Journal articles on the topic 'System and network security'

To see the other types of publications on this topic, follow the link: System and network security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'System and network security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Zhou, Wanlei, and Yang Xiang. "Network and system security." Journal of Network and Computer Applications 32, no. 2 (March 2009): 345–46. http://dx.doi.org/10.1016/j.jnca.2008.06.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

He, Shen, Jing Huang, and Penglin Yang. "Build with intrinsic security: Trusted autonomy security system." International Journal of Distributed Sensor Networks 16, no. 11 (November 2020): 155014772097453. http://dx.doi.org/10.1177/1550147720974535.

Full text
Abstract:
Security of Internet of things network is difficult to manage because Internet of things devices are heterogeneous and always deployed in remote places. Based on these features, attacks against Internet of things network like distributed denial-of-service and system intrusion are easier than traditional network. In order to enhance Internet of things network’s security, in this article we propose the concept of intrinsic security to establish a trusted and autonomy Internet of things network. Intrinsic security emphasizes that network itself must be trusted and security autonomous to address the security problems which are caused by remote and heterogeneous. Based on this thought, we designed the architecture of Trusted Autonomy Security System. Trusted Autonomy Security System maintains a LAN characterized by trusted and security autonomy, in which all Internet of things network gateways formed a decentralized autonomy system to evaluate if other gateways or Internet of things devices are secure. Compared to traditional Internet of things networks, this architecture uses trusted computing technique to build the basic of security, and makes Internet of things network available to manage security automatically. In addition, the decentralized architecture could reduce security risks caused by compromise of single node in Internet of things network. With these advantages, it can be expected that this novel idea will have more development in Internet of things scenarios with high security requirements.
APA, Harvard, Vancouver, ISO, and other styles
3

Ganzhur, M. A., and A. I. Bryukhovetsky. "Network security systems." Herald of Dagestan State Technical University. Technical Sciences 49, no. 3 (November 8, 2022): 61–67. http://dx.doi.org/10.21822/2073-6185-2022-49-3-61-67.

Full text
Abstract:
Objective. Network security systems are one of the key players in today's business life. Some networks are private while others are open to the public. Whether your network is private or public, it must be well secured and secure. In this article, we will discuss where network security begins, and describe the general measures taken to secure it.Method. The study is determined by the need to solve the problem of algorithmic and mathematical support for assessing the functional security of a network based on system modeling and finding erroneous positions.Result. Proposed deployment of a private network system that is designed and serves a specific group of people for communication, collaboration and sharing.Conclusion. The proposed methods can be effective in protecting the network from attacks and other security threats. Well-designed corporate policies are critical to defining and controlling access to various parts of the network.
APA, Harvard, Vancouver, ISO, and other styles
4

Megat Mohamed Noor, Megat Norulazmi. "Community based home security system using wireless mesh network." International Journal of Academic Research 5, no. 5 (October 10, 2013): 73–79. http://dx.doi.org/10.7813/2075-4124.2013/5-5/a.9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kozlov, Dmitriy, and Natalia Sadovnikova. "Security System of POS-Network." NBI Technologies 14, no. 1 (September 2020): 6–10. http://dx.doi.org/10.15688/nbit.jvolsu.2020.1.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Adamczyk, Piotr, Grzegorz Kiryk, Jarosław Napiórkowski, and Andrzej Walczak. "Network model of security system." MATEC Web of Conferences 76 (2016): 02002. http://dx.doi.org/10.1051/matecconf/20167602002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

White, Gregory B., Eric A. Fisch, and Udo W. Pooch. "Computer System and Network Security." EDPACS 25, no. 8 (February 1998): 12–13. http://dx.doi.org/10.1201/1079/43236.25.8.19980201/30188.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Röpke, Christian, and Thorsten Holz. "On network operating system security." International Journal of Network Management 26, no. 1 (November 11, 2015): 6–24. http://dx.doi.org/10.1002/nem.1918.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

McDonald, Kenneth, Joshua Akers, Forrest Bartz, Daniel Beck, Israel Castro, and LTC Robert Prins. "Food Security Network Modeling." Industrial and Systems Engineering Review 4, no. 2 (November 12, 2016): 114–30. http://dx.doi.org/10.37266/iser.2016v4i2.pp114-130.

Full text
Abstract:
Food security creates a complex issue for American interests. Within a constantly expanding operational environment, food security remains a vital lifeline both domestically and abroad. Current methods of mapping an area’s food system rely on ad-hoc assessments that produce skewed results and minimal metric analysis. Previous assessments methodologies failed to incorporate components of a food system that influences the overall stability of an area. The research conducted utilized the Systems Decision Process (SDP) to create a value hierarchy and model that provide an assessment for an areas food system. The findings from the research showcase that a food system relies on several variables such as infrastructure, dietary needs, and the national stability of a region. A more enhanced assessment model was developed that placed an overarching value to a food network that allows ground commanders to gain a holistic overview of the condition of an areas food system.
APA, Harvard, Vancouver, ISO, and other styles
10

B N, Mangalagowri, and Dr N. Sandeep Varma. "Intrusion Detection System of IPv6 Network." International Journal for Research in Applied Science and Engineering Technology 10, no. 9 (September 30, 2022): 1267–74. http://dx.doi.org/10.22214/ijraset.2022.46628.

