首页> 外文会议>IEEE International Conference on Computational Intelligence and Computing Research >Analyzing and developing security techniques for worms in cognitive networks
【24h】

Analyzing and developing security techniques for worms in cognitive networks

机译:认知网络中蠕虫的安全技术分析与开发安全技术

获取原文

摘要

Networking provides the main infrastructure for different recent applications. These applications are targets for different types of attack. In this paper a structured literature for different types of attacks has been proposed. It presents worms attacks. Latest network security technologies are investigated, the current situation and increasing demand for robust network security is analyzed. For security specialist it is vital to make difference any reproducing programs, which may not harm your system, and it closer forms. Worms is one of the most common propagation attacks over the internet. Worm to propagate it can use two methods: finding any vulnerable devices in the network and propagate using topological neighbors. Investigating the methods of worm propagation can provide a clearer vision on how worms propagate and how to defense and prevent such type of attacks. Last decade different mechanisms for detection and defensing have been proposed to deal with the worm attacks. A detailed methodology is proposed to overcome worm attack mechanisms. Based on which different attributes of information security have been analyzed which includes integrity, confidentiality, availability, authentication, non-repudiation and access control.
机译:网络为不同最近应用程序提供了主要基础架构。这些应用程序是不同类型攻击的目标。本文提出了一种用于不同类型攻击的结构化文献。它呈现蠕虫攻击。分析了最新的网络安全技术,分析了当前情况和对强大的网络安全需求的增加。对于安全专员来说,对任何复制计划进行差异,这可能不会损害您的系统,并且仔细呈现。蠕虫是互联网上最常见的传播攻击之一。传播的蠕虫可以使用两种方法:在网络中查找任何易受攻击的设备并使用拓扑邻居传播。调查蠕虫传播的方法可以对蠕虫的传播以及如何防御和防止这种类型的攻击提供更清晰的愿景。最后十年的检测和防御机制已经提出了处理蠕虫攻击。提出了一种详细的方法来克服蠕虫攻击机制。基于已经分析了信息安全性的不同属性,包括完整性,机密性,可用性,身份验证,非拒绝和访问控制。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号