A network monitor for HTTPS protocol based on proxy

2016 ◽  
Author(s):  
Yangxin Liu ◽  
Lingcui Zhang ◽  
Shuguang Zhou ◽  
Fenghua Li
Keyword(s):  
2006 ◽  
Vol E89-D (12) ◽  
pp. 2875-2885 ◽  
Author(s):  
K. SHIMIZU ◽  
T. OGURA ◽  
T. KAWANO ◽  
H. KIMIYAMA ◽  
M. MARUYAMA ◽  
...  
Keyword(s):  

2013 ◽  
Vol 648 ◽  
pp. 285-288 ◽  
Author(s):  
Jian Hong Ma ◽  
Li Xia Ji

In order to solve the traditional network monitor management system fault detection of slow problem,adaptive differential of high false alarm rate we built network monitor system model combined with the artificial immune principle.Through artificial immune "self" and "non-self" recognition ability network monitoring algorithm simulated the matching,negative selection,memory mechanism of artificial immune system detection of network fault.Throughout the design process,we studied the biological immune characteristics,antibody affinity and concentration of concepts the antibody selection probability algorithm was proposed.The algorithm enhanced new antibody generation mechanisms,memory mechanism the and tolerance of the system to establish the network monitoring system provides the theoretical model.


In ethical hacking, the reconnaissance phase is followed by the scanning and enumeration phase where the information collected from reconnaissance phase is used to examine the target or target network further for getting specific details such as computer names, IP addresses, open ports, user accounts, running services, OS details, system architecture, vulnerabilities, etc. This chapter introduces different scanning and enumeration tools used in the scanning phase of the ethical hacking process in detail. One may use scanning and enumeration tools and techniques involving packet crafting tools, packet analyzers, port scanners, network mappers, sweepers, and vulnerability scanners during this phase. The chapter introduces tools like Hping3, NMAP security scanner, Colasoft packet builder to create custom packets, vulnerability scanners such as Nessus, Netbios enumeration technique, Hyena, remote administration of network devices using advanced IP scanner, global network inventory, network mapping using the dude network monitor, banner grabbing using ID serve, SNMP enumeration technique, creating NetBIOS null session to enumerate, etc. The chapter also provides the details of maintaining privacy and anonymity while carrying out such scanning and enumeration attacks.


Sign in / Sign up

Export Citation Format

Share Document