Full text
Abstract:
Abstract: There are variations within the network of the differential computing system's underlying IPv6 network. There are different blind zones for security detection. It is thoroughly investigated how the automatic data processing system differs from the underlying IPv6 network. An enhanced underlying IPv6 network security detection module design approach is suggested for the multicomputer system based on this concept. One gets the comprehensive module design plan. The new technologies like receiving thread domain, object forwarding domain, and file buffer are taken into account by the network security detection system. It can alleviate the challenges with security detection brought on by IPv6 network variations in the underlying computing system. Thus, IPv6 networks have a significantly lower number of blind zones.
APA, Harvard, Vancouver, ISO, and other styles
11

Satria, Deni, Alde Alanda, Aldo Erianda, and Deddy Prayama. "Network Security Assessment Using Internal Network Penetration Testing Methodology." JOIV : International Journal on Informatics Visualization 2, no. 4-2 (October 6, 2018): 360. http://dx.doi.org/10.30630/joiv.2.4-2.190.

Full text
Abstract:
The development of information technology is a new challenge for computer network security systems and the information contained in it, the level of awareness of the importance of network security systems is still very low. according to a survey conducted by Symantec, the desire to renew an existing security system within a year within a company has the result that only 13% of respondents consider changes to the security system to be important from a total of 3,300 companies worldwide as respondents. This lack of awareness results in the emergence of security holes that can be used by crackers to enter and disrupt the stability of the system. Every year cyber attacks increase significantly, so that every year there is a need to improve the security of the existing system. Based on that, a method is needed to periodically assess system and network security by using penetrarion testing methods to obtain any vulnerabilities that exist on the network and on a system so as to increase security and minimize theft or loss of important data. Testing is carried out by using internal network penetration testing method which tests using 5 types of attacks. From the results of the tests, each system has a security risk of 20-80%. From the results of these tests it can be concluded that each system has a security vulnerability that can be attacked.
APA, Harvard, Vancouver, ISO, and other styles
12

Zhang, De Gang, Yi Wu, Wen Bing Zhang, De Hai Zhang, and Shao Quan Zhang. "The Design of a Physical Network Isolation System." Applied Mechanics and Materials 687-691 (November 2014): 2192–95. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2192.

Full text
Abstract:
Currently, the main network security mechanisms (such as firewall, intrusion detection, and vulnerability scanning) cannot prevent malicious attacks absolutely from the public network. Therefore, how to ensure the security of the information in the private network is a hot topic. In this paper, a network physical isolation system is designed based on private protocol, in which internal and external networks are physically isolated during the data transmission. Thereby, the security of network information is protected and the network security problems can be solved effectively through this isolation system. This isolation system can be applied in high security network environment such as government departments and business units, etc.
APA, Harvard, Vancouver, ISO, and other styles
13

ENNERT, Michal, Branislav MADOŠ, and Zuzana DUDLÁKOVÁ. "DATA VISUALIZATION OF NETWORK SECURITY SYSTEMS." Acta Electrotechnica et Informatica 14, no. 4 (December 1, 2014): 13–16. http://dx.doi.org/10.15546/aeei-2014-0034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Zhang, Ya Na, Li Han, and Xin Cao. "Design of Network Information Security System." Advanced Materials Research 1022 (August 2014): 257–60. http://dx.doi.org/10.4028/www.scientific.net/amr.1022.257.

Full text
Abstract:
In this paper, in order to design the system based on the principle of the site, focusing on advanced systems, scalability and reliability at the same time, the introduction of design requirements and the target site system from two aspects of the system architecture and modular design of the system discussed and design. Full system architecture is designed for secure site information. The results show that the system can guarantee the availability and security of the site and prevent a variety of adverse information is released and the view to improve the quality of service of Web sites and Web applications.
APA, Harvard, Vancouver, ISO, and other styles
15

Ma, Jie, and Shuanbao Li. "The Construction Method of Computer Network Security Defense System Based on Multisource Big Data." Scientific Programming 2022 (May 12, 2022): 1–13. http://dx.doi.org/10.1155/2022/7300977.

Full text
Abstract:
This article proposes a computer network security defense system model based on multisource big data, which makes the security of computer networks more complete because of the shortage of current computer network security defense systems. The current network security situation is analyzed, and the problems faced in the field of network security are pointed out; then, multisource big data is introduced, and the characteristics of the multisource big data model are analyzed. This article proposes an information system network security model, which formally describes the relationship between network behavior among nodes, security threats, network attacks, and defense capability of security devices in an information system. After that, a network security defense system measurement scheme is constructed based on hierarchical analysis, and quantitative indicators of defense effectiveness are defined in two dimensions: risk severity of security threats and defense response actions of security devices, which enables quantitative evaluation of the security defense system, and then identifies omissions and defects of the network security defense system. A defense system measurement and optimization system is designed based on the proposed network security system measurement and optimization scheme. The application analysis of the project is combined with the actual scenarios. Through the evaluation and optimization of the security defense system in the natural methods, it is proved that the network security defense system evaluation and optimization scheme proposed in this article has reasonableness and effectiveness in the actual application.
APA, Harvard, Vancouver, ISO, and other styles
16

Guynes, Carl S., Yu Andy Wu, and John Windsor. "E-Commerce/Network Security Considerations." International Journal of Management & Information Systems (IJMIS) 15, no. 2 (March 21, 2011): 1. http://dx.doi.org/10.19030/ijmis.v15i2.4147.

