Intrusions and Their Lock in Data Communications Through Internet

被引:0
|
作者
Bacis, Irina Bristena [1 ]
Vasile, Alexandru [1 ]
机构
[1] Ctr Technol Elect & Interconnect Tech, Bucharest, Romania
关键词
intruses; attacks on the security; security measures;
D O I
10.1109/siitme47687.2019.8990710
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Intrusions on entities in a network can be manifested by: identity theft, fraudulent routing, target flooding with protocol messages, and broadcasting an ICMP protocol messaging protocol. Intruders lead to blocking the service for legitimate users, and targets are flooded with unsolicited emails, Protection against such actions can be done with a number of security measures, such as: installing firewalls and installing intrusion detection systems. These safeguards can eliminate or even minimize the likelihood of materializing security threats and prevent attacks on the security features of a system.
引用
收藏
页码:399 / 403
页数:5
相关论文
共 50 条
  • [31] Routers in internetworksHow data travels through the internet
    Prashant Bharadwaj
    Resonance, 2004, 9 (1) : 12 - 25
  • [32] A 10-bit Fast Lock Data Recovery Compensating Pulse-Width Distortion for Isolated Data Communications
    Akita, Hironobu
    Ito, Takasuke
    Hayakawa, Keita
    Matsudaira, Nobuaki
    Yamamoto, Hirofumi
    Chen, Chao
    Ohtsuka, Shigeki
    Taguchi, Shinichirou
    2014 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2014, : 7 - 8
  • [33] From informed consent through database lock: An interactive clinical trial conducted using the Internet
    Eilenberg, KL
    Hoover, AM
    Rutherford, ML
    Melfi, CA
    Segal, S
    DRUG INFORMATION JOURNAL, 2004, 38 (03): : 239 - 251
  • [34] Enhance the protection of transmitted data in 5G D2D communications through the Social Internet of Things
    Suraci, C.
    Pizzi, S.
    Iera, A.
    Araniti, G.
    2018 IEEE 29TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2018, : 376 - 380
  • [35] From Informed Consent through Database Lock: An Interactive Clinical Trial Conducted Using the Internet
    Kristin L. Eilenberg
    Amy M. Hoover
    Michael L. Rutherford
    Catherine A. Melfi
    Scott Segal
    Drug information journal : DIJ / Drug Information Association, 2004, 38 (3): : 239 - 251
  • [36] Energy Optimization in Data Communications through Cluster Evolution
    Habib, Sami J.
    Marimuthu, Paulvanna N.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 161 - 166
  • [37] Wireless Personal Communications: Machine Learning for Big Data Processing in Mobile Internet
    Guo, Jun
    Tan, Zheng-Hua
    Cho, Sung Ho
    Zhang, Guoqiang
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 102 (03) : 2093 - 2098
  • [38] Data dissemination for Internet of vehicle based on 5G communications: A survey
    Benalia, Elhadja
    Bitam, Salim
    Mellouk, Abdelhamid
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (05)
  • [39] Wireless Personal Communications: Machine Learning for Big Data Processing in Mobile Internet
    Jun Guo
    Zheng-Hua Tan
    Sung Ho Cho
    Guoqiang Zhang
    Wireless Personal Communications, 2018, 102 : 2093 - 2098
  • [40] The Internet of total corporate communications, quaternary corporate communications and the corporate marketing Internet revolution
    Balmer, John M. T.
    Yen, Dorothy A.
    JOURNAL OF MARKETING MANAGEMENT, 2017, 33 (1-2) : 131 - 144