A SURVEY OF NETWORK SERVICE LOG PROCESSING PLATFORMS AND TECHNIQUES FOR THE DETECTION OF INFORMATION INSECURITY RISKS
In the layers of information security measures, the monitoring and detection measures of anomalous activities and information insecurity risks are considered the second defense layer behind firewalls and access controls. This defense layer includes intrusion detection and prevention systems for host...
Saved in:
Main Authors: | Phạm Duy Lộc, Hoàng Xuân Dậu |
---|---|
Format: | Article |
Language: | English |
Published: |
Dalat University
2018-07-01
|
Series: | Tạp chí Khoa học Đại học Đà Lạt |
Subjects: | |
Online Access: | http://tckh.dlu.edu.vn/index.php/tckhdhdl/article/view/405 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
AN APPROACH HYBRID RECURRENT NEURAL NETWORK AND RULE-BASE FOR INTRUSION DETECTION SYSTEM
by: Trần Thị Hương, et al.
Published: (2019-06-01) -
IMPROVING INTRUSION DETECTION USING TREE ADJOINING GRAMMAR GUIDED GENETIC PROGRAMMING
by: Vũ Văn Cảnh, et al.
Published: (2017-09-01) -
THE PSYCHOLOGICAL TRAUMA EXPRESSIONS OF CHILDREN LIVING IN THE NON-INTERGRITY FAMMILY THROUGH EMOTIONS AND FEELINGS REGARDING FAMILY AND SOCIAL LIFE
by: Huỳnh Văn Sơn, et al.
Published: (2019-12-01) -
SIMULATION OF THE EFFECTS OF RIVERS AND SLUICES ON THE PROCESS OF SALTWATER INTRUSION IN THE MEKONG RIVER DELTA
by: Hoàng Ngọc Hiển, et al.
Published: (2017-09-01) -
EFFECTS OF HEAT TREATMENT ON THE UPCONVERSION AND NEAR-INFRARED EMISSIONS OF ERBIUM IN TRANSPARENT TELLURITE GLASS-CERAMICS
by: Vũ Hằng Nga, et al.
Published: (2020-05-01)