Full text
Abstract:
E-Commerce security issues can be grouped under the categories of system availability, data integrity, and data privacy. System availability means that all necessary components are available to support a given users transmission requirements. Data integrity means that all valid messages that are sent are received, messages are not altered in such as way as to make them invalid, and unauthorized messages are not introduced and transmitted over the network. Data privacy means that transmitted messages contain only 'need to know' information and are seen only by their intended audience. Enterprise network security is typically reactive, and relies heavily on host security. This approach creates complicated interactions between protocols and systems that can cause incorrect behavior and slow response to attacks. Network security at both the e-commerce and customer sites must be constantly reviewed and suitable countermeasures must be planned. The security of a site depends on the security of the internal systems and the security of external networks.
APA, Harvard, Vancouver, ISO, and other styles
17

Zhou, Jian, Shan Shan Li, and Wei Jie Tan. "The Research of Tri-Networks Integration Security Control System." Advanced Materials Research 268-270 (July 2011): 1012–16. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1012.

Full text
Abstract:
Aiming at face Tri-networks integration demand bearing network/core backbone, carry out research of security control technical structure , key technologies and standards systematic In Tri-networks integration environment, to Build a safer control system that includes Facing the Tri-networks integration of business, network, content, behavior, etc. Research oriented business level controls and abnormal behavior of preventing high-speed low delay safety control equipment, builds the control center system, realize the legality of different modal information content safety monitoring control, network security situation analysis and display, control strategy of unified management and dynamic maintenance, and other functions. validation the functions and performance of security control network system, argumentation the feasibility and evolution ability of the fusion network security control system structure.
APA, Harvard, Vancouver, ISO, and other styles
18

Jia, Ling. "Campus Network Security Program Based on Snort Network Security Intrusion Detection System." Advanced Materials Research 433-440 (January 2012): 3235–40. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.3235.

Full text
Abstract:
This paper studies the security problems of campus network and summarizes the current on the current security risks and threats that campus network faces, focusing on analysis of attack-defense strategies on DOS network layer, proposing the security program of campus network which uses firewall as well as network security intrusion detection system snort. This paper analyzes the functional advantages of the program and presents in details the setup deployment and collocation methods of network security intrusion detection system based on snort in the campus network, and its application results are also summarized.
APA, Harvard, Vancouver, ISO, and other styles
19

Xiangya Tao, Changyun Jia, and Cheng Yang. "Security Analysis on China Campus Network and Construction on Network Security System." Journal of Convergence Information Technology 6, no. 11 (November 30, 2011): 166–74. http://dx.doi.org/10.4156/jcit.vol6.issue11.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Jo, Hyeonseong, Jaehyun Nam, and Seungwon Shin. "NOSArmor: Building a Secure Network Operating System." Security and Communication Networks 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/9178425.

Full text
Abstract:
Software-Defined Networking (SDN), controlling underlying network devices (i.e., data plane) in a logically centralized manner, is now actively adopted in many real world networking environments. It is clear that a network administrator can easily understand and manage his networking environments with the help of SDN. In SDN, a network operating system (NOS), also known as an SDN controller, is the most critical component because it should be involved in all transactions for controlling network devices, and thus the security of NOS cannot be highly exaggerated. However, in spite of its importance, no previous works have thoroughly investigated the security of NOS. In this work, to address this problem, we present the NOSArmor, which integrates several security mechanisms, named as security building block (SBB), into a consolidated SDN controller. NOSArmor consists of eight SBBs and each of them addresses different security principles of network assets. For example, while role-based authorization focuses on securing confidentiality of internal storage from malicious applications, OpenFlow protocol verifier protects availability of core service in the controller from malformed control messages received from switches. In addition, NOSArmor shows competitive performance compared to existing other controllers (i.e., ONOS, Floodlight) with secureness of network assets.
APA, Harvard, Vancouver, ISO, and other styles
21

Xing, Yanbo. "Design of a Network Security Audit System Based on Log Data Mining." Wireless Communications and Mobile Computing 2022 (February 25, 2022): 1–7. http://dx.doi.org/10.1155/2022/6737194.

Full text
Abstract:
The purpose of network security auditing is to safeguard network and information security through the assessment of network security vulnerabilities. Data mining is mainly used to mine potential information from massive amounts of log data, which can provide both accurate and valuable auxiliary data for network security auditing and relevant information for monitoring and management of terminals in different network environments. Firstly, the theory of data mining technology is explained, secondly, some data mining algorithms applied to network security audit are discussed, and finally, the design difficulties and functions of the network security audit system based on data mining are studied, aiming to provide reference for securing network and identifying hidden risks.
APA, Harvard, Vancouver, ISO, and other styles
22

Ele, Bassey, Umoh, E. E., and Egete, D. O. "Development of an Improved Network Security System using Firewall for Securing Organisational Data." Transactions on Networks and Communications 8, no. 5 (October 31, 2020): 01–09. http://dx.doi.org/10.14738/tnc.85.9605.

