Czasopismo
2016
|
t. 17, z. 11, cz. 1 Agile Commerce - zarządzanie informacją i technologią w biznesie
|
111--125
Tytuł artykułu
Warianty tytułu
Języki publikacji
Abstrakty
An analysis of the main network threats and reasons of their occurrence is described. Unauthorized access prevention and protection methods are presented. A network fragment has been modeled for the research which describes network equipment monitoring method using NetFlow Analyzer. DoS-type, as well as Man in the middle-type attacks, have been conducted in order to study their impact. There are listed recommendations referring to a complex approach for protection against attacks represented here and other possible effects. (original abstract)
Czasopismo
Rocznik
Strony
111--125
Opis fizyczny
Twórcy
autor
- Lviv Polytechnic National University
autor
- Lviv Polytechnic National University
autor
- Lviv Polytechnic National University
autor
- Lodz University of Technology
autor
- University of Lodz
Bibliografia
- Ahmadi Bidakhvidi M. (2016), NetTools, n opensource utility [online], http://www.softpedia.com/get/Network-Tools/Misc-Networking-Tools/Net-Tools.shtml.
- Lakomy M. (2013), Zagrożenia dla bezpieczeństwa teleinformatycznego państw - przyczynek do typologii [online], M.Lakomy-zagrozenia-dla-bezpieczenstwa-telekomunikacyjnego (5).pdf,.
- Newman J. (2016), The Book of GNS3, A Whitepaper, GNS3.com Marketplace [online], https://www.gns3.com/marketplace/whitepaper/the-book-of-gns3.
- ZOHO corp. (2016), Manage Engine. NetFlow Analyzer, a traffic monitoring utility by Zoho Corp. [online], https://www.manageengine.com/products/netflow/.
- Zhiming L., Sheng L., Jin H., Di X., Zhantao D. (2012), Complex Network Security Analysis based on Attack Graph Model, Proceedings of Second International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC), pp. 183-186.
- Zhukova M.N., Stefarov A.P. (2015), Development of the protected telecommunication systems, Proceedings of International Siberian Conference on Control and Communications (SIBCON).
- Zhukov V.G., Zhukova M.N., Stefarov A.P. (2012), Criteria of violators classification at the construction of violator's model, Proceedings of the 12th International Conference "Information security - 2012",Taganrog, TTI SFU, vol. 1.
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.ekon-element-000171451867