{"title":"Computer network vulnerabilities and monitoring","authors":"A. Badea, V. Croitoru, Daniel Gheorghica","doi":"10.1109/ATEE.2015.7133678","DOIUrl":null,"url":null,"abstract":"This paper presents an overview of the current computer network vulnerabilities and exploits, possibilities of monitoring the network traffic, by intercepting and duplicating it, ways of analyzing the monitored traffic in order to better understand and explain the detection of user's behavior.","PeriodicalId":103513,"journal":{"name":"2015 9th International Symposium on Advanced Topics in Electrical Engineering (ATEE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 9th International Symposium on Advanced Topics in Electrical Engineering (ATEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ATEE.2015.7133678","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
This paper presents an overview of the current computer network vulnerabilities and exploits, possibilities of monitoring the network traffic, by intercepting and duplicating it, ways of analyzing the monitored traffic in order to better understand and explain the detection of user's behavior.