Optimizing windows 10 logging to detect network security threats

Author(s):  
Julius Barath
Author(s):  
MADHAVI DHINGRA ◽  
DEEPIKA SRIVASTAVA ◽  
VIPUL SHARMA

With continual advances in technology, wireless accessibility is being deployed increasingly in office and public environments, as it is having huge benefits. But it is also coupled with the security threats and risks that will adversely affect the performance of the organization. To get rid of these threats, firstly these threats need to be understood and then their solutions need to be finding out. This paper discusses major security threats and describes their solutions for securing wireless network.


2021 ◽  
Vol 2083 (4) ◽  
pp. 042084
Author(s):  
Xi Wang ◽  
Lei Shi

Abstract Nowadays, computer networks are widely used. Besides the convenience, people also feel the pressure of network viruses and hackers. At present, in the process of fighting against network security threats, traditional defense measures have been difficult to meet. Therefore, in order to meet the needs of computer network security under cloud computing technology, and for the future of cloud computing high-quality network storage system can be gradually optimized. In this paper, from the cloud computing and network security storage system two aspects of the computer network security storage performance analysis and design; Then from the design framework, through careful design, to ensure the reliability and security of data upload, storage.


Repositor ◽  
2020 ◽  
Vol 2 (4) ◽  
pp. 475
Author(s):  
Ilfan Arif Romadhan ◽  
Syaifudin Syaifudin ◽  
Denar Regata Akbi

ABSTRAKPerlindungan terhadap keamanan jaringan merupakan hal yang sangat penting untuk dilakukan. Mengingat kemudahan dalam mengakses jaringan memungkinkan adanya gangguan dari pihak yang ingin menyerang, merusak, bahkan mengambil data penting. Honeypot memang tidak menyelesaikan masalah pada keamanan jaringan, namun honeypot membuat penelitian tentang serangan menjadi lebih sederhana dengan konsep yang mudah untuk dimengerti dan dimplementasikan. Penelitian ini menerapkan beberapa honeypot menggunakan Raspberry pi dan ELK stack untuk monitoring hasil yang didapatkan oleh honeypot. Tujuan dari penelitian ini untuk merancang sistem yang mampu mendeteksi serangan pada jaringan menggunakan honeypot. Raspberry pi digunakan sebagai sensor honeypot untuk pemantauan ancaman keamanan terbukti hemat biaya dan efektif menggantikan komputer desktop. ELK stack memudahkan pemusatan data dari berbagai sumber dan membuat analisis log yang awalnya rumit untuk dianalisis menjadi lebih menarik.ABSTRACTProtection of network security is very important to do. Given the ease in accessing the network allows for interference from parties who want to attack, destroy, and even retrieve important data. Honeypot does not solve the problem on network security, but the honeypot makes research about attacks become simpler with concepts that are easy to understand and implement. This research applies some honeypot using Raspberry pi and ELK stack for monitoring result obtained by honeypot. The purpose of this research is to design a system capable of detecting attacks on a network using a honeypot. Raspberry pi is used as a honeypot sensor for monitoring proven cost-effective and cost-effective security threats to replace desktop computers. The ELK stack facilitates the convergence of data from multiple sources and makes log analysis initially complex for analysis to be more interesting.


Author(s):  
Yongli Liu ◽  
Weifang Zhai ◽  
Song Ji

With the “Internet +” era of arrival, the major colleges and universities are in the construction of the wisdom of the campus, students and teachers living with the campus network is more and more closely related, Campus network security has become the protection of the wisdom of the campus construction. Campus network security issues become increasingly serious; a single security protection has been unable to meet the current security needs. This paper analyzes the major security threats facing the campus network, and presents the campus network security protection measures from the physical layer, network layer, system layer, application layer and management of five aspects, thus constructing the campus network's overall security defense system. The system has multiple security protection for Campus Network, thus improving the security of the campus network.


Author(s):  
Leonardo Richter Bays ◽  
Rodrigo Ruas Oliveira ◽  
Marinho Pilla Barcellos ◽  
Luciano Paschoal Gaspary ◽  
Edmundo Roberto Mauro Madeira

Living in this modern era – the epitome of communication GSM networks is one of the mainly used architectures. But GSM architecture has its own shortcomings; the GSM network is vulnerable to various security threats. For any network to provide security to the user, the algorithms should be planned and designed in such a way that it provides cellular secrecy, data and signaling confidentiality to the concerned user. Keeping in mind the above features, the A5/1 algorithm provides network security. Initially, the A5/1 algorithm dealt with a pre-defined secret key but they still possess the threat of being decrypted by cryptanalytic attacks. Although decrypting this algorithm is not easy and requires high computational power. Such attacks lead to the necessity to modify the A5/1 algorithm; in our paper, we have proposed a better method to enhance the already existing algorithm.


Sign in / Sign up

Export Citation Format

Share Document