2023
DOI: 10.55041/isjem00355
|View full text |Cite
|
Sign up to set email alerts
|

Networking and Data Communication

Abstract: The method may efficiently find rogue nodes by inspecting network traffic in real time. Our system is capable of creating a dynamic blacklist of Network nodes that may be used to block nodes whose trust levels are below a certain minimum. The detection of malicious nodes and the computation of node trust levels are handled by a central server. To increase the network and infrastructure's security, the method may be used in conjunction with other security tools including database activity monitoring, white list… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 2 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?