DocumentCode :
2368570
Title :
Information protection from network sniffing of bandwidths sharing
Author :
Tsai, Chang-Lung ; Wu, Tsung-Hsian
Author_Institution :
Dept. of Comput. Sci., Chinese Culture Univ., Taipei
fYear :
2008
fDate :
13-16 Oct. 2008
Firstpage :
84
Lastpage :
88
Abstract :
Sharing network bandwidth is significantly increased and grouped into many networking communities. However, those good intentions of sharing the network bandwidth might attract the attention of intelligentsia and hackers to access personal or enterprisepsilas confidential information. In order to provide more convenient utilization of networking and achieve the goals of resources sharing and protecting private information simultaneously, some protection strategies are proposed in this paper. Firstly, the networkpsilas security checking criteria based on behavior analysis of crackerspsila attacking and packet analysis have been applied for detecting and reporting the changes and events as if there is any failure of networking equipment or any problem occurred in real time. Secondly, software development for automatically checking, analyzing, and identifying the configurations of devices and finding out the kernel cause of security events of network system is a must. Thirdly, the anti-sniffing software and firewall must be updated to enhance its robustness against the attacking. Finally, encrypting software that combines the website system to achieve encryption and authentication simultaneously had better be applied. After then, a satisfied secure communication environment is established.
Keywords :
Internet; authorisation; bandwidth allocation; cryptography; invasive software; message authentication; resource allocation; Web site system; authentication; cracker attack behavior analysis; encryption software development; firewall; information protection; network bandwidth sharing; network security checking criteria; network sniffing; packet analysis; resource sharing; Bandwidth; Computer hacking; Cryptography; Event detection; Failure analysis; Information security; Intelligent networks; Kernel; Programming; Protection; Information security; Internet hacker; bandwidth sharing; wireless networking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology, 2008. ICCST 2008. 42nd Annual IEEE International Carnahan Conference on
Conference_Location :
Prague
Print_ISBN :
978-1-4244-1816-9
Electronic_ISBN :
978-1-4244-1817-6
Type :
conf
DOI :
10.1109/CCST.2008.4751281
Filename :
4751281
Link To Document :
بازگشت