LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Zarch, Seyed Hasan Mortazavi; Soltani, Hossein; Yazdani, MadiheSadat (2014)
Publisher: Journal of Engineering Computers & Applied Sciences
Journal: Journal of Engineering Computers & Applied Sciences
Languages: English
Types: Article
Subjects: Computer Sciences, IDS, Harassment simulation, DoS attacks, Packet filtering, OPNET, TCPDUMP
In this paper explains simulation and detection attacks on computer networks by OPNET simulator. Intrusion detection at the network and network security are important and considerable issues on IT industry. Hackers use a variety of methods in order to interrupt the normal function of the operating system. Today In the field of defence, firewalls and Intrusion Detection Systems are effective only against known harassment and the respective interruptions are found from their digital signature and perhaps at any moment facing new attacks that are designed. Our work is on the base of simulating a traffic nuisance, depending on the actual packages that are collected from network and including intrusive packages. Using the actual and natural packages in simulation with OPNET enables the Research on strategies and intrusion detection mechanisms and the inauthentic data. In this paper we report our experience in network simulation and its performance by using a firewall in order to evaluate the DoS attacks.
  • No references.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article