Написать рефераты, курсовые и дипломы самостоятельно.  Антиплагиат.
Студенточка.ru: на главную страницу. Написать самостоятельно рефераты, курсовые, дипломы  в кратчайшие сроки
Рефераты, курсовые, дипломные работы студентов: научиться писать  самостоятельно.
Контакты Образцы работ Бесплатные материалы
Консультации Специальности Банк рефератов
Карта сайта Статьи Подбор литературы
Научим писать рефераты, курсовые и дипломы.


подбор литературы периодические источники литература по предмету

Network Security and Intrusion Attacks



Год выпуска: 2012
Автор: . Mohammad and Mohammad Faris
Издательство: LAP Lambert Academic Publishing
Страниц: 104
ISBN: 9783659306525
Описание
Network security is an open area of applied concepts of computer sciences that has gained a lot of attention over past few years. Intrusion attacks particularly Distributed Denial of Service (DDOS) have become one of the greatest threats to the network security. To assess the network security and to deduce precautionary measures it is important to analyze how much a network is vulnerable to such intrusion attacks. The research covered in this book demonstrates a simulated flood based DDOS attack on a university network.With the help of obtained graphical results, behavior of the network under intrusion attacks is analyzed to assess vulnerability and survivability of the network. On the basis of our analysis countermeasures and possible enhancements to improve the network security against such intrusions are highlighted. We consider this book as a first step towards our future work regarding intrusion detection and prevention system design.


Похожие книги

  1. M. Sadiq Ali Khan and S. M. Aqil Burney. Recent Trends in Intrusion Detection System & Network Monitoring. – М.: LAP Lambert Academic Publishing, 2012. – 120 с.
  2. Shahnawaz Husain,S. C. Gupta and R. C. Joshi. Intrusion Detection Engine for Adhoc Environment. – М.: LAP Lambert Academic Publishing, 2013. – 120 с.
  3. Shubha Puthran and Ketan Shah. Intrusion Detection System using datamining techniques. – М.: LAP Lambert Academic Publishing, 2012. – 76 с.
  4. Yogesh Kumar,Krishan Kumar and Gulshan Kumar. Feature Selection For Intrusion Detection Systems. – М.: LAP Lambert Academic Publishing, 2014. – 100 с.
  5. Srikanth Hariharan,Ness B. Shroff and Saurabh Bagchi. Secure Neighbor Discovery in Wireless Networks. – М.: LAP Lambert Academic Publishing, 2011. – 52 с.
  6. Xiaodong He. Automated intrusion prevention mechanism in enhancing network security. – М.: Scholars' Press, 2014. – 128 с.
  7. Syed Zahidur Rashid. Computer Network Security Monitoring. – М.: Scholars' Press, 2015. – 284 с.
  8. K. Shaila and K. R. Venugopal. Secure Data Communication in Wireless Sensor Networks. – М.: LAP Lambert Academic Publishing, 2014. – 240 с.
  9. Tejpal Singh. Security Protocols for Data Routing in Wireless Sensor Network. – М.: LAP Lambert Academic Publishing, 2012. – 68 с.
  10. Mohammad and Mohammad Faris. Network Security and Intrusion Attacks. – М.: LAP Lambert Academic Publishing, 2012. – 104 с.
  11. Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar. Network Intrusion Detection System using Machine Learning Techniques. – М.: LAP Lambert Academic Publishing, 2013. – 80 с.
  12. Christian Chetachi Umunna. Distributed Intrusion Detection System in Ad hoc Networks. – М.: LAP Lambert Academic Publishing, 2010. – 104 с.
  13. Manuj Mishra,Govind Sharma and Ram Pathak. Secure Routing In Wireless Mobile Ad Hoc Network. – М.: LAP Lambert Academic Publishing, 2014. – 84 с.
  14. Jabarweer Singh,Krishan Kumar and Gulshan Kumar. Intrusion detection using artificial intelligence based ensembles. – М.: LAP Lambert Academic Publishing, 2014. – 116 с.
  15. Mais Mohammed Hobi and Sarab Majeed Hameed. Biometrics for User Authentication Using Artificial Neural Networks. – М.: LAP Lambert Academic Publishing, 2013. – 108 с.
  16. Homam El-Taj and Omar Amer. Network Alert Management System For IDS False Positive Reduction. – М.: LAP Lambert Academic Publishing, 2013. – 156 с.
  17. Faeiz Alserhani,Irfan Awan and Monis Akhlaq. Correlation and Aggregation of Security Alerts in Networks. – М.: LAP Lambert Academic Publishing, 2012. – 256 с.

Образцы работ

Тема и предметТип и объем работы
Последствия операции НАТО
Политология
Диплом
80 стр.
Понятие и история брендинга. Анализ создания и стратегия продвижения бренда ***
Электроснабжение городов и промышленных предприятий
Другое
72 стр.
Математические модели океанических течений
Переводоведение (теория перевода)
Курсовая работа
42 стр.
Комплекс маркетинговых коммуникаций в продвижении цифровых СМИ
Маркетинг
Диплом
74 стр.



Задайте свой вопрос по вашей теме

Гладышева Марина Михайловна

marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Контакты
marina@studentochka.ru
+7 911 822-56-12
с 9 до 21 ч. по Москве.
Поделиться
Мы в социальных сетях
Реклама



Отзывы
Наталья
Здравствуйте после консультаций с вами защитила на 4 Спасибо)