TITLE

Study on Detection Method of Server Intrusion for Small and Medium Sized Enterprises

AUTHOR(S)
Zhi Zhang
PUB. DATE
July 2014
SOURCE
Applied Mechanics & Materials;2014, Issue 608-609, p507
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
This article analyses in detail the safety hazards and risks among all levels of the enterprise from the point of view of the structure, there may be in accordance with the overall balance, principle, technology integration, propose a network security requirements of the enterprise, and further puts forward a whole network security solutions. Moreover, the paper takes Web service composition documents as the research object, through the analysis of the server, the port and address on the Web file, to establish Web intrusion detection model. The core of the model is the monitoring of host resources in Web server, finally discusses in detail the design and Realization of resource monitoring system.
ACCESSION #
98649162

 

Related Articles

  • Optimized Intrusion Detection by CACC Discretization Via Naïve Bayes and K-Means Clustering. Richhariya, Vineet; Sharma, Nupur // International Journal of Computer Science & Network Security;Jan2014, Vol. 14 Issue 1, p54 

    Network Intrusion Detection System (IDS), as the main security defending technique, is second guard for a network after firewall. Data mining technology is applied to the network intrusion detection, and Precision of the detection will be improved by the superiority of data mining. For IDS many...

  • WI-ALERT : A WIRELESS SENSOR NETWORK BASED INTRUSION ALERT PROTOTYPE FOR HEC. Edirisinghe, Ruwini; Dias, Dileeka; Chandrasekara, Rakhitha; Wijesinghe, Lanka; Siriwardena, Prasanga; Sampath, Prasad Kumara // International Journal of Distributed & Parallel Systems;Jul2013, Vol. 4 Issue 4, p23 

    A wired fence based intrusion detection and alerting mechanism for boundaries separating wildlife habitats and human settlements was implemented, particularly as a solution to the Human-Elephant Conflict (HEC). The objective of the research reported in this paper is to propose and verify an...

  • False Positives Reduction Techniques in Intrusion Detection Systems--A Review. Mokarian, Asieh; Faraahi, Ahmad; Delavar, Arash Ghorbannia // International Journal of Computer Science & Network Security;Oct2013, Vol. 13 Issue 10, p128 

    During the last decade with the growth of cyber attacks, information safety has become an important issue all over the world. Intrusion detection systems (IDSs) are an essential element for network security infrastructure and play a very important role in detecting large number of attacks....

  • NICE: Network Intrusion Detection and Countermeasure selection in Virtual Network Systems. Saroha, Ritika; Sunita // International Journal of Computer Science Engineering & Technolo;May2014, Vol. 4 Issue 5, p158 

    Intrusion Detection and Prevention Systems (IDPS) are used: to identify possible attacks, collecting information about them and the trying to stop their occurrence and at last reporting them to the system administrator. These systems are used by some organizations to detect the weaknesses in...

  • INTRUSION DETECTION SYSTEM USING DYNAMIC AGENT SELECTION AND CONFIGURATION. Kumar, Manish; Hanumanthappa, M. // International Journal of Advances in Engineering & Technology;Jul2014, Vol. 7 Issue 3, p1044 

    Intrusion detection is the process of monitoring the events occurring in a computer system or network and analysing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices....

  • Robust Intrusion Detection System using Layered Approach with Conditional Random Fields. Bande, Vasavi; Prasan, U. D. // International Journal of Computer Science Engineering & Technolo;Oct2011, Vol. 1 Issue 9, p563 

    Network Security is fast becoming an absolute necessity to protect the information contained on computer systems worldwide. The ever changing network use and operation along with the public concern for protection of sensitive information makes implementing an efficient and effective security...

  • Performance Analysis of Classifiers for Intrusive Data and Rough Sets Reducts. Reddy, R. Ravinder; Padmalatha, E.; Ramadevi, Y.; Sunitha, K. V. N. // International Journal of Computer Science & Network Security;Aug2014, Vol. 14 Issue 8, p103 

    The fast change in the day to day activity need to analyze the intrusive data very accurately without losing performance. Intrusive behavior is critical for analyzing the data and Performance is crucial in the computational environment, when the user requires accuracy in the results. Finding...

  • Investigating Study on Network Scanning Techniques. Anbar, Mohammed; Manasrah, Ahmed; Ramadass, Sureswaran; Altaher, Altyeb; Aljmmal, Ashraf; Almomani, Ammar // International Journal of Digital Content Technology & its Applic;May2013, Vol. 7 Issue 9, p312 

    Network scanning is considered to be the first step taken by attackers trying to gain access to a targeted network. Hence, it will be useful for system and network administrators to identify the targets scanned by network attackers as soon as possible. Resources and services can be further...

  • Construction and Implementation of Intelligent HIPS Based on Cloud. Jia Tiejun; Feng Zhaohong; Wang Xiaogang // International Journal of Digital Content Technology & its Applic;May2013, Vol. 7 Issue 9, p460 

    Confronting the shortcomings of traditional network intrusion protection system in protection against viruses and exceptional events attacked, based on the analysis of major problems on cloud security defense issues, a cloud-based intelligent security defense system HIPS is proposed, which...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics