Поиск по каталогу |
(строгое соответствие)
|
- Профессиональная
- Научно-популярная
- Художественная
- Публицистика
- Детская
- Искусство
- Хобби, семья, дом
- Спорт
- Путеводители
- Блокноты, тетради, открытки
Effectiveness of Tracing Based Active Intrusion Response. A Review
В наличии
Местонахождение: Алматы | Состояние экземпляра: новый |
Бумажная
версия
версия
Автор: Isaiah Olawale Agbaje
ISBN: 9786203930085
Год издания: 1905
Формат книги: 60×90/16 (145×215 мм)
Количество страниц: 72
Издательство: LAP LAMBERT Academic Publishing
Цена: 23635 тг
Положить в корзину
Позиции в рубрикаторе
Отрасли знаний:Код товара: 713642
Способы доставки в город Алматы * комплектация (срок до отгрузки) не более 2 рабочих дней |
Самовывоз из города Алматы (пункты самовывоза партнёра CDEK) |
Курьерская доставка CDEK из города Москва |
Доставка Почтой России из города Москва |
Аннотация: The use of computer network technology in all spheres of human endeavors be it in business, social media and academic activities has greatly increased. Due to this excessive use of computer network, series of security treat has been staged to defraud un-suspected users. The integrity of data, unauthorized access and availability of computer network must be protected from intrusion. Network-based intrusion has become a major threat to today’s highly networked information systems because the effects of intrusions are disastrous to the network users. Security mechanism such as authentication, cryptography, access control and firewall are used as defense but are unable to detect an intrusion internally and counter it. A wide variety of algorithms have been proposed and implemented for intrusion detection; and some of these algorithms are: intrusion preventions system (IPS), intrusion response system (IRS) and Tracing based active intrusion response (TBAIR) algorithm. In this research, the Tracing based active intrusion response (TBAIR) algorithm will be applied as a countermeasure and tracking of an intruder activities to determine its effectiveness.
Ключевые слова: NIS, Intrusion, TBAIR, detection, Network, Algorithm, Tracing Based, Active Intrusion, Responsse