Full text
Abstract:
It is eminent that the Internet is far from being secure. Insecure networks have caused organizations to lose lots of money as a result of data loss or data corruption, and even worse, some organizations have also lost their reputation hence reduce the client’s confidence. Therefore, this research focused on the development of an improved network security system using a firewall that can secure both the internal and external network of an organization. The system was developed using both packet filtering and proxy server architectures to prevent unauthorized connection or access to the organization server or resources thereby reducing the risk of attacks to the network and loss of organizational data. The system was implemented using PHP and python programming languages and the backend was developed using MySQL as the database server; HTML, CSS, and JavaScript for the frontend layout. The implementation of this firewall system includes a monitoring admin interface from where most activities within the private network can be monitored and also this system can prevent or deny the unauthorized request of services either by an intruder from an external network or personnel within the network. Based on the findings of this study, the developed system is recommended for any organization that depends on computer networks for the running of their daily activities.
APA, Harvard, Vancouver, ISO, and other styles
23

Wang, Xu. "Research on Security Management of Library Computer Network System." Applied Mechanics and Materials 687-691 (November 2014): 1720–23. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1720.

Full text
Abstract:
With the rapid development of network science and technology, people are dependent on the network and usage greatly improved, but the network to bring convenience, but it also brings a lot of network security issues, it has become a constraint library computer network construction greatest limiting factor. This paper describes the impact of the library computer network system security management of specific issues, according to the system requirements of practical application, in terms of the system operating environment, hardware systems, software systems, network systems and system data, such as design of the library computer network system security policy and implementation are discussed. Through the library computer network security threats faced by the system proposed safety management, regulations are important to ensure the development and implementation of computer network system security. Proposed library computer network system security management strategies, we hope to enhance the library computer network security have some help.
APA, Harvard, Vancouver, ISO, and other styles
24

Prashar, Deepak, Nishant Jha, Muhammad Shafiq, Nazir Ahmad, Mamoon Rashid, Shoeib Amin Banday, and Habib Ullah Khan. "Blockchain-Based Automated System for Identification and Storage of Networks." Security and Communication Networks 2021 (February 19, 2021): 1–7. http://dx.doi.org/10.1155/2021/6694281.

Full text
Abstract:
Network topology is one of the major factors in defining the behavior of a network. In the present scenario, the demand for network security has increased due to an increase in the possibility of attacks by malicious users. In this paper, a blockchain-based system is suggested for securely discovering and storing networks. Techniques such as cloud-based storage systems are not efficient and are lacking in trust, privacy, security, and data control. The blockchain-based technique suggested in this paper is capable of resolving these challenges. Experiments were performed using Mininet, Cisco Packet Tracer, and Ethereum blockchain with the network inference algorithm. This algorithm is capable of inferring the network topology even when only partial information regarding the network is available. The results obtained clearly show that the network is resistant to malicious users and various external attacks, making the network robust.
APA, Harvard, Vancouver, ISO, and other styles
25

Zhiyong Shan and Vinod Namboodiri. "Design and Implementation of A Network Security Management System." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 20 (September 10, 2020): 95–108. http://dx.doi.org/10.24297/ijct.v20i.8841.

Full text
Abstract:
In recent years, the emerged network worms and attacks have distributive characteristics, which can spread globally in a short time. Security management crossing network to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. This paper proposes a hierarchical distributed network security management system (HD-NSMS), which can centrally manage security across networks. First describes the system in macrostructure and microstructure; then discusses three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; at last, it describes the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).
APA, Harvard, Vancouver, ISO, and other styles
26

Yushmanov, Anton А. "DEVELOP A COMPREHENSIVE SECURITY SYSTEM." Interexpo GEO-Siberia 7, no. 1 (July 8, 2020): 140–48. http://dx.doi.org/10.33764/2618-981x-2020-7-1-140-148.

Full text
Abstract:
The article describes the process of developing an integrated security system based on a single-board NVIDIA Jetson Nano computer. The main objective of the system is to provide profiled access to the room for trusted users. As a result of the work, a face recognition mechanism based on the convolutional neural network was designed and implemented. Face detection is implemented using histograms of directional gradients. Then, thе face is centered and processed by the trained convolutional neural network, out the characteristic features of the image supplied to the image classifier, which gives the percentage of image matching with the reference images. In the process of implementing the system, a framework was developed that allows implementing a complex security system, regardless of hardware components. To ensure the protection of the room, smoke detectors, opened doors and windows were added to the system. The scientific novelty of tht work is the encapsulation of all transmitted system traffic to overlay networks to ensure confidentiality.
APA, Harvard, Vancouver, ISO, and other styles
27

Abd, Nuha, Khattab M. Ali Alheeti, and Salah Sleibi Al-Rawi. "Intelligent Intrusion Detection System in Internal Communication Systems for Driverless Cars." Webology 17, no. 2 (December 21, 2020): 376–93. http://dx.doi.org/10.14704/web/v17i2/web17039.

Full text
Abstract:
The modern car is a complicated system consisting of Electronic Control Units (ECUs) with engines, detectors and wired and wireless communication protocols, that communicate through different types of intra-car networks. The cyber-physical design relies on this ECU network that has been susceptible to several kinds of attacks using wireless, internal and external access. The internal network contains several security vulnerabilities that make it possible to launch attacks via buses and propagation over the entire ECU network, therefore anomaly detection technology, which represents the security protection, can efficiently reduce security threats. So, this paper proposes new Intrusion Detection System (IDS) using the Artificial Neural Network (ANN) to monitor the state of the car by information collected from internal buses and to achieve security, safety of the internal network The parameters building the ANN structure are trained CAN packet information to devise the fundamental statistical attribute of normal and attacking packets and in defense, extracted the related attribute to classify the attack. Experimental evaluation on Open Car Test-Bed and Network Experiments (OCTANE) show that the proposed IDS achieves acceptable performance in terms of intrusions detection. Results show its capability to detect attacks with false-positive rate of 1.7 %, false-negative rate 24.6 %, and average accuracy of 92.10 %.
APA, Harvard, Vancouver, ISO, and other styles
28

