Future Trends Network Security

Published on June 2016 | Categories: Types, Research, Internet & Technology | Downloads: 37 | Comments: 0 | Views: 449
of 1
Download PDF   Embed   Report

Short Paper, describes the future trends in network security research field.

Comments

Content

Deris Stiawan [email protected]
Heteregeneous Hardware as a services Cloud Computing Services Software as a services Infrastructure as a services Virtual Manager Sharing Pararel Grid Computing Distributed Heteregeneous Broker Devices NETWORK Heteregeneous Protocol TCP/IP, IPv4, IPv6 Resources

Services / Content Distributed Standart WebeX, Telepresence

Unified Communications

Telecommuters VOIP SIP, H.323, Tunneling

Performance, Availability, Security Reliability Quality of Services (QoS) Smart, Artificial Inteligent Green Tech Decrease consume powers powerfull with existing tech Host & Network based Sensor IDS/IPS Distributed & Heteregeneous Accuracy, Precision Alarm Knowledge Response Network Firewall Behavior-based Content Filtering Smart, Inteligent Sensor Distributed Heteregeneous Network & Mobile Protocol Encapsulation

VPN SECURITY Email

Spam Filtering Phising protect Virus protect PKI Spyware Web CA / PKI / Digital Certificate SSH / SSL Forensics Mobile Digital Forensic Protocol / Encapsulation Application AAA Network / Host Malware Defense Mobile Cloud Cyber Terorism / War

Trends Future & Challenges

War Driving Mobile Scanning Behavior user WIRELESS Data Comm WiMaX P2M, P2P, Mesh, WDS RFID Sensor Sensor, scanning

U.T.M NETMON & POLICY

Heteregeneous

Netflow, MRTG, OP Manager, the Dude Standarization, Method, Framework

Steps Virus

CEH Cisco Worm, Botnet, Trojan, Keylogger, Spammer SQL Injection, RSS attack, Cross Site Scripting,

Web

Buffer overflow, Google Adsense, Spoofing HTML Manipulation, Java/Active X, Web deface

Flooding DNS Physical ATTACK

DoS, DDoS, ICMP flood, UDP strom, Mail Bomb Domain Redirect, DNS Poison, Phising Theft, Sabotage

Social Engineering Insider Abuser DoS Wireless Spoofing Hijacking Malware, Virus Mobile Vulnerability Holes data comm DoS Sabotage, Cloning Tools Network Access, Email

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close