Dec 30, 2021Open AccessArticle
The sustainability of a company depends on the permanent availability of its information system. This reality influences the behavior of companies, which are becoming increasingly mature in their investments in information system security, which is an absolutely vital element. The use of a service called “SYSLOG” to centralize the network event logs that are sent by printers, servers, routers, firewalls, IDS and IPS in an SYSLOG server is a perfect example for network optimization. In this work,...
Aug 19, 2021Open AccessArticle
The private-key structure of CPK has developed from single-layer and multi-layer to multi-block and composite structure. The scheme structure of CPK has formed as fixed, flexible or disposable types. CPK digital signature forms an identity signature protocol not only for data signature, but also for identity signature. CPK is not only suitable for the authentication requirements of open global communication network and business network, but also suitable for the authentication requirements of cl...
Nov 16, 2020Open AccessArticle
System products are widely used in almost all applications. Most of the human capacity has been converted to software solutions. Measuring and evaluating the quality of software products has become a problem for many companies that may be looking for software solutions. There are a number of skills that are required and used to make good software. As time goes on, new software is advancing and this has caused security problems to persist and thus affect the software’s performance. New components...
Mar 25, 2020Open AccessArticle
The computer security has become a major challenge. Tools and mechanisms have been developed to ensure a level of compliance. These include the Intrusion De-tection Systems (IDS). The principle of conventional IDS is to detect attempts to attack a network and to identify abnormal activities and behaviors. The reasons, including the uncertainty in searching for types of attacks and the increasing com-plexity of advanced cyber-attacks, IDS calls for the need for integration of meth-ods such as Dee...
Oct 09, 2019Open AccessArticle
With the development of artificial intelligence, the automatic question answering technology has been paid more and more attention. Along with the technology’s maturing, the problem is gradually exposed. This technique has several major difficulties. There is semantic recognition. How accurate are the answers to the questions? Because Chinese grammar is relatively complex. There are many diffe
Mar 19, 2018Open AccessArticle
In this article, we present a new method based on the securisation of an IPv6 (Internet Protocol version 6) address obtaining with the SLAAC (Stateless Address Autoconfiguration) method in the domestic network. The particularity of our domestic network is the presence of several Multihoming Internet service providers. The peripherals of the Home Network domain, especially routers are in charge of the re
Apr 23, 2015Open AccessArticle
The fast growth of
the Internet proposes and offers several new applications and advanced services
that has greatly and quickly innovated the educational environment. The
platform of e- learning represents an attractive educational field where the
acceptance or utilization progresses and more and more people are taking
courses or training using this technology. Mainly, e-learning platform exploits
Internet infrastructure which became location for illegal events and actions, especially
Oct 22, 2014Open AccessArticle
Security mechanism is a fundamental requirement of
wireless networks in general and Wireless Sensor Networks (WSN) in particular. The
Intrusion Detection System (IDS) has become a critical component of wireless
sensor networks security strategy. There are several architectures for embedding
IDS in WSN. Due to Energy Limitation, in this paper we use a distributed
architecture which activates intrusion detection system for limited number of
nodes. For this purpose we select a secure set of nodes c...