Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 9 SI
Page No. 6961 - 6966

Smart Network Probes for Campus Network Incident Analysis

Authors : Ladislav Ondrej Hornig, Ondrej Hornig and Vladimir Sobeslav

References

Brida, P., J. Machaj and J. Benikovsky, 2014. A modular localization system as a positioning service for road transport. Sensors, 14: 20274-20296.
CrossRef  |  Direct Link  |  

Chen, Z., Y. Wu, J. Ge and E. Yuepeng, 2014. A new lookup model for multiple flow tables of open flow with implementation and optimization considerations. Proceedings of the IEEE International Conference on Computer and Information Technology (CIT), September 11-13, 2014, IEEE, Beijing, China, ISBN:978-1-4799-6240-2, pp: 528-532.

Cyber Security, 2017. Index of Cyber Security. Cyber Security. http://www.cybersecurityindex.org/.

Dubrawsky, I., 2003. Firewall evolution-deep packet inspection. Security Focus. http://leetupload.com/database/Misc/Papers/Web%20Papers/Firewall-Evolution-deep-packet-inspection.pdf.

Greenwald, M., S.K. Singhal, J.R. Stone and D.R. Cheriton, 1996. Designing an academic firewall: Policy, practice and experience with surf. Procedings of the Symposium on Network and Distributed System Security, February 22-23, 1996, IEEE, California, USA., ISBN:0-8186-7222-6, pp: 79-92.

Hamed, H. and A.E. Shaer, 2006. Dynamic rule-ordering optimization for high-speed firewall filtering. Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, March 21-24, 2006, ACM, Taipei, Taiwan, ISBN:1-59593-272-0, pp: 332-342.

Hamelin, M., 2010. Preventing firewall meltdowns. Network Secur., 2010: 15-16.
Direct Link  |  

Horalek, J., S. Karamazov, F. Holik and T. Svoboda, 2015. Analysis of the Use of Cloud Services and their Effects on the Efficient Functioning of a Company. In: Computational Collective Intelligence, Manuel, N., N.T. Nguyen, D. Camacho and B. Trawinski, (Eds.). Springer, Berlin, Germany, ISBN:978-3-319-24305-4, pp: 336-345.

Horalek, J., S. Neradova, S. Karamazov, F. Holik and O. Marik et al., 2015. Proposal to Centralize Operational Data Outputs of Airport Facilities. In: Computational Collective Intelligence, Nunez, M., N.T. Nguyen, D. Camacho and B. Trawinski (Eds.). Springer, Berlin, Germany, ISBN:978-3-319-24305-4, pp: 346-354.

Kobiersky, P., J. Korenek and L. Polcak, 2009. Packet header analysis and field extraction for multigigabit networks. Proceedings of the 12th International Symposium on Design and Diagnostics of Electronic Circuits and Systems DDECS'09, April 15-17, 2009, IEEE, New York, USA., ISBN:978-1-4244-3341-4, pp: 96-101.

Mishra, A., A. Agrawal and R. Ranjan, 2011. Artificial intelligent firewall. Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, July 21-22, 2011, ACM, New York, USA., ISBN:978-1-4503-0635-5, pp: 204-207.

Moon, C.S. and S.H. Kim, 2014. A study on the integrated security system based real-time network packet deep inspection. Intl. J. Secur. Appl., 8: 113-122.
Direct Link  |  

Rehak, M., M. Pechoucek, M. Grill, K., Bartos and V. Krmicek et al., 2009. Collaborative approach to network behaviour analysis based on hardware-accelerated FlowMon probes. Intl. J. Electron. Secur. Digital Forensics, 2: 35-48.
Direct Link  |  

Wang, D., Y. Xue and Y. Dong, 2011. Memory-efficient hypercube flow table for packet processing on multi-cores. Proceedings of the Conference on Global Telecommunications (GLOBECOM 2011), December 5-9, 2011, IEEE, Honolulu, Hawaii, ISBN:978-1-4244-9266-4, pp: 1-6.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved