Zobrazeno 1 - 10
of 810
pro vyhledávání: '"snort"'
Publikováno v:
International Journal of Electronics and Telecommunications, Vol vol. 70, Iss No 2, Pp 449-453 (2024)
Intrusion Detection System and SMS controller with Snort using SMS Gateway on public networks. The need for an attack detection system that can assist administrators in monitoring the network, so that administrators can cope with threats quickly and
Externí odkaz:
https://doaj.org/article/6e7b2d517468497eab72f46b0bb9dd44
Publikováno v:
Processando o Saber, Vol 16, Pp 01-12 (2024)
O NIST (Instituto Nacional de Parametros e Tecnologia – USA) define a Computação em Nuvem como o acesso de rede sob demanda a um conjunto compartilhado de recursos, de computação configuráveis, que podem ser rapidamente provisionados e liberad
Externí odkaz:
https://doaj.org/article/bbaf619170b7476585e123d5386a058a
Publikováno v:
Iraqi Journal of Information & Communication Technology, Vol 7, Iss 2 (2024)
In the contemporary digital age, the increasing complexity and frequency of cyber threats underscore the need for efficient network intrusion detection systems (NIDS). This paper provides a comprehensive comparative analysis of two prominent NIDS, Sn
Externí odkaz:
https://doaj.org/article/555cb7c960ad4f7eb60417736fde2522
Publikováno v:
JuTISI (Jurnal Teknik Informatika dan Sistem Informasi), Vol 10, Iss 1, Pp 63 – 75-63 – 75 (2024)
Software Defined Network (SDN) merupakan pendekatan dalam pengelolaan jaringan yang memisahkan lapisan kontrol (control plane) dan lapisan pengiriman (data plane) dalam jaringan. Pada jaringan SDN, control plane dikendalikan secara sentral melalui pe
Externí odkaz:
https://doaj.org/article/48ae09a8c13347e2bb460883c1986628
Autor:
M. Agus Syamsul Arifin, Deris Stiawan, Bhakti Yudho Suprapto, Susanto, Tasmi Salim, Mohd Yazid Idris, Mohamed Shenify, Rahmat Budiarto
Publikováno v:
IEEE Access, Vol 12, Pp 170553-170569 (2024)
Supervisory Control and Data Acquisition (SCADA) systems, particularly Remote Terminal Units (RTUs), are vulnerable to cyber-attacks due to their limited computing resources. This study addresses the need for a reliable, publicly available dataset fo
Externí odkaz:
https://doaj.org/article/685e8b9ca0744d32b9b576c9616057b1
Publikováno v:
Journal of Information and Telecommunication, Vol 7, Iss 4, Pp 437-461 (2023)
ABSTRACTMost devices are now connected through the Internet, so cybersecurity issues have raised concerns. This study proposes network services in a virtual environment to collect, analyze and identify network attacks with various techniques. Our con
Externí odkaz:
https://doaj.org/article/ca08169918c341fcb55effc83406d363
Autor:
Fakolujo, Oluwapelumi, Qureshi, Amna
Yes
Software-Defined Networking (SDN), a novel and innovative networking technology, offers programmability and flexibility within networks and centralized control of those networks. The separation of data and control planes, as well as the conc
Software-Defined Networking (SDN), a novel and innovative networking technology, offers programmability and flexibility within networks and centralized control of those networks. The separation of data and control planes, as well as the conc
Externí odkaz:
http://hdl.handle.net/10454/19980
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Techno.Com, Vol 21, Iss 3, Pp 511-522 (2022)
Melihat pentingnya fungsi server sebagai penyedia informasi dan layanan dalam sebuah jaringan, maka penting untuk memastikan bahwa server selalu dalam keadaan aman dan dapat diakses dengan lancar. Server dituntut untuk memiliki tingkat realibilitas d
Externí odkaz:
https://doaj.org/article/aac623860f28457f90ee9a9a6670850c
Autor:
Yuri Prihantono, Kalamullah Ramli
Publikováno v:
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), Vol 6, Iss 2, Pp 322-329 (2022)
Intrusion Detection Systems (IDS) still have unresolved problems, namely the lack of accuracy in attack detection, resulting in false-positive problems and many false alarms. Machine learning is one way that is often utilized to overcome challenges t
Externí odkaz:
https://doaj.org/article/8f32c635722149e6a3ec1b674d8146e6