Follow the Money: Using Computer Network Attack to Enforce Economic Sanctions

2001 ◽  
Author(s):  
Paul R. Younes
2014 ◽  
Vol 513-517 ◽  
pp. 1779-1782
Author(s):  
Zheng Chan Rao ◽  
Tian Yin Pu

The computer network attack graph generation method obtained mostly through network scanning, this network reachability information, this approach takes a long presence information and incomplete defects by analyzing network reachability main task of research and developing trends is proposed based on binary decision diagrams algorithm approach to achieve network reachability studies. The algorithm uses the decision diagram modeling firewall rules, through the collection operations to achieve network reachability studies.


2014 ◽  
Vol 1079-1080 ◽  
pp. 816-819 ◽  
Author(s):  
Yuan Qin

With the development of computer network and rapid popularity of Internet, network information security has become the focus of safeguarding national security and social stability. In the network security event, the hacker often can’t successfully intrude into the network by means of a single host / services hacker. With the help of various kinds of "vulnerability" generated bydifferent relationship existing in multiple point multiple host, the hacker can achieve the purpose of network intrusion. Therefore one important aspect of network security is after obtaining the vulnerability of the network information, considering a combination of multiple exploits and analyzing the attack path of network penetration attacks that the attacker may take.


2014 ◽  
Vol 12 (5) ◽  
pp. 3479-3485
Author(s):  
Babatunde R.S ◽  
Adewole K.S ◽  
Abdulsalam S.O ◽  
Isiaka R.M

The development of network technologies and application has promoted network attack both in number and severity.  The last few years have seen a dramatic increase in the number of attacks, hence, intrusion detection has become the mainstream of information assurance. A computer network system should provide confidentiality, integrity and assurance against denial of service. While firewalls do provide some protection, they do not provide full protection.  This is because not all access to the network occurs through the firewall.  This is why firewalls need to be complemented by an intrusion detection system (IDS).An IDS does not usually take preventive measures when an attack is detected; it is a reactive rather than proactive agent. It plays the role of an informant rather than a police officer. In this research, an intrusion detection system that can be used to deny illegitimate access to some operations was developed. The IDS also controls the kind of operations performed by users (i.e. clients) on the network. However, unlike other methods, this requires no encryption or cryptographic processing on a per-packet basis. Instead, it scans the various messages sent on a network by the user. The system was developed using MicrosoftVisual Basic.


Sign in / Sign up

Export Citation Format

Share Document