Li, Bin, Qinglei Zhou, Xueming Si, and Jinhua Fu. "Mimic Encryption System for Network Security." IEEE Access 6 (2018): 50468–87. http://dx.doi.org/10.1109/access.2018.2869174.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Xiang, Yang, Jiankun Hu, and Wanlei Zhou. "Advances in network and system security." Concurrency and Computation: Practice and Experience 24, no. 10 (February 29, 2012): 1035–36. http://dx.doi.org/10.1002/cpe.2810.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Shkilniak, S. S., and Yu Yu Yurchenko. "Methods of ensuring the security of computer network." Mathematical machines and systems 2 (2022): 102–10. http://dx.doi.org/10.34121/1028-9763-2022-2-102-110.

Full text
Abstract:
The aim of the article is to analyze the security of modern computer networks for the develop-ment of technical solutions used in the creation of corporate networks and to present practical applications for information security in the enterprise. One of the most important parts of the information infrastructure of modern enterprises and many government organizations are corporate networks. Since the operation of corporate systems can take place in an open environment, the failure of such a system or distortion of the subsystem of access to information resources actually means the cessation of the enterprise. The article considers the issues of methodological and technical aspects of information protection it the enterprise. The issues of application of network technologies for the implementation of security policy and levels of access to information are considered. Issues of security and access to information at different levels are considered and analyzed, taking into account technical and personnel support. The principles of construction used in network planning and decision-making are defined. The structure of the corporate network and the methodology of its creation are considered. The methods of realization of the corporate network of the enterprise taking into account the issues of security and protection of information are given. Theoretical and methodological bases for designing a corporate network for the information security of the enterprise are proposed. The article presents the technologies used in the creation of corporate networks. The methodology of creating a corporate network is considered, namely, what are the requirements for the corporate network and the technical objectives of the corporate computer network. As a result of the research, an updated scheme of the corporate computer network (for the implementation of computer security) was developed and the security system of the corporate computer network was presented.
APA, Harvard, Vancouver, ISO, and other styles
31

Wang, Shanshan, and Yun Chen. "Optimization of Wireless Sensor Network Architecture with Security System." Journal of Sensors 2021 (November 8, 2021): 1–11. http://dx.doi.org/10.1155/2021/7886639.

Full text
Abstract:
Wireless sensor network (WSN) is a new type of wireless network. It has many advantages, but there are some problems. These problems make it easier for attackers to analyze network security holes and attack and destroy entire networks. This article designs a security wireless sensor network model. It can resist most known network attacks without significantly reducing the energy power of sensor nodes. First, we cluster the network organization to reduce energy consumption. It also protects the network based on the calculation of trust levels and the establishment of trust relationships between trusted nodes and operates the trust management system based on a centralized method, secondly, on the basis of LEACH agreement, draws lessons from the principle of biological immune system, optimizes the wireless sensor network, and further proposes a new immune system structure suitable for wireless sensor networks. The experimental results show that the wireless sensor network model designed in this paper solves the high-efficiency and energy-saving design task, and the trust management system has satisfactory results in defending against attacks.
APA, Harvard, Vancouver, ISO, and other styles
32

Prof. Krishnakumar L, Prof Krishnakumar L., and Nisha Mariam Varughese. "Intrusion Detection Using Collaborative Network Security Management System in Cloud Computing." Indian Journal of Applied Research 4, no. 3 (October 1, 2011): 145–47. http://dx.doi.org/10.15373/2249555x/mar2014/42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Sun, Ling, and Dali Gao. "Security Attitude Prediction Model of Secret-Related Computer Information System Based on Distributed Parallel Computing Programming." Mathematical Problems in Engineering 2022 (March 25, 2022): 1–13. http://dx.doi.org/10.1155/2022/3141568.

Full text
Abstract:
In recent years, there has been an upward trend in the number of leaked secrets. Among them, secret-related computers or networks are connected to the Internet in violation of regulations, cross-use of mobile storage media, and poor security management of secret-related intranets, which are the main reasons for leaks. Therefore, it is of great significance to study the physical isolation and protection technology of classified information systems. Physical isolation is an important part of the protection of classified information systems, which cuts off the possibility of unauthorized outflow of information from the network environment. To achieve the physical isolation of the network environment and build a safe and reliable network, it is necessary to continuously improve the level of network construction and strengthen network management capabilities. At present, the realization of physical isolation technology mainly relies on security products such as firewall, intrusion detection, illegal outreach, host monitoring, and auditing. This study analyzes network security systems such as intrusion detection, network scanning, and firewall. Establishing a model based on network security vulnerabilities and making up for network security hidden dangers caused by holes are generally a passive security system. In a network, the leader of network behavior—human behavior—needs to be constrained according to the requirements of the security management system and monitoring. Accordingly, this study proposes a security monitoring system for computer information network involving classified computer. The system can analyze, monitor, manage, and process the network behavior of the terminal computer host in the local area network, to achieve the purpose of reducing security risks in the network system. Based on the evaluation value sequence, the initial prediction value sequence is obtained by sliding adaptive triple exponential smoothing method. The time-varying weighted Markov chain is used for error prediction, the initial prediction value is corrected, and the accuracy of security situation prediction is improved. According to the security protection requirements of secret-related information systems, a complete, safe, reliable, and controllable security protection system for secret-related information systems is constructed, and the existing security risks and loopholes in secret-related information systems are eliminated to the greatest extent possible. This enables the confidentiality, integrity, and availability of confidential data and information in the computer information system to be reliably protected.
APA, Harvard, Vancouver, ISO, and other styles
34

Fan, Yi Xing, and Ren Bing Zhang. "Research on Network Security and Identity Authentication." Advanced Materials Research 926-930 (May 2014): 2046–49. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2046.

Full text
Abstract:
With the rapid development of computer networks and the popularity of network applications, network security has been people's increasing attention. Network security is an important issue under Network environment, authentication technology plays a very important role for network application security. Through the study of reason perish analysis and system design, providing efficient and practical solutions for network security applications system. The purpose of this paper is to research on authentication mechanisms and authentication protocols, analysis characteristics and application environments of the network authentication system, develop the VIKEY online dynamic two-factor password authentication system.
APA, Harvard, Vancouver, ISO, and other styles
35

Alimi, Isiaka Ajewale. "Effective Multi-Layer Security for Campus Network." Journal of Communications Technology, Electronics and Computer Science 2 (November 21, 2015): 6. http://dx.doi.org/10.22385/jctecs.v2i0.18.

Full text
Abstract:
The development in different communication systems as well as multimedia applications and services leads to high rate of Internet usage. However, transmission of information over such networks can be compromised and security breaches such as virus, denial of service, unauthorized access, and theft of proprietary information which may have devastating impact on the system may occur if adequate security measures are not employed. Consequently, building viable, effective, and safe network is one of the main technical challenges of information transmission in campus networks. Furthermore, it has been observed that, network threats and attacks exist from the lower layers of network traffic to the application layer; therefore, this paper proposes an effective multi-layer firewall system for augmenting the functionalities of other network security technologies due to the fact that, irrespective of the type of access control being employed, attacks are still bound to occur. The effectiveness of the proposed network architecture is demonstrated using Cisco Packet Tracer. The simulation results show that, implementation of the proposed topology is viable and offers reasonable degree of security at different network layers.
APA, Harvard, Vancouver, ISO, and other styles
36

Dong, Li Na. "Design of Computer Information Network Security System." Applied Mechanics and Materials 539 (July 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.539.305.

Full text
Abstract:
With the increasingly advanced computer information network, a great convenience for people's daily work and life at the same time, the network security problem arises. Network security is not only related to the enterprises, institutions and social groups, network information security, is also related to the national security and social stability, Involves many disciplines of computer science, network technology, communication technology, security technology and techniques. Solve the problem of computer network security has become the most important research topics in the field of computer science. Starting from the characteristics of the computer information network security and network security factors, a network security system designed set includes virus protection, dynamic password authentication, firewall access control, information encryption, intrusion detection and other protective measures for our computer the improvement and development of the information Network Security provides a useful reference.
APA, Harvard, Vancouver, ISO, and other styles
37

Qi, Lizhong, Chunhui Zhao, Gao Yu, and Jiarui Xue. "Application of network security situational awareness in power information system security." Journal of Physics: Conference Series 2202, no. 1 (June 1, 2022): 012042. http://dx.doi.org/10.1088/1742-6596/2202/1/012042.

Full text
Abstract:
Abstract The increasingly complex network environment leads to more and more intense network attacks. Traditional firewall and intrusion detection technology cannot guarantee the network security of power information system, so network space situation awareness becomes the most important in the field of network security. Big data technology can be used to better understand the operation of the network, and different types of data for rapid analysis. Build a security situation awareness system framework that integrates data collection, data processing, data storage, data analysis and data presentation to filter out harmful data and ensure network security. In this paper, the basic concept and system framework of network security situational awareness are briefly introduced. Firstly, Flume and Kafka are used to obtain log or network attack information, and MapReduce and Storm technologies are used for batch or real-time analysis to achieve the perception of network security. Then, the analytic hierarchy process (AHP) is used to determine the index weight, extract the characteristics of the network situation, and complete the evaluation of the network security situation by analyzing and constructing the decision matrix. The system has the characteristics of high availability, scalability and easy deployment, which can better support the perception and prediction of various network security threats.
APA, Harvard, Vancouver, ISO, and other styles
38

Dunn, Cheryl L., Gregory J. Gerard, and James L. Worrell. "Evaluation of Network Operating System Security Controls." Issues in Accounting Education 18, no. 3 (August 1, 2003): 291–306. http://dx.doi.org/10.2308/iace.2003.18.3.291.

Full text
Abstract:
Systems and financial statement auditors are often responsible for evaluating compliance with system security controls as part of their annual audit procedures. This assignment provides a practical learning experience that relates your course material to actual tasks practitioners perform. You are provided with simulated data from a realistic company example and are asked practitioner-relevant questions covering a variety of issues related to network operating system access. Monitoring and limiting network operating system access and mitigating the related risk is crucial since any application (including accounting applications) can be accessed, and potentially compromised, through the network operating system.
APA, Harvard, Vancouver, ISO, and other styles
39

Wu, Xin Min, and Hao Shu Wu. "Based on IPv6 Network and 4G Network System Security Analysis and Research." Applied Mechanics and Materials 530-531 (February 2014): 773–76. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.773.

