Computer And Network Security
Mostrando 1-12 de 31 artigos, teses e dissertações.
-
1. AutonomicSec: Um Mecanismo Autonômico para Segurança de Redes baseado em Decepção / AutonomicSec: A Autonomic Mechanism for Networks Security based on Deception
Security in computer networks is the area responsible for protecting the data passing through it. The research for better security strategies has increased considerably since exists a vast number of attempted attacks. These attacks have caused financial loss and reputation damage to companies, institutions and individuals. There are several obstacles to achi
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 21/03/2012
-
2. Análise das variáveis de entrada de uma rede neural usando teste de correlação e análise de correlação canônica / Analysis of input variables of an artificial neural network using bivariate correlation and canonical correlation
The monitoring of variables and diagnosis of sensor fault in nuclear power plants or processes industries is very important because an early diagnosis allows the correction of the fault and, like this, do not cause the production interruption, improving operators security and its not provoking economics losses. The objective of this work is, in the whole of
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 21/09/2011
-
3. Sistemas de detecção de intrusão com técnicas de inteligência artificial / Intrusion detection systems with artificial inteligence technics
Due the increase of the amount of important information on computer networks, security has became primordial to ensure the integrity, confidentiality and availability of data traffic. To improve security, there are useful tools such as Firewalls and Intrusion Detection Systems (IDS). Currently, methods of Artificial Intelligence (AI) are used to improve thes
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 25/02/2011
-
4. Uma metodologia para caracterização do tráfego de redes de computadores: uma aplicação em detecção de anomalias / Methodology for traffic characterization of computer networks: an application in anomaly detection
The methods of intrusion detection based on anomalies model the default behavior of network traffic and identify anomalies as deviations from the behavior model mapped. The modeling of traffic behavior requires the analysis of large datasets to extract knowledge about the particularities of each network environment, considering the services provided, number
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 24/02/2011
-
5. WAVELET-BASED ANOMALY DETECTION IN NETWORK TRAFFIC / UM DETECTOR DE ANOMALIAS DE TRÁFEGO DE REDE BASEADO EM WAVELETS
Attacks on computer networks compromises the security of the system and degrade the performance of the network causing problems to users and organizations. Networkbased Intrusion Detection Systems are used to detect attacks or malicious activity by analyzing the network traffic. The anomaly-based detection approach is used for intrusion detection. It is assu
Publicado em: 2010
-
6. Controle de acesso para sistemas distribuídos. / Access control for distributed systems.
A implementação de arcabouços de controle de acesso para sistemas distribuídos é dificultada pelas características próprias desta classe de ambientes, demandando modificações tanto na arquitetura do arcabouço quanto no modelo de política de controle de acesso usualmente empregados em arquiteturas não distribuídas. Este trabalho tenciona sanar ou
Publicado em: 2010
-
7. Identificação remota de sistemas operacionais utilizando análise de processos aleatórios e redes neurais artificiais
A new method to perform TCP/IP fingerprinting is proposed. TCP/IP fingerprinting is the process of identify a remote machine through a TCP/IP based computer network. This method has many applications related to network security. Both intrusion and defence procedures may use this process to achieve their objectives. There are many known methods that perform t
Publicado em: 2009
-
8. Formal verification of fair exchange protocols using the strand spaces method / Verificação formal de protocolos de trocas justas utilizando o metodo de espaços de fitas
Fair exchange protocols were first proposed as a solution to the problem of exchanging digital items, between two or more entities, without forcing them to trust each other. The popularization of the internet resulted in an increasing amount of lay users, which constantly participate in exchange transactions, such as electronic commerce (ecommerce), internet
Publicado em: 2009
-
9. An approach to inter-domain resource reservation for QoS management in next generation networks / Uma abordagem para reserva de recursos no gerenciamento de QoS entre dominios em redes de proxima geração
The technological evolution that happened on the last decades fostered the steep growth of the Internet, the creation of new Internet capable devices, like sensors and PDAs, and the creation of a multitude of online applications. This new scenario brought challenges very different from those initially considered on the creation of the Internet, so emerged th
Publicado em: 2009
-
10. Uma proposta de assinatura digital para imagens por meio de marca dágua
Nowadays, digital contents may be shared and easily distributed in Internet, but a lot of intruders use these facilities im order to falsify or illegally distribute this contents. The use of digital watermark is a widely adopted solution, in order to offer security to digital multimedia files by Internet. This solution is adopted with purposes of authenticat
Publicado em: 2008
-
11. Uma proposta para medição de complexidade e estimação de custos de segurança em procedimentos de tecnologia da informação / An approach to measure the complexity and estimate the cost associated to Information Technology Security Procedures
Segurança de TI tornou-se nos últimos anos uma grande preocupação para empresas em geral. Entretanto, não é possível atingir níveis satisfatórios de segurança sem que estes venham acompanhados tanto de grandes investimentos para adquirir ferramentas que satisfaçam os requisitos de segurança quanto de procedimentos, em geral, complexos para instal
Publicado em: 2008
-
12. UM ARCABOUCO PARA APLICAÇÕES DE ACESSO A SERVIÇOS DE MONITORAMENTO MULTI-DOMÍNIO / A FRAMEWORK FOR ACCESS APPLICATIONS TO MULTI-DOMAIN MONITORING SERVICES
Network performance measurements that cross different administrative domains are difficult to be obtained, due to use policy issues, security, etc. For these reasons, some national networks started efforts to allow the access to these types of measures, among them the Internet2, Géant2 and RNP. Given these efforts, it was created a document that defined and
IBICT - Instituto Brasileiro de Informação em Ciência e Tecnologia. Publicado em: 19/12/2007