A Comprehensive Approach for Network Security

作者: Manikandan Rm , D Radha

DOI: 10.1109/ICICCT.2018.8472952

关键词: Computer securityScale (chemistry)Endpoint securitySoftware security assuranceNetwork levelComputer scienceWork (electrical)Large scale networkNetwork security

摘要: … high number of dynamic nodes using software security or endpoint security, is very tedious, … used partially in Security Management Controller and Security Management Database. Multi…

参考文章(22)
Otusile Oluwabukola, Oludele Awodele, Chibueze Ogbonna, Ajaegbu Chigozirim, Amarachi Anyaehie, A Packet Sniffer (PSniffer) Application for Network Security in Java Issues in Informing Science and Information Technology. ,vol. 2013, pp. 389- 400 ,(2013) , 10.28945/1818
Mohan V. Pawar, J. Anuradha, Network Security and Types of Attacks in Network Procedia Computer Science. ,vol. 48, pp. 503- 506 ,(2015) , 10.1016/J.PROCS.2015.04.126
Jeong-Nyeo Kim, Kyoung seok Lee, Cheol-hoon Lee, Design and implementation of integrated security engine for secure networking international conference on advanced communication technology. ,vol. 1, pp. 480- 484 ,(2004) , 10.1109/ICACT.2004.1292914
G. Zhao, K. Xu, L. Xu, B. Wu, Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis IEEE Access. ,vol. 3, pp. 1132- 1142 ,(2015) , 10.1109/ACCESS.2015.2458581
Ahmed E. Kosba, Aziz Mohaisen, Andrew West, Trevor Tonn, Huy Kang Kim, ADAM: Automated detection and attribution of malicious webpages workshop on information security applications. pp. 3- 16 ,(2013) , 10.1007/978-3-319-15087-1_1
Mohammed Abdul Qadeer, Arshad Iqbal, Mohammad Zahid, Misbahur Rahman Siddiqui, Network Traffic Analysis and Intrusion Detection Using Packet Sniffer international conference on communication software and networks. pp. 313- 317 ,(2010) , 10.1109/ICCSN.2010.104
Wentao Liu, Design and Implement of Common Network Security Scanning System ubiquitous computing. pp. 148- 151 ,(2009) , 10.1109/IUCE.2009.24
Jhilam Biswas, Ashutosh Ashutosh, An Insight in to Network Traffic Analysis using Packet Sniffer International Journal of Computer Applications. ,vol. 94, pp. 39- 44 ,(2014) , 10.5120/16391-5975
Irfan Ahmed, Kyung-suk Lhee, Classification of packet contents for malware detection Journal of Computer Virology and Hacking Techniques. ,vol. 7, pp. 279- 295 ,(2011) , 10.1007/S11416-011-0156-6
Ibrahim Ghafir, Vaclav Prenosil, Blacklist-based malicious IP traffic detection global conference on communication technologies. pp. 229- 233 ,(2015) , 10.1109/GCCT.2015.7342657