[PDF][PDF] Detecting unusual activities in local network using snort and wireshark tools

N Alsharabi, M Alqunun… - Journal of Advances in …, 2023 - researchgate.net
Many organizations worldwide encounter security risks on their local network caused by
malware, which might result in losing sensitive data. Thus, network administrators should …

Comparing the performance of intrusion detection systems: Snort and Suricata

BR Murphy - 2019 - search.proquest.com
The frequency and cost of cyber breaches continue to rise. Most breaches occur within
minutes (Verizon, 2018) and remain undetected for months, with an average cost of $3.86 …

A State-of-the Art Survey on Various Attacks and Security Tools at the Virtualization Layer of Cloud Computing: A Virtual Network Security Perspective

A Nautiyal, S Saklani, P Mishra, S Kumar… - Integration of Cloud …, 2023 - taylorfrancis.com
With the advent of technologies such as the Internet of Things (IoT), big data analytics, and
cloud computing, most businesses have adopted virtualization technologies. Virtualization is …

Intrusion prevention and detection in small to medium-sized enterprises

YB Choi, GD Allison - 2017 - aisel.aisnet.org
This paper will examine in depth the reluctance of small to medium-sized enterprises
(SMEs) to implement cybersecurity measures amidst the growing threat of cyberattacks …

[BUCH][B] Understanding Controls to Detect and Mitigate Malicious Privileged User Abuse

CD Harris - 2020 - search.proquest.com
Malicious insider threat is a significant issue for the health-care industry. The purpose of this
qualitative single case study was to investigate contractor cybersecurity professionals' …

[HTML][HTML] Разработка правил по обнаружению скрытых данных в документах PDF

АВ Сергеев, ПБ Хорев - Программные продукты и системы, 2021 - cyberleninka.ru
В статье рассматриваются определение и реализация правил для анализа и
обнаружения скрытой информации внутри документов формата PDF. В настоящее …

Enhancing Network Security With Advanced Network Scanning Tools

S Patel, P Christian, K Mistry, K Raj… - … on Engineering and …, 2024 - ieeexplore.ieee.org
This research paper introduces a sophisticated net-work scanning tool designed to enhance
cybersecurity measures by integrating advanced techniques in operating system (OS) …

The Influences of Intrusion Detection System Information Assurance Challenges within the Large Organizations of Southern United States

M Fayyadh - 2019 - search.proquest.com
Intrusion detection system (IDS) represents a software or hardware appliance uses for
monitoring the network traffic to find any suspicious activities and threats. IDS have …

[ZITATION][C] LA IMPORTANCIA DE LOS IPS Y BYOD EN LAS ORGANIZACIONES: CASO DE ESTUDIOS CONFIDENCIAL SA

NE Maridueña Carrión - 2016