditional cyber
APA, Harvard, Vancouver, ISO, and other styles
29

Tien, Chin-Wei, Tse-Yung Huang, Ping-Chun Chen, and Jenq-Haur Wang. "Using Autoencoders for Anomaly Detection and Transfer Learning in IoT." Computers 10, no. 7 (2021): 88. http://dx.doi.org/10.3390/computers10070088.

Full text
Abstract:
With the development of Internet of Things (IoT) technologies, more and more smart devices are connected to the Internet. Since these devices were designed for better connections with each other, very limited security mechanisms have been considered. It would be costly to develop separate security mechanisms for the diverse behaviors in different devices. Given new and changing devices and attacks, it would be helpful if the characteristics of diverse device types could be dynamically learned for better protection. In this paper, we propose a machine learning approach to device type identifica
APA, Harvard, Vancouver, ISO, and other styles
30

Liu, Likun, Hongli Zhang, Xiangzhan Yu, Yi Xin, Muhammad Shafiq, and Mengmeng Ge. "An Efficient Security System for Mobile Data Monitoring." Wireless Communications and Mobile Computing 2018 (June 11, 2018): 1–10. http://dx.doi.org/10.1155/2018/9809345.

Full text
Abstract:
During the last decade, rapid development of mobile devices and applications has produced a large number of mobile data which hide numerous cyber-attacks. To monitor the mobile data and detect the attacks, NIDS/NIPS plays important role for ISP and enterprise, but now it still faces two challenges, high performance for super large patterns and detection of the latest attacks. High performance is dominated by Deep Packet Inspection (DPI) mechanism, which is the core of security devices. A new TTL attack is just put forward to escape detecting, such that the adversary inserts packet with short T
APA, Harvard, Vancouver, ISO, and other styles
31

Li, Qing Xue, and Long Hua Mu. "Analysis of Security of SCADA System." Applied Mechanics and Materials 568-570 (June 2014): 1417–21. http://dx.doi.org/10.4028/www.scientific.net/amm.568-570.1417.

Full text
Abstract:
SCADA (Supervisory Control and Data Acquisition) is an important concern about national security of our country and its security professionals. During those early days, a so called "security by obscurity" helped provide a palpable layer of cyber security and defense and a general feeling of immunity kinds of security problems that have started emerging networks to emerge in the mid 1980's, starting with the known Morris Worm. However, with the global standardization of TCP/IP protocol, and for the past 20 years, with the migration of autonomous systems SCADA interconnected power grids, securit
APA, Harvard, Vancouver, ISO, and other styles
32

Borum, Randy, John Felker, Sean Kern, Kristen Dennesen, and Tonya Feyes. "Strategic cyber intelligence." Information & Computer Security 23, no. 3 (2015): 317–32. http://dx.doi.org/10.1108/ics-09-2014-0064.

Full text
Abstract:
Purpose – This paper aims to highlight the importance and role of strategic cyber intelligence to support risk-informed decision-making, ultimately leading to improved objectives, policies, architectures and investments to advance a nation or organization’s interests in the cyber domain. Design/methodology/approach – Integration of professional research literature from the fields of intelligence studies, strategy and information/computer security. Findings – Investing in technology, firewalls and intrusion detection systems is appropriate but, by itself, insufficient. Intelligence is a key com
APA, Harvard, Vancouver, ISO, and other styles
33

Moualla, Soulaiman, Khaldoun Khorzom, and Assef Jafar. "Improving the Performance of Machine Learning-Based Network Intrusion Detection Systems on the UNSW-NB15 Dataset." Computational Intelligence and Neuroscience 2021 (June 15, 2021): 1–13. http://dx.doi.org/10.1155/2021/5557577.

Full text
Abstract:
Networks are exposed to an increasing number of cyberattacks due to their vulnerabilities. So, cybersecurity strives to make networks as safe as possible, by introducing defense systems to detect any suspicious activities. However, firewalls and classical intrusion detection systems (IDSs) suffer from continuous updating of their defined databases to detect threats. The new directions of the IDSs aim to leverage the machine learning models to design more robust systems with higher detection rates and lower false alarm rates. This research presents a novel network IDS, which plays an important
APA, Harvard, Vancouver, ISO, and other styles
34

Cao, Yuanlong, Ruiwen Ji, Lejun Ji, Mengshuang Bao, Lei Tao, and Wei Yang. "Can Multipath TCP Be Robust to Cyber Attacks? A Measuring Study of MPTCP with Active Queue Management Algorithms." Security and Communication Networks 2021 (May 27, 2021): 1–11. http://dx.doi.org/10.1155/2021/9963829.

