Research on Security Issues and Protection Strategy of Computer Network

@article{Sun2015ResearchOS,
  title={Research on Security Issues and Protection Strategy of Computer Network},
  author={Yimin Sun},
  journal={The Open Automation and Control Systems Journal},
  year={2015},
  volume={7}
}
  • Yimin Sun
  • Published 2015
  • Computer Science
  • The Open Automation and Control Systems Journal
Development and improvement has brought a very great impact to the network technology of the computer, be- sides the security of the network information has become a focus of the social safety questions. In this paper, through the analysis of security threats to computer network information and protective factors conducted, a strategy for a common computer network information security and protection strategy has been proposed, and useful lessons for our computer network and information security… Expand
Specification of Quality Indicators for Security Event and Incident Management in the Supply Chain
TLDR
An approach to a formalized description of the process of changing the values of quality indicators of decision support for managing security events and incidents in the supply chain based on the analysis of the functioning processes of modern quality control systems for information security in supply chain. Expand
An approach to modeling the decision support process of the security event and incident management based on Markov chains
TLDR
The considered mathematical representation of the state change dynamics allows one to formalize and structure the specification of this type process taking into account its requirements for operativeness, validity, secrecy and resource costs. Expand

References

SHOWING 1-10 OF 12 REFERENCES
A NOVEL MAN-INTHE-MIDDLE INTRUSION DETECTION SCHEME FOR SWITCHED LANs
The Man-in-the-Middle (MiM ) attack is used by attackers to perform sniffing activities in switched LAN networks. The potential damage to a network from sniffing activities can be very significant.Expand
Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks
  • B. Issac
  • Computer Science
  • Int. J. Netw. Secur.
  • 2009
TLDR
This work proposes to make ARP unicast, centralized and secure, along with a secure design of DHCP protocol to mitigate MAC spooflng and discusses some performance issues to show how the proposed protocols work. Expand
An Analysis on the Schemes for Detecting and Preventing ARP Cache Poisoning Attacks
TLDR
This paper analyzes several schemes to mitigate, detect and prevent ARP cache poisoning, identifies their strengths and weaknesses, and proposes guidelines for the design of an alternative and (arguably) better solution to the problem of ARP spoofing. Expand
Realizing a flexible access control mechanism for active nodes based on active networking technology
  • A. Hess, G. Schäfer
  • Computer Science
  • 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577)
  • 2004
TLDR
This paper presents a model and mechanism for flexible access control of loadable on-demand services in an active network, using code origin authentication and runtime supervision, realizing a demand-driven supervision which avoids supervision of those actions that do not need to be supervised. Expand
Enhanced ARP: preventing ARP poisoning-based man-in-the-middle attacks
TLDR
In this letter, an enhanced version of Address Resolution Protocol (ARP) is proposed to prevent ARP poisoning-based Man-in-the-Middle (MITM) attacks, and is backward compatible with existing ARP and incrementally deployable. Expand
Fast Packet Classification for Snort by Native Compilation of Rules
TLDR
This paper presents a technique to improve the performance of packet classification of Snort, a popular open-source NIDS, based on generating native code from Snort signatures using a rule-based specification language with a type system for specifying the structure and contents of packets. Expand
Boopsie and librarians: connecting mobile learners and the library
TLDR
An overview of the Boopsie product for creation of a mobile device application for deployment on all major mobile devices and the experience of implementing this mobile app product at Bucks County Community College Library is reviewed. Expand
Mobilizing the Library's Web Presence and Services: A Student-Library Collaboration to Create the Library's Mobile Site and iPhone Application
The Library Outside the Library group collaborated with the Cornell University Library web site team and student programmers to mobilize the library, creating a mobile version of the library websiteExpand
A Mobile Strategy Web Developers Will Love
  • Computers in 1ibraries,no. 5, pp. 24-26, 2010.
  • 2010
A Mobile Strategy Web Developers Will Love Computers in 1ibrariesno
  • A Mobile Strategy Web Developers Will Love Computers in 1ibrariesno
  • 2010
...
1
2
...