MODERN APPROACH TO PROTECTION OF COMPUTER SYSTEMS AND NETWORKS

Authors

  • Valerij Dudykevych
  • Andrian Piskozub
  • Igor Lomnytskyj

DOI:

https://doi.org/10.47839/ijc.2.3.240

Keywords:

Firewalls, intrusion detection systems, scanners, vulnerability assessment tools, penetration testing

Abstract

This article is dedicated to the use of firewalling method and intrusion detection method, which can be applied both separately and together to computer systems and networks, to expedience of the use of that or other method, tools, that perform these methods. We will try to carry out the analysis of the modern state of security questions in computer networks, to give recommendations how to attain the greatest level of protection of computer systems and networks by most effective way - within the shortest time interval, with minimum financial expenditures.

References

Aurobindo Sundaram. An introduction to Intrusion Detection. 1996.

http://www.cisco.com/

http://www.fwtk.org

http://www.netfilter.org

http://www.squid.org

http://www.microsoft.com

http://www.networkice.com

http:// www.borderware.com

http://www.axent.com/

http://www.nai.com/

http://www.checkpoint.com

http://www.netguard.com

Lukatskyj A.V. Attack Detection. –SPb.: BHV-Petersburg, 2001.

http://www.anzen.com

http://www.axent.com/

http://www.alliancedatacom.com/manufacturers/cisco-systems/security_vpn/ids.asp

http://www.intrusion.com/

http://www.abirnet.com

http://www.iss.net/

http://www.cybersafe.com

http://www.ods.com

http://www.nai.com/

http://www2.axent.com/

http://www.intrusion.com/

http://www.snort.org/

http://www.cs.uidaho.edu/~hummer

http://www.cs.purdue.edu/coast/projects/autonomous-agents.html

http://www.nfr.net

http://www.psionic.com/abacus/hostsentry/

http://www.tripwiresecurity.com

http://www.cs.tut.fi/~rammer/aide.html

http://www.stanford.edu/~atkins/swatch/

http://www.cert.dfn.de/eng/logsurf/

http://www.all.net/dtk/dtk.html

http://www.net.tamu.edu/network/tools/tiger.html

http://lists.insecure.org

http://www.insecure.org/tools.html

http://www.insecure.org/

http://www.nessus.org/

http://www-arc.com/sara/

http://www.gfi.com/lannetscan/

http://www.eeye.com/html/Products/Retina/

http://www.saintcorporation.com/saint/

http://www.safety-lab.com/en2/products/1.htm

http://www.wiretrip.net/rfp/

http://www.cirt.net/code/nikto.shtml

http://www.nstalker.com/nstealth/

http://www.coresecurity.com

Downloads

Published

2014-08-01

How to Cite

Dudykevych, V., Piskozub, A., & Lomnytskyj, I. (2014). MODERN APPROACH TO PROTECTION OF COMPUTER SYSTEMS AND NETWORKS. International Journal of Computing, 2(3), 113-118. https://doi.org/10.47839/ijc.2.3.240

Issue

Section

Articles