Full text
Abstract:
With the development of social networks, more and more mobile social network devices have multiple interfaces. Multipath TCP (MPTCP), as an emerging transmission protocol, can fit multiple link bandwidths to improve data transmission performance and improve user experience quality. At the same time, due to the large-scale deployment and application of emerging technologies such as the Internet of Things and cloud computing, cyber attacks against MPTCP have gradually increased. More and more network security research studies point out that low-rate distributed denial of service (LDDoS) attacks
APA, Harvard, Vancouver, ISO, and other styles
35

Rusdan, Muchamad. "Design of Wireless Network System for Digital Village Using Wireless Distribution System." Journal of Informatics, Information System, Software Engineering and Applications (INISTA) 1, no. 2 (2019): 51–59. http://dx.doi.org/10.20895/inista.v1i2.66.

Full text
Abstract:
The purpose of this research is to create a wireless network design in Cijambe Village using WDS so that Cijambe Village can enjoy internet services through wireless networks, which can be used to find information, communication, and market products owned by village communities. A wireless network is one of the best alternatives in building a computer network that is practical and flexible and has high mobility. Most organizations use wireless networks to support existing cable networks, but in reality, the wireless network still uses Unshielded Twisted Pair (UTP) cable media as the backbone o
APA, Harvard, Vancouver, ISO, and other styles
36

Tyler, Dan, and Thiago Viana. "Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network Architecture." Applied Sciences 11, no. 16 (2021): 7499. http://dx.doi.org/10.3390/app11167499.

Full text
Abstract:
Traditional networks are designed to be hard on the outside and soft on the inside. It is this soft inside which has made the traditional perimeter model laughable to attackers, who can easily breach a network and run away with the data without even having to deal with the hardened perimeter. The zero-trust security model, created by John Kindervag in 2010, addresses the security flaws of the traditional perimeter model and asserts that all network traffic on the inside should not be trusted by default. Other core principles of zero trust include verification and continuous monitoring of all c
APA, Harvard, Vancouver, ISO, and other styles
37

Madhavapandian, S., and P. MaruthuPandi. "FPGA implementation of highly scalable AES algorithm using modified mix column with gate replacement technique for security application in TCP/IP." Microprocessors and Microsystems 73 (March 2020): 102972. http://dx.doi.org/10.1016/j.micpro.2019.102972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Fegade, Saurabh, Amey Bhadkamka, Kamlesh Karekar, Jaikishan Jeshnani, and Vinayak Kachare. "Network Intrusion Detection System Using C4.5 Algorithm." Journal of Communications Technology, Electronics and Computer Science 10 (March 1, 2017): 15. http://dx.doi.org/10.22385/jctecs.v10i0.139.

Full text
Abstract:
There is a great concern about the security of computer these days. The number of attacks has increased in a great number in the last few years, intrusion detection is the main source of information assurance. While firewalls can provide some protection, they fail to provide protection fully and they even need to be complemented with an intrusion detection system (IDS). A newer approach for Intrusion detection is data mining techniques.IDS system can be developed using individual algorithms like neural networks, clustering, classification, etc. The result of these systems is good detection rat
APA, Harvard, Vancouver, ISO, and other styles
39

Prajapati, Gourishankar, and Nilay Khare. "A Comparative Study of Software Firewall on Windows and Linux Platform." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 8 (2015): 5967–78. http://dx.doi.org/10.24297/ijct.v14i8.1868.

Full text
Abstract:
Nowadays, the communication through World Wide Web (WWW) is growing rapidly. All the gadgets, computer and handheld devices are connected via wire or wireless media and communicated to each others. Thus, network security is the essential requirement of an organization or individuals. Organizations are protecting their communication from unauthorized access by introducing network firewalls. A Firewall is an application program which runs on any platform such as windows, Linux, Solaris, Macintosh etc and protected the networks or systems via implementing policies and rules. In this paper, the pe
APA, Harvard, Vancouver, ISO, and other styles
40

Peisert, Sean, William Barnett, Eli Dart, et al. "The Medical Science DMZ." Journal of the American Medical Informatics Association 23, no. 6 (2016): 1199–201. http://dx.doi.org/10.1093/jamia/ocw032.

