TITLE

Adelphia Battles Malicious Net Traffic

AUTHOR(S)
Stump, Matt
PUB. DATE
January 2006
SOURCE
Multichannel News;1/9/2006, Vol. 27 Issue 2, p27
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article reports that Adelphia Communications Corp. is launching network-security software from Sandvine Inc. to cut down the amount of malicious traffic to its high-speed data subscribers, as of January 9, 2005. Sandvine provides deep-packet inspection tools so operators can tell exactly what traffic is crossing their networks. Cutting down on malicious traffic has a direct benefit not only in terms of subscriber satisfaction, it also reduces the number of service calls to customer-service representatives.
ACCESSION #
19373856

 

Related Articles

  • Combine the best security options. Ferro, Mitch // Communications News;May2006, Vol. 43 Issue 5, p36 

    The article provides information on managed security services offering which targets security threats where they are best defeated-either at the enterprise premise for certain types of intrusion prevention, or in the network for resource-intensive threats. These services include firewalls and...

  • The neglected intrusion. Periolat, Jerry // Communications News;Mar2005, Vol. 42 Issue 3, p18 

    This article discusses the application of use-filtering software in network security and its difference from content-filtering tools. Organizations have multiple security layers in place that filter network content, like e-mail and Internet use, to help reduce intrusions from malicious code. A...

  • MU SECURITY TAKES A HACKER'S APPROACH. McLaughlin, Kevin // CRN;4/17/2006, Issue 1192, p83 

    The article introduces the MU Security's MU-4000 Security Analyzer, a test laboratory appliance that launches a barrage of attacks on network infrastructure prior to deployment. According to Ajit Sancheti, co-founder and CEO of MU Security, the idea is to adopt ethical hacking techniques to...

  • Understanding the BIG PICTURE SO You Can Plan for NETWORK SECURITY. Cervone, Frank // Computers in Libraries;Mar2005, Vol. 25 Issue 3, p10 

    This article presents an overview on how libraries can set up network security plans. Network security should be a major concern for a library. There were only six exploit problems, worldwide, reported to the Computer Emergency Readiness Team (CERT) Coordination Center back in 1988. In that...

  • Sarbanes-Oxley At Cost Of Other Security Spending.  // Database & Network Journal;Aug2005, Vol. 35 Issue 4, p22 

    This article focuses on the report published by the Information Security Forum, that warns that the cost of complying with the Sarbanes-Oxley legislation is diverting the costs from addressing other security threats. The global not-for-profit organization with over 260 members, says that many of...

  • Forensic Data Security for Intrusions. ul Haq, Nauman; Sattar, Ahsan Raza; Mustafa, Tasleem; Saeed, M. Yahya; Mateen, Ahmed // European Journal of Scientific Research;Jan2010, Vol. 39 Issue 2, p296 

    Security of the data over a network of computer systems is the most common talk in modern days due to heavy data communication over the network. This research paper presents the way of network and data security by proving the solution by forensic measures of dealing with network data traffic. In...

  • A Framework for Unified Network Security Management: Identifying and Tracking Security Threats on Converged Networks. Dawkins, J.; Clark, K.; Manes, G.; Papa, M. // Journal of Network & Systems Management;Sep2005, Vol. 13 Issue 3, p253 

    A comprehensive network security management system must coordinate detection and scanning tools for converged networks; derive fully-integrated attack and network models; perform vulnerability and multi-stage attack analysis; support large-scale attack visualization; and possibly orchestrate...

  • Net Glean: A Methodology for Distributed Network Security Scanning. Manes, Gavin W.; Schulte, Dominic; Guenther, Seth; Shenoi, Sujeet // Journal of Network & Systems Management;Sep2005, Vol. 13 Issue 3, p329 

    Network vulnerability analysis tools today do not provide a complete security awareness solution. Currently, network administrators utilize multiple analysis tools in succession or randomly in a patchwork fashion that provides only temporary assurance. This paper introduces NetGlean as a...

  • If it had teeth, it might bite someone. Bradner, Scott // Network World;3/29/2004, Vol. 21 Issue 13, p28 

    The National Cyber Security Partnership (NCSP) has released the first two of five planned reports concerning various aspects of cyber security. The partnership is an outgrowth of the December 2003 National Cyber Security Summit convened in response to last year's National Strategy to Secure...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics