Zobrazeno 1 - 10
of 201
pro vyhledávání: '"ipfix"'
Autor:
Adam Flizikowski, Mateusz Majewski, Maria Hołubowicz, Zbigniew Kowalczyk, Simon Pietro Romano
Publikováno v:
Journal of Telecommunications and Information Technology, Iss 1 (2023)
Inherent heterogeneity of the networks increases risk factor and new security threats emerge due to the variety of network types and their vulnerabilities. This paper presents an example of applied security framework – the INTERSECTION. By referrin
Externí odkaz:
https://doaj.org/article/4c47ecd336ae4a7e8f41f923e4be83f9
Autor:
Mohamed Naas, Jan Fesl
Publikováno v:
Data in Brief, Vol 47, Iss , Pp 108945- (2023)
Encryption of network traffic should guarantee anonymity and prevent potential interception of information. Encrypted virtual private networks (VPNs) are designed to create special data tunnels that allow reliable transmission between networks and/or
Externí odkaz:
https://doaj.org/article/b44e8e2f67d44f2682f6881f8fee2156
Publikováno v:
Acta Electrotechnica et Informatica, Vol 21, Iss 2, Pp 13-16 (2021)
This article deals with the implementation and experimental verification of the suitability of the TinyIPFIX protocol for data transmission in the Internet of Things environment. The work was devoted to the creation of three main components, namely
Externí odkaz:
https://doaj.org/article/d742ed01896f467590550b8a5654b29e
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Acta Electrotechnica et Informatica, Vol 21, Iss 2, Pp 13-16 (2021)
This article deals with the implementation and experimental verification of the suitability of the TinyIPFIX protocol for data transmission in the Internet of Things environment. The work was devoted to the creation of three main components, namely T
Publikováno v:
Andersen, M F, Pedersen, J M & Vasilomanolakis, E 2022, Detecting DNS hijacking by using NetFlow data . in 2022 IEEE Conference on Communications and Network Security (CNS) . IEEE, pp. 273-280, 2022 IEEE Conference on Communications and Network Security (CNS), Austin, Texas, United States, 03/10/2022 . https://doi.org/10.1109/CNS56114.2022.9947264
Fejrskov, M, Pedersen, J M & Vasilomanolakis, E 2022, Detecting DNS hijacking by using NetFlow data . in Proceedings of 10 th IEEE Conference on Communications and Network Security . IEEE, 10 th annual IEEE Conference on Communications and Network Security, Austin, Texas, United States, 03/10/2022 . https://doi.org/10.1109/CNS56114.2022.9947264
Fejrskov, M, Pedersen, J M & Vasilomanolakis, E 2022, Detecting DNS hijacking by using NetFlow data . in Proceedings of 10 th IEEE Conference on Communications and Network Security . IEEE, 10 th annual IEEE Conference on Communications and Network Security, Austin, Texas, United States, 03/10/2022 . https://doi.org/10.1109/CNS56114.2022.9947264
DNS hijacking represents a security threat to users because it enables bypassing existing DNS security measures. Several malware families exploit this by changing the client DNS configuration to point to a malicious DNS resolver. Following the assump
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::13dcfb6f4189e040494f4f51f1a975f4
https://vbn.aau.dk/ws/files/518923826/Detecting_DNS_hijacking_by_using_NetFlow_data_version_with_copyright.pdf
https://vbn.aau.dk/ws/files/518923826/Detecting_DNS_hijacking_by_using_NetFlow_data_version_with_copyright.pdf
Publikováno v:
Tongxin xuebao, Vol 35, Pp 5-9 (2014)
An algorithm based on IPFIX network flow data is proposed.By using proposed algorithm,suspicious and abnormal DNS will be detected accurately,and DNS traffic amplification attack will be distinguished rapidly.This algorithm has been applied in the Ts
Externí odkaz:
https://doaj.org/article/7c7df37e061946c49f10ad733c03599e
Publikováno v:
Advances in Electrical and Electronic Engineering, Vol 12, Iss 4, Pp 325-333 (2014)
The main goal of VoIP services is to provide a reliable and high-quality voice transmission over packet networks. In order to prove the quality of VoIP transmission, several approaches were designed. In our approach, we are concerned about on-line mo
Externí odkaz:
https://doaj.org/article/0708f423014449c4b6060c9bdf84d81f
Publikováno v:
Acta Informatica Pragensia. 2(1):101-121
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=664215
Autor:
Tleugaliyev, Y.U.
The information security of the terminal devices themselves and the data stored in them is very important not only for ordinary people, it is also very important for corporations, companies, government agencies, where every user of a corporate domain
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2ecf949e565ffd6e015591a0319f2ad4