Full text
Abstract:
First, as the 4G network, the introduction of IPv6 network layer security mechanism, security is enhanced at the same time, IPv6 security mechanism applied to the 4G network system security as well as new demands and challenges, followed by the core network based on IPv6 network security to face the next 4G threats and security problems, concludes with IPv6 technical analysis and 4G network defense and countermeasures.
APA, Harvard, Vancouver, ISO, and other styles
40

Wang, Xi, and Lei Shi. "Design of computer network security storage system based on cloud computing technology." Journal of Physics: Conference Series 2083, no. 4 (November 1, 2021): 042084. http://dx.doi.org/10.1088/1742-6596/2083/4/042084.

Full text
Abstract:
Abstract Nowadays, computer networks are widely used. Besides the convenience, people also feel the pressure of network viruses and hackers. At present, in the process of fighting against network security threats, traditional defense measures have been difficult to meet. Therefore, in order to meet the needs of computer network security under cloud computing technology, and for the future of cloud computing high-quality network storage system can be gradually optimized. In this paper, from the cloud computing and network security storage system two aspects of the computer network security storage performance analysis and design; Then from the design framework, through careful design, to ensure the reliability and security of data upload, storage.
APA, Harvard, Vancouver, ISO, and other styles
41

Sifawa, Muazu Dalhatu, Bello Alhaji Buhari, and Lawal Sulaiman. "Deployment of Snort Intrusion Detection System on Usmanu Danfodiyo University Network." International Journal of Advanced Networking and Applications 14, no. 02 (2022): 5408–12. http://dx.doi.org/10.35444/ijana.2022.14212.

Full text
Abstract:
The increasingly frequent attacks on Internet visible systems are attempts to breach or compromise the security of those systems. Network security issues have been a major challenge on Usmanu Danfodiyo University networks for a long time. Intrusion detection system allows organizations to protect themselves from losses associated with network security challenges. The aim and objectives of this project is to deploy and evaluate the performance of SNORT-IDS system in safeguarding demilitarize zone network segment of Usmanu Danfodiyo University. SNORT-IDS were implemented using some various tools such as Snort Application, Pulledpork, Barnyard, Apache, MySQL, PHP, BASE, and ADODB. The result obtained from the system evaluation indicates that Snortids system is able to detect suspicious trafficby 97%.
APA, Harvard, Vancouver, ISO, and other styles
42

Zhang, Yan Kun. "Computer Network Security Threats and Security Technology Research." Advanced Materials Research 971-973 (June 2014): 1440–43. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1440.

Full text
Abstract:
Networksecurity network system is presented, including hardware, software, and itstransmission in the network information security, network security threatsmainly include: software vulnerabilities, improper configuration, safetyconsciousness is not strong, virus, hacker attacks, etc. Is not only afirewall, network security is not anti-virus, intrusion monitoring, firewall,identity authentication, encryption, and other products of simple stack, butfrom the system to the application, from the device to the service ofrelatively complete, the system of the combination of security products.
APA, Harvard, Vancouver, ISO, and other styles
43

García-Cobo, Iván. "Quantum Network Intelligent Management System." Optics 3, no. 4 (November 15, 2022): 430–37. http://dx.doi.org/10.3390/opt3040036.

Full text
Abstract:
Quantum network materializes the paradigm change caused by the depletion of classical computation. Quantum networks have been built gathering reliable quantum repeaters connected by optical fiber networks. The need to build robust and resilient networks against hacking attacks is fundamental in the design of the future quantum Internet, detecting structural security as the major issue in the current development of the technology. A network management method is proposed to achieve its real-time adaptation and to protect itself against sabotage or accidents that render part of the network or its nodes useless.
APA, Harvard, Vancouver, ISO, and other styles
44

Guan, Tian, Yi Han, Nan Kang, Ningye Tang, Xu Chen, and Shu Wang. "An Overview of Vehicular Cybersecurity for Intelligent Connected Vehicles." Sustainability 14, no. 9 (April 26, 2022): 5211. http://dx.doi.org/10.3390/su14095211.

Full text
Abstract:
Cybersecurity is one of the most important challenges in the intelligent connected vehicle system. Interconnected vehicles are vulnerable to different network security attacks, which endanger the safety of passengers. This review paper firstly analyses the reasons why the current vehicle network is vulnerable to network attack and summarizes the three implementation methods of network security threats. The necessity of vehicle network security research and deployment is also analyzed. After giving a short introduction to the vehicular network security, this review paper identifies major security attacks on intelligent connected vehicles. Then the security enhancement technology of vehicle networks from three aspects are introduced, including vehicle network data encryption technology, vehicle network message authentication technology, and vehicle network anomaly intrusion detection technology. Then we analyze three common methods of abnormal intrusion detection in vehicle networks and explore the future research for preventing attacks on the network security of intelligent vehicle systems.
APA, Harvard, Vancouver, ISO, and other styles
45

Chandran, Anjana S. "Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology." International Journal of Information Security and Privacy 16, no. 2 (April 1, 2022): 1–18. http://dx.doi.org/10.4018/ijisp.308306.

