{"title":"Confronting and intrusion detection techniques of cyber-attacks in wired and wireless communication networks","authors":"K. Mavrommatis","doi":"10.1145/3575879.3576007","DOIUrl":null,"url":null,"abstract":"This publication aims to study the attacks that telecommunications networks face every day. Thus, the tools that have been developed through new technologies are presented in detail in order to successfully deal with these attacks. Some of these tools are more effective and others less effective depending on the form of attack. As a conclusion is that very significant steps have been taken in confronting with attacks by intruders by introducing a new and wide field of study in the networks.","PeriodicalId":164036,"journal":{"name":"Proceedings of the 26th Pan-Hellenic Conference on Informatics","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 26th Pan-Hellenic Conference on Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3575879.3576007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This publication aims to study the attacks that telecommunications networks face every day. Thus, the tools that have been developed through new technologies are presented in detail in order to successfully deal with these attacks. Some of these tools are more effective and others less effective depending on the form of attack. As a conclusion is that very significant steps have been taken in confronting with attacks by intruders by introducing a new and wide field of study in the networks.