Full text
Abstract:
Abstract Objective We describe use cases and an institutional reference architecture for maintaining high-capacity, data-intensive network flows (e.g., 10, 40, 100 Gbps+) in a scientific, medical context while still adhering to security and privacy laws and regulations. Materials and Methods High-end networking, packet filter firewalls, network intrusion detection systems. Results We describe a “Medical Science DMZ” concept as an option for secure, high-volume transport of large, sensitive data sets between research institutions over national research networks. Discussion The exponentially inc
APA, Harvard, Vancouver, ISO, and other styles
41

Peisert, Sean, Eli Dart, William Barnett, et al. "The medical science DMZ: a network design pattern for data-intensive medical science." Journal of the American Medical Informatics Association 25, no. 3 (2017): 267–74. http://dx.doi.org/10.1093/jamia/ocx104.

Full text
Abstract:
Abstract Objective We describe a detailed solution for maintaining high-capacity, data-intensive network flows (eg, 10, 40, 100 Gbps+) in a scientific, medical context while still adhering to security and privacy laws and regulations. Materials and Methods High-end networking, packet-filter firewalls, network intrusion-detection systems. Results We describe a “Medical Science DMZ” concept as an option for secure, high-volume transport of large, sensitive datasets between research institutions over national research networks, and give 3 detailed descriptions of implemented Medical Science DMZs.
APA, Harvard, Vancouver, ISO, and other styles
42

Wang, Song, Karina Gomez, Kandeepan Sithamparanathan, Muhammad Rizwan Asghar, Giovanni Russello, and Paul Zanna. "Mitigating DDoS Attacks in SDN-Based IoT Networks Leveraging Secure Control and Data Plane Algorithm." Applied Sciences 11, no. 3 (2021): 929. http://dx.doi.org/10.3390/app11030929.

Full text
Abstract:
Software-Defined Networking (SDN) and Internet of Things (IoT) are the trends of network evolution. SDN mainly focuses on the upper level control and management of networks, while IoT aims to bring devices together to enable sharing and monitoring of real-time behaviours through network connectivity. On the one hand, IoT enables us to gather status of devices and networks and to control them remotely. On the other hand, the rapidly growing number of devices challenges the management at the access and backbone layer and raises security concerns of network attacks, such as Distributed Denial of
APA, Harvard, Vancouver, ISO, and other styles
43

Gao, Zhenyu, Jian Cao, Wei Wang, Huayun Zhang, and Zengrong Xu. "Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time." Security and Communication Networks 2021 (September 13, 2021): 1–11. http://dx.doi.org/10.1155/2021/4587862.

Full text
Abstract:
Industry 4.0 focuses on continuous interconnection services, allowing for the continuous and uninterrupted exchange of signals or information between related parties. The application of messaging protocols for transferring data to remote locations must meet specific specifications such as asynchronous communication, compact messaging, operating in conditions of unstable connection of the transmission line of data, limited network bandwidth operation, support multilevel Quality of Service (QoS), and easy integration of new devices. The Message Queue Telemetry Transport (MQTT) protocol is used i
APA, Harvard, Vancouver, ISO, and other styles
44

Aditya, Gadhing Putra, Aminuddin Aminuddin, and Sofyan Arifianto. "Improvisasi Algoritma RSA Menggunakan Generate Key ESRKGS pada Instant Messaging Berbasis Socket TCP." Jurnal Repositor 2, no. 11 (2020): 1444. http://dx.doi.org/10.22219/repositor.v2i11.731.

