Zobrazeno 1 - 10
of 2 463
pro vyhledávání: '"Intrusion prevention system"'
Publikováno v:
IEEE Access, Vol 12, Pp 80930-80949 (2024)
The cultural shift of work from on-premises to remote home offices allows hackers to access corporate data by compromising devices attached to home-based broadband routers. Currently, home devices are growing at an exponential rate, e.g., in the form
Externí odkaz:
https://doaj.org/article/b7f3f86e408641c983b28427132daf5a
Autor:
Muhammad Sheeraz, Muhammad Hanif Durad, Shahzaib Tahir, Hasan Tahir, Saqib Saeed, Abdullah M. Almuhaideb
Publikováno v:
IEEE Access, Vol 12, Pp 61848-61859 (2024)
Intrusion Prevention Systems (IPS), capable of preventing the organizational network from a cyber-attack in addition to detecting it, are widely adopted by organizations to protect their networks from unauthorized access, attacks, and malicious activ
Externí odkaz:
https://doaj.org/article/14e4af78d3704855b16228b8d96f8885
Autor:
Hassan Jalil Hadi, Mubashir Adnan, Yue Cao, Faisal Bashir Hussain, Naveed Ahmad, Mohammed Ali Alshara, Yasir Javed
Publikováno v:
Technologies, Vol 12, Iss 8, p 122 (2024)
The development of new technologies has significantly enhanced the monitoring and analysis of network traffic. Modern solutions like the Extended Berkeley Packet Filter (eBPF) demonstrate a clear advancement over traditional techniques, allowing for
Externí odkaz:
https://doaj.org/article/6b7ecb9f2b7b4f52b537028c7ceb8b2d
Autor:
Noe M. Yungaicela-Naula, Cesar Vargas-Rosales, Jesus Arturo Perez-Diaz, Eduardo Jacob, Carlos Martinez-Cagnazzo
Publikováno v:
IEEE Access, Vol 11, Pp 46820-46831 (2023)
Slow-read Distributed Denial of Service (DDoS) attacks are complex to detect and mitigate. Although existing tools allow one to identify these attacks, these tools mainly generate alerts. However, in real scenarios, a large number of attack detection
Externí odkaz:
https://doaj.org/article/67cff276d3a944e6b6c7a0141fbe978f
Publikováno v:
Jurnal Infotel, Vol 14, Iss 4, Pp 277-286 (2022)
Computer networks are built to achieve the main goal of communicating with each other . During the transmission process, it is expected that information can be conveyed quickly, efficiently and safely. Network security serves to avoid damage or even
Externí odkaz:
https://doaj.org/article/ccc1fe4285e34377ad027a127b4ef623
Publikováno v:
Sensors, Vol 24, Iss 2, p 590 (2024)
The Internet of Things (IoT) is rapidly growing, with an estimated 14.4 billion active endpoints in 2022 and a forecast of approximately 30 billion connected devices by 2027. This proliferation of IoT devices has come with significant security challe
Externí odkaz:
https://doaj.org/article/4552fd9c7ac0429abe09d838c0d7db31
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
ICTACT Journal on Communication Technology, Vol 13, Iss 2, Pp 2718-2722 (2022)
In this paper, we model a CAN bus controller for data communication in Internet of Things (IoT) Network. However, most communication taking place via CAN bus may prone to attack. Hence aligning security with Intrusion Prevention System (IPS) to detec
Externí odkaz:
https://doaj.org/article/4bdabf945fac46bd8079e71bae71654e
Publikováno v:
Journal of Information Security and Cybercrimes Research, Vol 5, Iss 1, Pp 35-46 (2022)
Software Defined Networking (SDN) shows network operations to be performed for efficient network operations. Due to the increase in network devices, the percentage of attacks is also increased, and it is challenging to provide defense against such at
Externí odkaz:
https://doaj.org/article/de6c621c11ef423789c1d3eecd2e0dd5
Publikováno v:
JOIV: International Journal on Informatics Visualization, Vol 6, Iss 1, Pp 39-44 (2022)
Distributed Denial of Services (DDoS) is still considered the main availability problem in computer networks. Developing a programmable Intrusion Prevention System (IPS) application in a Software Defined Network (SDN) may solve the specified problem.
Externí odkaz:
https://doaj.org/article/2c2297a8bdf24b73902f31238175172e