computer network management
Recently Published Documents


TOTAL DOCUMENTS

27
(FIVE YEARS 4)

H-INDEX

3
(FIVE YEARS 0)

2021 ◽  
Vol 11 (3) ◽  
pp. 239-246
Author(s):  
Rusydi Umar ◽  
Imam Riadi ◽  
Ridho Surya Kusuma

Sodinokibi Ransomware virus becomes a severe threat by targeting data encryption on a server, and this virus infection continues to spread to encrypt data on other computers. This study aims to mitigate by experiment with building a prevention system through computer network management. The mitigation process is carried out through static, dynamic, and Software-Defined Networking (SDN) analysis to prevent the impact of attacks through programmatic network management. SDN consists of two main components in its implementation, the Ryu controller and Open Virtual Switch (OVS). Result testing mitigation system on infected networks by crippling TCP internet protocol access can reduce virus spread by 17.13% and suppress Sodinokibi traffic logs by up to 73.97%. Based on the percentage data, SDN-based mitigation in this study is per the objectives to make it possible to mitigate Ransomware attacks on computer network traffic.


2014 ◽  
Vol 1079-1080 ◽  
pp. 683-685
Author(s):  
Hong Jin Li

Computer network is a product of modern computer technology and communications technologies. Computer network management technology refers to the initialization operation and monitor operation of computer networks in the active state. Computer network management technology function is to collect the related information in the network system. This article will mainly focus on computer network management technology and its application to start on.


2013 ◽  
Vol 6 (2) ◽  
pp. 329-335
Author(s):  
Rachna Kulhare ◽  
Dr. Divakar Singh

Network security has been one of the most important problems in Computer Network Management and Intrusion is the most publicized threats to security. In recent years, intrusion detection has emerged as an important field for network security. IDSs obtain better results when each class ofattacks is treated as a separate problem and handled by specialized algorithms. Now in days various model and method are available for intrusion detection. In this paper, we present a study of intrusion detection. Detection method to improve the detection rate & helping the users to develop secure information systems.


Sign in / Sign up

Export Citation Format

Share Document