Full text
Abstract:
AbstrakSocket TCP adalah abstraksi yang digunakan aplikasi untuk mengirim dan menerima data melalui koneksi antar dua host dalam jaringan komputer. Jaringan yang biasa kita gunakan bersifat publik yang sangat rentan akan penyadapan data. Masalah ini dapat teratasi dengan menggunakan algoritma kriptografi pada socket TCP, salah satunya menggunakan algoritma RSA. Tingkat keamanan algoritma RSA standar memiliki celah keamanan pada kunci publik ataupun privat yang berasal dari inputan 2 bilangan prima saat pembangkitan kunci, begitupun dengan algoritma improvisasi RSA meskipun menggunakan 4 bilang
APA, Harvard, Vancouver, ISO, and other styles
45

Alkahtani, Hasan, Theyazn H. H. Aldhyani, and Mohammed Al-Yaari. "Adaptive Anomaly Detection Framework Model Objects in Cyberspace." Applied Bionics and Biomechanics 2020 (December 9, 2020): 1–14. http://dx.doi.org/10.1155/2020/6660489.

Full text
Abstract:
Telecommunication has registered strong and rapid growth in the past decade. Accordingly, the monitoring of computers and networks is too complicated for network administrators. Hence, network security represents one of the biggest serious challenges that can be faced by network security communities. Taking into consideration the fact that e-banking, e-commerce, and business data will be shared on the computer network, these data may face a threat from intrusion. The purpose of this research is to propose a methodology that will lead to a high level and sustainable protection against cyberatta
APA, Harvard, Vancouver, ISO, and other styles
46

Staudemeyer, Ralf C., and James Connan. "Burning money with firewalls." South African Computer Journal 56 (July 11, 2015). http://dx.doi.org/10.18489/sacj.v56i1.322.

Full text
Abstract:
Protecting computing infrastructure is an expensive but necessary task. Companies that run their own computing infrastructure need to constantly vigilant in order to guard against intruders on their networks and groups or individuals that seek to intercept their communications. Companies turn to Firewall and Intrusion Detection System vendors to help them safeguard their information and infrastructure. These companies are putting their faith in expensive devices that attempt to distinguish between friendly and malicious traffic. Despite the expense and complexity of these systems, malicious us
APA, Harvard, Vancouver, ISO, and other styles
47

Downs, Daniel M., Ilir Ademaj, and Amie M. Schuck. "Internet security: Who is leaving the ‘virtual door’ open and why?" First Monday, December 26, 2008. http://dx.doi.org/10.5210/fm.v14i1.2251.

Full text
Abstract:
The purpose of the present paper is to study Chicago residents’ knowledge about Internet security and their utilization of prevention and detection tools. The results from hierarchical linear models suggest that there are significant gender, race, age, and community differences in knowledge about firewalls, spyware, phishing and data encryption, as well as the utilization of prevention and detection tools such as anti-virus programs, pop-up blockers and parental control software. Further, diffusion of innovation theory and utopian and dystopian perspectives toward technology help to explain so
APA, Harvard, Vancouver, ISO, and other styles
48

"Guardicore: Rethink Firewalls – Security and agility for the modern enterprise." Network Security 2020, no. 11 (2020): 4. http://dx.doi.org/10.1016/s1353-4858(20)30125-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Leiss, Ernst L., and Jianyu You. "Firewall Monitoring." CLEI Electronic Journal 1, no. 1 (1998). http://dx.doi.org/10.19153/cleiej.1.1.4.

Full text
Abstract:

 
 
 Securing resources against unauthorized access and/or use is a major concern of every organization that uses computer networks. To protect internal networks from external attacks, firewalls are utilized since they restrict network access while letting legitimate users have unencumbered access. Firewalls are also used to log security auditing information about connections and operations. We describe a monitor database gateway (MDBG) designed and implemented to replace older forms of firewall logging by a database system. SQL commands can be used to retrieve logged informati
APA, Harvard, Vancouver, ISO, and other styles
50

Kaur, Goldendeep, and Jyoteesh Malhotra. "Comparative Investigation of ARP Poisoning Mitigation Techniques Using Standard Testbed for Wireless Networks." Journal of Cyber Security and Mobility, November 30, 2015. http://dx.doi.org/10.13052/2245-1439.423.

Full text
Abstract:
Due to the increasing demand of wireless networks, there is an increasing necessity for security as well. This is because unlike wired networks, wireless networks can be easily hacked form outside the building if proper security measures are not in place as wireless networks make use of radio waves and radio waves can leak outside of building at distances up to 300 feet or more. So everything we do on our network can be monitored by anyone who has wireless capabilities. This unauthorized access can be used as an essence by the hacker to launch various kinds of attacks like man-in-the-middle at
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!