期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Effect of Network Traffic on IPS Performance
1
作者 shahriar mohammadi Vahid Allahvakil Mojtaba Khaghani 《Journal of Information Security》 2012年第2期162-168,共7页
The importance of network security has grown tremendously and intrusion prevention/detection systems (IPS/IDS) have been widely developed to insure the security of network against suspicious threat. Computer network i... The importance of network security has grown tremendously and intrusion prevention/detection systems (IPS/IDS) have been widely developed to insure the security of network against suspicious threat. Computer network intrusion detection and prevention system consist of collecting traffic data, analyzing them based on detection rules and generate alerts or dropping them if necessary. However IPS has problems such as accuracy signature, the traffic volume, topology design, monitoring sensors. In this paper, we practically examine the traffic effect on performance of IPS. We first examine the detection of DOS attack on a web server by IPS and then we generate network traffic to see how the behavior of IPS has influenced on detection of DOS attack. 展开更多
关键词 NETWORK Security NETWORK INTRUSION Detection and Prevention System DOS ATTACK NETWORK TRAFFIC Generation
下载PDF
A Comparison of Link Layer Attacks on Wireless Sensor Networks
2
作者 shahriar mohammadi Reza Ebrahimi Atani Hossein Jadidoleslamy 《Journal of Information Security》 2011年第2期69-84,共16页
Wireless sensor networks (WSNs) have many potential applications [1,2] and unique challenges. They usually consist of hundreds or thousands of small sensor nodes such as MICA2, which operate autonomously;conditions su... Wireless sensor networks (WSNs) have many potential applications [1,2] and unique challenges. They usually consist of hundreds or thousands of small sensor nodes such as MICA2, which operate autonomously;conditions such as cost, invisible deployment and many application domains, lead to small size and resource limited sensors [3]. WSNs are susceptible to many types of link layer attacks [1] and most of traditional network security techniques are unusable on WSNs [3];This is due to wireless and shared nature of communication channel, untrusted transmissions, deployment in open environments, unattended nature and limited resources [1]. Therefore security is a vital requirement for these networks;but we have to design a proper security mechanism that attends to WSN’s constraints and requirements. In this paper, we focus on security of WSNs, divide it (the WSNs security) into four categories and will consider them, include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide variety of WSNs’ link layer attacks and a comparison of them. This work enables us to identify the purpose and capabilities of the attackers;furthermore, the goal and effects of the link layer attacks on WSNs are introduced. Also, this paper discusses known approaches of security detection and defensive mechanisms against the link layer attacks;this would enable IT security managers to manage the link layer attacks of WSNs more effectively. 展开更多
关键词 WIRELESS Sensor Network SECURITY LINK LAYER ATTACKS Detection DEFENSIVE Mechanism
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部