Analysis on Internet Attack and Security

Article Preview

Abstract:

The rapid upgrading internet has brought to us many shortcuts and conveniences. Simultaneously, the underlying security problems have surfaced. These include unauthorized access, posing as legitimate users and destroyed data integrity, which interferes with the normal operation of the system. In addition, these computer network invasions are characterized by the focused attacking source, flexible attacking strategies and expanded scope of the attacked target. This paper analyzes the existing network security risks and means of invasion from various aspects; the network security defense measures are discussed here.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 605-607)

Pages:

2387-2390

Citation:

Online since:

December 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Lai Jibao, Wang Huiqiang, and Zhu Liang, Study of Network Security Situation Awareness Model Based on Simple Additive Weight and Grey Theory, , (2006).

DOI: 10.1109/iccias.2006.295320

Google Scholar

[2] Haines JW, Lippmann RP, Fried OJ, Tran E, Boswell S, Zissman MA. DARPA intrusion detection system evaluation: Design and procedures. Technical Report 1062, Lexington: MIT Lincoln Laboratory, (1999).

Google Scholar

[3] M. Frigault, L. Wang, A. Singhal, and S. Jajodia, Measuring network security using dynamic bayesian network, in QoP, A. Ozment and K. Stølen, Eds. ACM, 2008, p.23–30.

DOI: 10.1145/1456362.1456368

Google Scholar

[4] R. Hewett and P. Kijsanayothin, Host-centric model checking for network vulnerability analysis, " in ACSAC , 08: Proceedings of the 2008 Annual Computer Security Applications Conference. Washington, DC, USA: IEEE Computer Society, 2008, p.225–234.

DOI: 10.1109/acsac.2008.15

Google Scholar

[5] Liu Mixi, Yu Dongmei and Zhang Qiuyu et aI., Network Security Situation Assessment Based on Data Fusion, , 2008 Workshop on Knowledge Discovery and Data Mining, (2008).

DOI: 10.1109/wkdd.2008.35

Google Scholar

[6] S. O'Hare, S. Noel, and K. Prole, A graph-theoretic visualization approach to network risk analysis, in VizSEC, ser. Lecture Notes in Computer Science, J. R. Goodall, G. J. Conti, and K. -L. Ma, Eds., vol. 5210. Springer, 2008, p.60–67.

DOI: 10.1007/978-3-540-85933-8_6

Google Scholar

[7] Zhang Yong, Tan Xiaobin and Xi Hongsheng, A Novel Approach to Network Security Situation Awareness Based on MUlti-perspective Analysis, , IEEE 2007 International Conference on Computational Intelligence and Security, (2007).

DOI: 10.1109/cis.2007.160

Google Scholar