Design and Implementation of Chatbot Framework For Network Security Cameras

Author(s):  
Truong Van Cuong ◽  
Tran Minh Tan
2013 ◽  
Vol 433-435 ◽  
pp. 1597-1602
Author(s):  
Jian Shi ◽  
Song Deng ◽  
Wei Min Lin ◽  
Tao Zhang ◽  
Yuan Yuan Ma ◽  
...  

The firewall is one of the most important network security facility and is widely used as a base infrastructure in a large enterprise network. When policy changes, the administrator must find all the potential conflicts between existing policies to ensure network security. That's a waste of time and energy. Proceeding from the demands, this paper analyzes key points and difficulties in the design process for the tools, applies mature algorithm of policy conflict detection, and finally proposes a flexible and scalable design. The prototype system proves that the tool does effectively detect all conflicts in policy set, and in the form of reports for the administrator.


2014 ◽  
Vol 644-650 ◽  
pp. 3283-3286 ◽  
Author(s):  
Shun Qing Wang ◽  
Hai Yan Chen

Being important in the field of network security, it is essential to study the firewall technology that has been an indispensable part of computer networks. This paper describes a new design and implementation of ASIC firewall architecture based on the state detection technology. Implementation and measurements in a real network show that the proposed system can provide high performance with reliability, flexibility, and security.


2020 ◽  
Vol 20 ◽  
pp. 95-108
Author(s):  
Zhiyong Shan ◽  
Vinod Namboodiri

In recent years, the emerged network worms and attacks have distributive characteristics, which can spread globally in a short time. Security management crossing network to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. This paper proposes a hierarchical distributed network security management system (HD-NSMS), which can centrally manage security across networks. First describes the system in macrostructure and microstructure; then discusses three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; at last, it describes the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).


Author(s):  
Abdul Rajak ◽  
Vilas H. Gaidhane ◽  
Aaron D’costa

Background: Network security is used to secure data transmission over the wireless network. Encryption of information plays a vital role in communication since it protects the sender and receiver from the hackers trying to access the information. Objectives: In recent years, protecting the information data has become a challenging task for the researchers. Hence, there is a need to improve the existing methods of secure data transmission. Method: In this paper, a new approach is proposed to implement a better security chip for secured data transmission. It is based on the combination of encryption and description as well as the compression techniques. The proposed design focuses on the reduction of delay in the circuit using the compression approach. Results: The various simulations are carried out using the Xilinx, and MATLAB software. The timing signals are observed on Xilinx and the proposed algorithm has been simulated and tested on MATLAB. Conclusion: The presented approach performed better and achieved a good compression ratio and hence the loss of information was less at the receiving end.


Sign in / Sign up

Export Citation Format

Share Document