TITLE

Adelphia Battles Malicious Net Traffic

AUTHOR(S)
Stump, Matt
PUB. DATE
January 2006
SOURCE
Multichannel News;1/9/2006, Vol. 27 Issue 2, p27
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article reports that Adelphia Communications Corp. is launching network-security software from Sandvine Inc. to cut down the amount of malicious traffic to its high-speed data subscribers, as of January 9, 2005. Sandvine provides deep-packet inspection tools so operators can tell exactly what traffic is crossing their networks. Cutting down on malicious traffic has a direct benefit not only in terms of subscriber satisfaction, it also reduces the number of service calls to customer-service representatives.
ACCESSION #
19373856

 

Related Articles

  • Combine the best security options. Ferro, Mitch // Communications News;May2006, Vol. 43 Issue 5, p36 

    The article provides information on managed security services offering which targets security threats where they are best defeated-either at the enterprise premise for certain types of intrusion prevention, or in the network for resource-intensive threats. These services include firewalls and...

  • Forensic Data Security for Intrusions. ul Haq, Nauman; Sattar, Ahsan Raza; Mustafa, Tasleem; Saeed, M. Yahya; Mateen, Ahmed // European Journal of Scientific Research;Jan2010, Vol. 39 Issue 2, p296 

    Security of the data over a network of computer systems is the most common talk in modern days due to heavy data communication over the network. This research paper presents the way of network and data security by proving the solution by forensic measures of dealing with network data traffic. In...

  • The neglected intrusion. Periolat, Jerry // Communications News;Mar2005, Vol. 42 Issue 3, p18 

    This article discusses the application of use-filtering software in network security and its difference from content-filtering tools. Organizations have multiple security layers in place that filter network content, like e-mail and Internet use, to help reduce intrusions from malicious code. A...

  • A Framework for Unified Network Security Management: Identifying and Tracking Security Threats on Converged Networks. Dawkins, J.; Clark, K.; Manes, G.; Papa, M. // Journal of Network & Systems Management;Sep2005, Vol. 13 Issue 3, p253 

    A comprehensive network security management system must coordinate detection and scanning tools for converged networks; derive fully-integrated attack and network models; perform vulnerability and multi-stage attack analysis; support large-scale attack visualization; and possibly orchestrate...

  • Net Glean: A Methodology for Distributed Network Security Scanning. Manes, Gavin W.; Schulte, Dominic; Guenther, Seth; Shenoi, Sujeet // Journal of Network & Systems Management;Sep2005, Vol. 13 Issue 3, p329 

    Network vulnerability analysis tools today do not provide a complete security awareness solution. Currently, network administrators utilize multiple analysis tools in succession or randomly in a patchwork fashion that provides only temporary assurance. This paper introduces NetGlean as a...

  • If it had teeth, it might bite someone. Bradner, Scott // Network World;3/29/2004, Vol. 21 Issue 13, p28 

    The National Cyber Security Partnership (NCSP) has released the first two of five planned reports concerning various aspects of cyber security. The partnership is an outgrowth of the December 2003 National Cyber Security Summit convened in response to last year's National Strategy to Secure...

  • Taming the ever-evolving phish risk. Garretson, Cara // Network World;1/31/2005, Vol. 22 Issue 4, p19 

    This article describes a phishing technique to attack network security in the U.S. Security vendors and anti-phishing organizations report that targeted phishing attacks on enterprise networks, sometimes called spear phishing, are increasing. These attacks target workplaces by spoofing...

  • Is Your Network Secure? Schwartz, Ephraim // InfoWorld;3/1/2004, Vol. 26 Issue 9, p11 

    Deals with security measures for computer networks of enterprises. Limitation of virtual private networks; Views of Spire Security's research director Pete Lindstrom on network security within the enterprise; Security problem with using standard- and protocol-based networks; Role of software...

  • MU SECURITY TAKES A HACKER'S APPROACH. McLaughlin, Kevin // CRN;4/17/2006, Issue 1192, p83 

    The article introduces the MU Security's MU-4000 Security Analyzer, a test laboratory appliance that launches a barrage of attacks on network infrastructure prior to deployment. According to Ajit Sancheti, co-founder and CEO of MU Security, the idea is to adopt ethical hacking techniques to...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics