Matches in SemOpenAlex for { <https://semopenalex.org/work/W2901160413> ?p ?o ?g. }
Showing items 1 to 64 of
64
with 100 items per page.
- W2901160413 abstract "Standard solutions that are supported by manufacturers of equipment for computer networks (switches the 2nd and 3rd levels, routers), implemented in the operating systems and protocols, and can be used for the development and implementation of integrated corporate network protection systems are considered in this article. The article is the second of a series of articles devoted to the analysis of methods and technologies of protection. The typical threats to computer network at the network (substitution the IP addresses of the nodes, imposing the wrong route, intercepting the IP address range and receiving information about the logical structure of the network, DDoS attacks on external channels), transport (Interception of information and connection to open ports of transport layer protocols) and application (Information interception, viruses and spyware) layers of OSI model are given and the features of methods and technologies to protect at are analyzed. Technology of Network Address Translation and Access Control Lists are analyzed to prevent threats to the network level. Features of using the “Blackhole” BGP function for protection against DDoS attacks on external channels are considered. The features of the protocol Secure Socket Layer / Transport Layer Security to protect against threats to the transport layer are analyzed. Approaches of “Statefull” Inspection and content filtering that allow implementing control of connection, data control between specific applications and performing filtering unwanted information are considered at the application level. Also, features of network security providing in heterogeneous virtual computing environments such as GRID-systems and cloud computing are noted. The approaches to protection which ware considered in work allow to effectively counter acting, first of all, external violation of information security. In the previous article of the cycle the methods and technologies of the physical and channel levels that were aimed at protecting against internal attacks on computer networks were considered. Analysis of methods and protection technologies at various levels of the OSI model which was conducted in work allows making informed decisions about choosing methods to protect networks for different purposes and with different requirements regarding data protection. Configuring the proper functionality on the network equipment allows carrying out the monitoring of compliance with network security policies and implement protection as close to possible sources of violations. Ref. 16, tabl. 1." @default.
- W2901160413 created "2018-11-29" @default.
- W2901160413 creator A5014517562 @default.
- W2901160413 date "2018-02-28" @default.
- W2901160413 modified "2023-09-30" @default.
- W2901160413 title "Methods and technologies for computer networks protection (network, transport and application layers)" @default.
- W2901160413 cites W154981914 @default.
- W2901160413 cites W2906059229 @default.
- W2901160413 doi "https://doi.org/10.20535/2523-4455.2018.23.1.113193" @default.
- W2901160413 hasPublicationYear "2018" @default.
- W2901160413 type Work @default.
- W2901160413 sameAs 2901160413 @default.
- W2901160413 citedByCount "0" @default.
- W2901160413 crossrefType "journal-article" @default.
- W2901160413 hasAuthorship W2901160413A5014517562 @default.
- W2901160413 hasBestOaLocation W29011604131 @default.
- W2901160413 hasConcept C105339364 @default.
- W2901160413 hasConcept C110875604 @default.
- W2901160413 hasConcept C111919701 @default.
- W2901160413 hasConcept C123745756 @default.
- W2901160413 hasConcept C168535184 @default.
- W2901160413 hasConcept C190793597 @default.
- W2901160413 hasConcept C31258907 @default.
- W2901160413 hasConcept C38652104 @default.
- W2901160413 hasConcept C38822068 @default.
- W2901160413 hasConcept C41008148 @default.
- W2901160413 hasConceptScore W2901160413C105339364 @default.
- W2901160413 hasConceptScore W2901160413C110875604 @default.
- W2901160413 hasConceptScore W2901160413C111919701 @default.
- W2901160413 hasConceptScore W2901160413C123745756 @default.
- W2901160413 hasConceptScore W2901160413C168535184 @default.
- W2901160413 hasConceptScore W2901160413C190793597 @default.
- W2901160413 hasConceptScore W2901160413C31258907 @default.
- W2901160413 hasConceptScore W2901160413C38652104 @default.
- W2901160413 hasConceptScore W2901160413C38822068 @default.
- W2901160413 hasConceptScore W2901160413C41008148 @default.
- W2901160413 hasLocation W29011604131 @default.
- W2901160413 hasLocation W29011604132 @default.
- W2901160413 hasOpenAccess W2901160413 @default.
- W2901160413 hasPrimaryLocation W29011604131 @default.
- W2901160413 hasRelatedWork W1966681450 @default.
- W2901160413 hasRelatedWork W2131680743 @default.
- W2901160413 hasRelatedWork W2131882297 @default.
- W2901160413 hasRelatedWork W2169073053 @default.
- W2901160413 hasRelatedWork W2208244235 @default.
- W2901160413 hasRelatedWork W2491118504 @default.
- W2901160413 hasRelatedWork W2494173273 @default.
- W2901160413 hasRelatedWork W2587014261 @default.
- W2901160413 hasRelatedWork W2778438715 @default.
- W2901160413 hasRelatedWork W2790924225 @default.
- W2901160413 hasRelatedWork W2902455427 @default.
- W2901160413 hasRelatedWork W2906059229 @default.
- W2901160413 hasRelatedWork W2913825203 @default.
- W2901160413 hasRelatedWork W3111187927 @default.
- W2901160413 hasRelatedWork W3139155658 @default.
- W2901160413 hasRelatedWork W32376735 @default.
- W2901160413 hasRelatedWork W1940109429 @default.
- W2901160413 hasRelatedWork W1941627677 @default.
- W2901160413 hasRelatedWork W2133097031 @default.
- W2901160413 hasRelatedWork W2233806948 @default.
- W2901160413 isParatext "false" @default.
- W2901160413 isRetracted "false" @default.
- W2901160413 magId "2901160413" @default.
- W2901160413 workType "article" @default.