August 2000
Network World;08/28/2000, Vol. 17 Issue 35, p51
Trade Publication
Describes how the information services team of a research university in the Southeastern United States was able to fight off a massive distributed denial-of-service attack on the campus network. Outages that occurred across the campus network in the weeks prior to the attack; Troubleshooting; Deployment of intrusion-detection probes on the segment under siege; Use of the open-source Snort intrusion-detection system. INSET: SURVIVAL TIPS..


Related Articles

  • Events Classification in Log Audit. Al-Fedaghi, Sabah; Mahdi, Fahad // International Journal of Network Security & Its Applications;Apr2010, Vol. 2 Issue 2, p58 

    Information security audit is a monitoring/logging mechanism to ensure compliance with regulations and to detect abnormalities, security breaches, and privacy violations; however, auditing too many events causes overwhelming use of system resources and impacts performance. Consequently, a...

  • Vulnerability Discovery with Attack Injection. Antunes, João; Neves, Nuno; Correia, Miguel; Verissimo, Paulo; Neves, Rui // IEEE Transactions on Software Engineering;May/Jun2010, Vol. 36 Issue 3, p357 

    The increasing reliance put on networked computer systems demands higher levels of dependability. This is even more relevant as new threats and forms of attack are constantly being revealed, compromising the security of systems. This paper addresses this problem by presenting an attack injection...

  • Application of An Improved Recurrent Neural Network in Network Security Situation Prediction. Junping Cai; Lei Qu; Gang Chen; Jun Yang // Advanced Materials Research;2014, Issue 951, p173 

    The expansion of the network becomes size, network mode is diversification, network topology structure becomes more complex, the data traffic rises rapidly in the network, causes the network load increases, attack, fault and other unexpected network security events are more severe. Neural...

  • Vendors Finding Value in Bug Bounty Programs. Kerner, Sean Michael // eWeek;7/30/2015, p1 

    The article reports on use of bug bounty programs for debugging by technology vendors, started by web and mobile security services company Bugcrowd Inc. Topics include views of Casey Ellis, founder of Bugcrowd, on crowdsourcing of bug reporting, an increase in the adoption the bug bounty program...

  • The Changing Landscape Of Network Analysis. Barry, Dan Joe // Database & Network Journal;Dec2011, Vol. 41 Issue 6, p3 

    The author discusses the importance of network monitoring and analysis in the information and technology (IT) strategy of businesses. He outlines the opportunities created by network monitoring and analysis which include network testing, network enterprise security and financial trading...

  • Internet Security Flaws in the Age of Big Data. Merkel, Robert // Issues;Dec2014, Issue 109, p5 

    The article focuses on the flaws of Internet security in the age of big data. Topics discussed include the importance and function of the OpenSSL computer software, the Bourne-Again Shell Bash, which is the well-publicised security issue of 2014, and the software bugs Heartbleed and Shellshock...

  • Support Call. Walsh, Lawrence M. // Information Security;Oct2004, Vol. 7 Issue 10, p8 

    Comments on problems encountered by consumers with the customer service of computer network security vendors. Description of online troubleshooting guides; Way of measuring the usefulness of antivirus technology; Tips for ensuring adequate service support.

  • The research of the computer network fault solution. Chunling Zhang // Advanced Materials Research;2014, Vol. 971-973, p1824 

    the theoretical basis for analysis of network fault, from network fault diagnosis technology and layered hardware work steps of the two ways to solve the fault diagnosis are discussed, this paper introduces the network security technology such as firewall and anti-virus technology.

  • Private data aggregation with integrity assurance and fault tolerance for mobile crowd-sensing. Chen, Jianwei; Ma, Huadong; Zhao, Dong // Wireless Networks (10220038);Jan2017, Vol. 23 Issue 1, p131 

    Mobile crowd-sensing can learn the aggregate statistics over personal data to produce useful knowledge about the world. Since personal data may be privacy-sensitive, the aggregator should only gain desired statistics without learning anything about the personal data. To guarantee differential...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics