scholarly journals Proactive Intrusion Detection and SNMP-Based Security Management: New Experiments and Validation

Author(s):  
J. B. D. Cabrera ◽  
L. Lewis ◽  
X. Qin ◽  
C. Gutiérrez ◽  
W. Lee ◽  
...  
Author(s):  
Zuhoor Abdullah Salim Al-Khanjari ◽  
Asaad Abdulrahman Nayyef

The increase of attacks on e-Government infrastructures led to the emergence of several information security techniques. Insider threat is one of the most complex problems in information security. It requires a sophisticated response to detect and protect the un-authorized use. This chapter provides a framework for developing a high level security management for e-Government website. The framework is based on the sensors and detectors, which consist of relatively small amounts of source code to detect all attacks in e-Government website against all threats in real time. In this chapter, the authors also provide a full illustration of how to design and protect all files used to implement a secure e-Government websites. This should contain a self- audit of the file and represent a kind of processes that are used to protect data in different types of files including: image, sound, string or any file within e-Government website.


2019 ◽  
Vol 9 ◽  
pp. 19-24
Author(s):  
Anastasia Goldobina ◽  
Igor Karmanov ◽  
Polina Zviagintceva

The article demonstrates the importance of modeling in the implementation of the developed system at the enterprise, helping to avoid significant economic losses, and providing protection of information during the work of intrusion detection in information systems built with using optical equipment.


2009 ◽  
pp. 458-466
Author(s):  
H. Gunes Kayacik ◽  
A. Nur Zincir-Heywood

Along with its numerous benefits, the Internet also created numerous ways to compromise the security and stability of the systems connected to it. In 1995, 171 vulnerabilities were reported to CERT/CC © while in 2003, there were 3,784 reported vulnerabilities, increasing to 8,064 in 2006 (CERT/CC©, 2006). Operations, which are primarily designed to protect the availability, confidentiality, and integrity of critical network information systems are considered to be within the scope of security management. Security management operations protect computer networks against denial-of-service attacks, unauthorized disclosure of information, and the modification or destruction of data. Moreover, the automated detection and immediate reporting of these events are required in order to provide the basis for a timely response to attacks (Bass, 2000). Security management plays an important, albeit often neglected, role in network management tasks.


Author(s):  
H. Gunes Kayacik ◽  
A. Nur Zincir-Heywood ◽  
Malcolm I. Heywood

Along with its numerous benefits, the Internet also created numerous ways to compromise the security and stability of the systems connected to it. In 2003, 137529 incidents were reported to CERT/CC© while in 1999, there were 9859 reported incidents (CERT/CC©, 2003). Operations, which are primarily designed to protect the availability, confidentiality, and integrity of critical network information systems, are considered to be within the scope of security management. Security management operations protect computer networks against denial-of-service attacks, unauthorized disclosure of information, and the modification or destruction of data. Moreover, the automated detection and immediate reporting of these events are required in order to provide the basis for a timely response to attacks (Bass, 2000). Security management plays an important, albeit often neglected, role in network management tasks.


Sign in / Sign up

Export Citation Format

Share Document