- Title
- A Comprehensive protection method for securing the organization's network against cyberattacks
- Creator
- Kbar, Ghassan; Alazab, Ammar
- Date
- 2019
- Type
- Text; Conference proceedings
- Identifier
- http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/181630
- Identifier
- vital:15977
- Identifier
-
https://doi.org/10.1109/CCC.2019.00005
- Identifier
- ISBN:1-7281-2601-0
- Abstract
- The advance in technologies helped in providing efficient system that connect people worldwide such as the use of internet. At the same time cyber attackers exploited the vulnerabilities existed in these technologies to conduct large variety of attack activities against the information and systems. Researchers and solution's providers implemented different countermeasure mechanisms to protect the system against attacks and saved the discovered type of attack in attack database for future analysis and decision. Intrusion Detection (ID) system is an example for protecting the system against attacks by monitoring the network activities and updating the attack database for future analysis and protection decision. In addition to IDs, firewall, intrusion prevention, encryption, authorization and authentication are used to protect the system. Furthermore, a supplementary configurations honeypot systems can be used to strengthen the system security.
- Publisher
- IEEE
- Relation
- 2019 Cybersecurity and Cyberforensics Conference (CCC); Melbourne, VIC, Australia; 8-9 May 2019 p. 118-122
- Rights
- All metadata describing materials held in, or linked to, the repository is freely available under a CC0 licence
- Rights
- Copyright IEEE
- Reviewed
- Hits: 239
- Visitors: 227
- Downloads: 0
Thumbnail | File | Description | Size | Format |
---|