Study on Detection Method of Server Intrusion for Small and Medium Sized Enterprises

Zhi Zhang
July 2014
Applied Mechanics & Materials;2014, Issue 608-609, p507
Academic Journal
This article analyses in detail the safety hazards and risks among all levels of the enterprise from the point of view of the structure, there may be in accordance with the overall balance, principle, technology integration, propose a network security requirements of the enterprise, and further puts forward a whole network security solutions. Moreover, the paper takes Web service composition documents as the research object, through the analysis of the server, the port and address on the Web file, to establish Web intrusion detection model. The core of the model is the monitoring of host resources in Web server, finally discusses in detail the design and Realization of resource monitoring system.


Related Articles

  • Research on Security Awareness and Countermeasures for the Single Server. Hyuk-Jin Son; Seungdo Jeong // International Journal of Security & Its Applications;Nov2013, Vol. 7 Issue 6, p31 

    Accompanying to the growing utilization and dependency on the internet and the ICT (Information and Communication Technology), the threat by hacking, malicious code and virus are rising as serious problems. Especially, the single server which is hosted by professional hosting companies is...

  • Intrusion Detection System (IDS/IPS) Market Worth $5.042 Billion by 2019.  // Sensors;4/18/2014, p1 

    The article discusses a report on Intrusion Detection System / Intrusion Prevention System (IDS/IPS) Global Advancements Forecasts & Analysis (2014-2019) from market research firm Market MarketsandMarkets which predicts growth in IDS/IPS marker by 2019.

  • Data flow network security strategies based on data mining. Bing Liu; Yang Zhao; Yuanyuan Dang // Metallurgical & Mining Industry;2015, Issue 10, p46 

    Based on the frequent pattern outlier algorithm, this paper establishes a mathematical model of data flow network security strategy based on data mining, and applies the improved outliers detection algorithm based on frequent pattern to the intrusion detection system. Experiments proved the...

  • THE EDGE IN ED TECH. Stern, Adam // AV Technology;Jul/Aug2014, Vol. 7 Issue 6, p13 

    The article discusses the selection between public and private cloud servers. Topics discussed include security as the primary consideration in choosing public and private cloud, the benefits of virtual servers under private cloud, and the use intrusion detection and prevention systems (IDPS) in...

  • Feedback Reliability Ratio of an Intrusion Detection System. Banerjee, Usha; Batra, Gaurav; Arya, K. V. // Journal of Information Security;Jul2012, Vol. 3 Issue 3, p238 

    The behavior and nature of attacks and threats to computer network systems have been evolving rapidly with the advances in computer security technology. At the same time however, computer criminals and other malicious elements find ways and methods to thwart such protective measures and find...

  • A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy. Waizumi, Yuji; Tsunoda, Hiroshi; Tsuji, Masashi; Nemoto, Yoshiaki // Journal of Information Security;Jan2012, Vol. 3 Issue 1, p18 

    Because of an explosive growth of the intrusions, necessity of anomaly-based Intrusion Detection Systems (IDSs) which are capable of detecting novel attacks, is increasing. Among those systems, flow-based detection systems which use a series of packets exchanged between two terminals as a unit...

  • Generation of Attack Scenarios by Modeling Algorithms for Evaluating and Testing IDS. Saber, Mohammed; Bouchentouf, Toumi; Benazzi, Abdelhamid // International Journal of Computer Theory & Engineering;Apr2012, Vol. 4 Issue 2, p171 

    We focus in this paper to improve the level of intrusion detection system (IDS). This improvement is based on three research areas: classification of attacks, generation of attack scenarios and finally evaluation methods. We will discuss in this article the second area, which consists on the...

  • ESM Upgrade Unifies Vulnerability Scanning. Phillips, Ken // PC Week;01/25/99, Vol. 16 Issue 4, p59 

    Reviews Enterprise Security Manager 5, software from Axent Technologies Inc. that provides agent-based scanning for computer network security. Reporting capabilities; Types of businesses, which will benefit most from the software; Server operating systems for which it will work; Pricing;...

  • LAN recovery plan testing as critical as the plan. Kirvan, Paul // Communications News;Nov94, Vol. 31 Issue 11, p42 

    Comments on the need for a local area network (LAN) recovery plan in client/server computing companies. Difficulty in recovering LANs; Testing objectives; Plan testing activities; Test procedures.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics