A similarity-based M(1,2,3) approach for rating the security of network systems

Author(s):  
Junhu Ruan ◽  
Yan Shi ◽  
Takashi Samatsu
2014 ◽  
Vol 543-547 ◽  
pp. 2858-2861
Author(s):  
Xiao Mei Zhang ◽  
Yuan Cheng ◽  
Bing Qi ◽  
Chen Xiong

According to the existing network maintenance system and the basic principles of composition, this paper provides a terminal system scheme and network maintenance management system based on BeiDou Navigation Satellite System (BDS) compatible with GPS by analyzing the system structure, functional architecture and software architecture. Studies have shown that the BDS compatible with GPS system can manage and monitor personnel and vehicles in real time and improves the reliability and security of network systems.


2014 ◽  
Vol 602-605 ◽  
pp. 2773-2775
Author(s):  
Wen Kui Zheng ◽  
Man Jin

The traditional embedded system networking technology ignores the security of network systems, either ignores fast networking requirements of network system, these requirements can be achieved at the same time. A embedded dynamic security networking technology based on fast jump and trust degree is proposed, when systems is networking, the use of random beating from multiple network nodes and fast switching optimize network search methods. Experimental results show that the proposed method can detect distribution of systems security risks accurately, and has a good application value for network security.


2016 ◽  
Vol 2 (9) ◽  
Author(s):  
Shweta Sharma ◽  
Prof. Aishwarya Mishra

Security of network systems is becoming an important issue, as more and sensitive information is being stored and manipulated online. Therefore, it is essential to find an effective way to protect it. Mining approach can play very important role in developing an intrusion detection system. This paper presents various data mining Classification techniques applied on intrusion detection systems for the effective identification of both known and unknown patterns of attacks, to develop secure information systems.


1988 ◽  
Vol 4 (4) ◽  
pp. 34-35
Author(s):  
Sir Yvo Henniker-Heaton

2020 ◽  
pp. 16-20
Author(s):  
Marina Ozhiganova ◽  
◽  
Emil Kurtametov ◽  

Security of network systems has become a necessity, as more and more important information is stored and used online. The spread of web applications opens up new attack vectors. Traditional security mechanisms, such as firewalls, are not designed to protect web applications and therefore do not provide adequate protection. Current attacks cannot be prevented only by blocking ports 80 (HTTP) and 443 (HTTPS). Preventative measures (such as web application firewall rules) are not always possible. Signature methods for detection are always behind the actual event. Protocol-enforced network firewalls usually provide the first line of defense, delaying most major attacks on the network perimeter. They mainly work on the network, session, and transport layers of the reference network model (OSI). Developers have significantly expanded the capabilities of network firewalls to control the integrity of a wide range of top-level protocols, such as DNS, FTP, HTTP, SMTP, and TFTP. Standard firewalls can help restrict or allow access to network ports. Although application proxy firewalls exist, they cannot understand the specific content of all web applications run by an enterprise. The purpose of this article is to study the features of using machine learning in web application protection. Methods of web application security and learning neural networks were studied. The result of this work is a theoretical overview of the neural network security of a web application.


Author(s):  
A. Rethina Palin ◽  
I. Jeena Jacob

Wireless Mesh Network (MWN) could be divided into proactive routing, reactive routing and hybrid routing, which must satisfy the requirements related to scalability, reliability, flexibility, throughput, load balancing, congestion control and efficiency. DMN (Directional Mesh Network) become more adaptive to the local environments and robust to spectrum changes. The existing computing units in the mesh network systems are Fog nodes, the DMN architecture is more economic and efficient since it doesn’t require architecture- level changes from existing systems. The cluster head (CH) manages a group of nodes such that the network has the hierarchical structure for the channel access, routing and bandwidth allocation. The feature extraction and situational awareness is conducted, each Fog node sends the information regarding the current situation to the cluster head in the contextual format. A Markov logic network (MLN) based reasoning engine is utilized for the final routing table updating regarding the system uncertainty and complexity.


Author(s):  
Hiroyuki HATANO ◽  
Masahiro FUJII ◽  
Atsushi ITO ◽  
Yu WATANABE ◽  
Yusuke YOSHIDA ◽  
...  

Author(s):  
Sandeep Kumar Yadav ◽  
◽  
Daya Shankar Pandey ◽  
Shrikant Lade ◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document