Full text
Abstract:
A huge amount of data has been generated every day across the world by organizations with the emergence of the World Wide Web, social networks, along with e-commerce applications. To safeguard the network along with data transmission that occurs over a wireless network, cryptography along with network security (NS) is utilized. In data transmission over a wireless untrustworthy network, securing data is a major concern. Providing security to the wireless sensor networks is highly significant; NS provides security not only to the end system but also to all over the network system. Consequently, NS, cryptography, present progress in NS, linear cryptanalysis (LC), together with differential cryptanalysis (DC) are explicated in this work. The outcomes of the encryption time (ET) versus file size for data encryption standard (DES), advanced encryption standard (AES), 3DES, Rivest-Shamir-Adleman (RSA), blowfish, and the decryption time (DT) versus file size for RSA, AES, modified RSA (MRSA), and nth degree truncated polynomial ring units (NTRU) are also evaluated in this paper.
APA, Harvard, Vancouver, ISO, and other styles
46

Ji, Jun, Fei Fei Xing, and Jun Du. "The Design of Protection Security System of University Educational Information System." Advanced Materials Research 962-965 (June 2014): 3063–66. http://dx.doi.org/10.4028/www.scientific.net/amr.962-965.3063.

Full text
Abstract:
As the important part of the university digital campus,establishing the whole security and protection financial information system in the educational information system is an important problem in the current digital campus. This paper systematically and methodically considers the full range of university needs and educational information network security features, so as to achieve overall system security with on a comprehensive network security plan and the implementation of modular sub-network area. In this paper, security operation system can ensure the security of the application environment, and data backup technologies ensure the transmission and storage of classified data security.
APA, Harvard, Vancouver, ISO, and other styles
47

Selvamani, D., and V. Selvi. "A Literature Survey on the Importance of Intrusion Detection System for Wireless Networks." Asian Journal of Computer Science and Technology 7, no. 3 (November 5, 2018): 20–27. http://dx.doi.org/10.51983/ajcst-2018.7.3.1905.

Full text
Abstract:
Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The entire field of network security is vast and in an evolutionary stage. The range of study encompasses a brief history dating back to internet’s beginnings and the current development in network security. In order to understand the research being performed today, background knowledge of the importance of security, types of attacks in the networks. This paper elaborates theliterature study on network security in various domains in the year 2013 to 2018. Finally, it summarizes the research directions by literature survey.
APA, Harvard, Vancouver, ISO, and other styles
48

Muwardi, Rachmat, Hongmin Gao, Harun Usman Ghifarsyam, Mirna Yunita, Andika Arrizki, and Julpri Andika. "Network Security Monitoring System Via Notification Alert." Journal of Integrated and Advanced Engineering (JIAE) 1, no. 2 (November 30, 2021): 113–22. http://dx.doi.org/10.51662/jiae.v1i2.22.

Full text
Abstract:
The development of information technology nowadays has become faster, and this makes network security become important. A huge increasing number of computers that are connected makes many gaps in a network. An administrator has an important role in protecting the security of the network. The problem comes when an administrator has human problems such as pain, negligence, and tiredness while needing rapid information when there is an intrusion on the network. This problem can be solved by adding a data traffic detection system known as Intrusion Detection System (IDS). IDS will be connected to Mail Gateway until that administrator can receive notifications such as alerts during an intrusion to the network anytime and anywhere. Snort as one of the network security systems should be developed as a security detection system and network security. A security intrusion prevention system or an Intrusion Prevented System (IPS). The author tries to do analysis and testing on the subjects above to produce a system capable of detecting the intruder in a network that is mobile and also makes it easy for administrators to open data anywhere and anytime using any device.
APA, Harvard, Vancouver, ISO, and other styles
49

Sulaiman, Oris Krianto. "ANALYSIS OF NETWORK SECURITY SYSTEM USING THE SWITCH PORT SECURITY." Computer Engineering, Science and System Journal 1, no. 1 (January 31, 2016): 9–14. http://dx.doi.org/10.24114/cess.v1i1.4036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Jesudoss, Sofiya, Auxeeliya Jesudoss, and Ashraph Sulaiman. "An Adaptive Approach to Improve the Accuracy of Packet Pre-Filtering." Advanced Materials Research 367 (October 2011): 241–48. http://dx.doi.org/10.4028/www.scientific.net/amr.367.241.

Full text
Abstract:
The current day networks are under deliberate, continuous and premeditated attacks such as Hacker attacks, DoS attacks, IP Address Spoofing, Phishing, Sniffer attacks etc. The Network Intrusion Detection Systems (NIDS) proved to be reliable in parrying most of the issues and challenges faced by the corporate network security systems. But, the NID systems fall short in providing a completely fool-proof network security environment. False negatives and false positives proved to be considerable bottle necks in securing the networks from the attacks. This paper deals with the introduction of a software approach for the packet pre-filtering to ease security threats and the introduction of Network Behavior Analysis to enhance the security of the network. The Network Behavior Analysis helps the system to ease the burdens to the network and security of the network by the false positives. The NIDS compares all the incoming packets with the pre-defined rules or signatures to find suspicious patterns. The pre-filtering approach used in this paper is a result of the observation that very rarely an incoming packet matches the signatures or the IDS rules. During the pre-filtering step, a small portion of the packet is compared against the predefined signatures for any suspicious patterns and the initial pre-filtering match is considered for a full match. For time efficiency, this strategy is compared to more optimistic schemes that allow reassignment of flows between threads, and evaluated using several network packet traces.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography