Conventional database security can employ a wide range of access controls including database roles, fine-grained object access and virtual private databases. Access controls are used to protect against malicious attac...
详细信息
ISBN:
(纸本)9781479938414
Conventional database security can employ a wide range of access controls including database roles, fine-grained object access and virtual private databases. Access controls are used to protect against malicious attacks and to ensure that established database privileges are not misused. Intrusion detection systems can augment these controls by alerting the intrusion response team after an attack has occurred. While intrusion detection can assist forensic analysis, a passive response to detection can permit the inflicted damage to go undetected for a long period of time, allowing the damage to potentially propagate. In contrast, we propose an adaptive anomaly-based intrusion prevention system to secure the database from attacks. The approach requires the database to learn the activities considered normal using training data taken from production. The model adapts to stringent variations of the training data while in operation, reducing the potential for normal activities to be misclassified as malicious.
Terminal communication systems are often confronted with undesired e-mails, which reach their destination, while cloaking the real sender. Thus, in order to develop appropriate security software, it is necessary to kn...
详细信息
ISBN:
(纸本)9783642339400
Terminal communication systems are often confronted with undesired e-mails, which reach their destination, while cloaking the real sender. Thus, in order to develop appropriate security software, it is necessary to know how to write identity-concealing software. This paper seeks to describe how the identity of undesired e-mail senders can be hidden. The final aim of the work is to detect adequate means of defense against unwanted e-mails, by generating, in the future, strong security (or filtering) algorithms and methodologies, adapted to diverse situations.
In topical years one of the Cloud Services, Infrastructure-as-a-Service (IaaS) provides a compute resources for demand in various applications like Parallel Data Processing. Major Cloud computing companies have starte...
详细信息
ISBN:
(纸本)9781467357869;9781467357876
In topical years one of the Cloud Services, Infrastructure-as-a-Service (IaaS) provides a compute resources for demand in various applications like Parallel Data Processing. Major Cloud computing companies have started to integrate frameworks for, making it easy for customers to access these services and to deploy their programs. However, the processing frameworks which are currently used have been designed for static, identical cluster setups and ignore the particular nature of a cloud. Consequently, the allocated compute resources may be insufficient for big parts of the submitted job and unnecessarily increase processing time and cost. However, the current algorithm does not consider the schedule and security during the job execution. In this paper we have focused on the issues and challenges of the scheduling & protection algorithm for proficient parallel data processing in real time cloud computing services. Our Algorithm contains all the concrete information required to schedule and execute the received job on the cloud. Each Execution is by default assigned to its own Execution Instance. The code is lightweight and portable;it makes a great random number generator for both Encryption and Decryption is designed to run data processing on a large number of jobs, and provide a high efficacy in real time cloud services.
Through analyzing the 3G security services structure, we found that 3GPP did not offer effective authentication services to the terminal client in application domain. On the base of analyzing the Kerberos authenticati...
详细信息
ISBN:
(纸本)9781424421077
Through analyzing the 3G security services structure, we found that 3GPP did not offer effective authentication services to the terminal client in application domain. On the base of analyzing the Kerberos authentication method and the 3G security mechanism, we first put forward a three-tier security authentication service model for 3G terminal application. The model assembled and encapsulated the 3G security algorithm, and offered a reliable, Proactive and convenient authentication services to the 3G terminal application. This research provided strong support with 3G terminal application.
Tato práce se zabývá minimalistickou linuxovou distribucí OpenWRT a její instalací v směrovači Linksys WAG160Nv2. Popisuje vybraný směrovač a diskutuje postup při měření prop...
详细信息
Tato práce se zabývá minimalistickou linuxovou distribucí OpenWRT a její instalací v směrovači Linksys WAG160Nv2. Popisuje vybraný směrovač a diskutuje postup při měření propustnosti, která byla zvolena jako kritérium pro hodnocení výkonnosti směrovače. Dále je zkoumána výkonnost směrovače při použití původního systému a se systémem OpenWRT. V dalších kapitolách je popsán návrh a implementace odposlouchvávacího algoritmu, jehož hlavním účelem je zachytávání síťového provozu na směrovači. V poslední části jsou dosažené výsledky diskutovány.
暂无评论