{"title":"计算机网络漏洞与监控","authors":"A. Badea, V. Croitoru, Daniel Gheorghica","doi":"10.1109/ATEE.2015.7133678","DOIUrl":null,"url":null,"abstract":"This paper presents an overview of the current computer network vulnerabilities and exploits, possibilities of monitoring the network traffic, by intercepting and duplicating it, ways of analyzing the monitored traffic in order to better understand and explain the detection of user's behavior.","PeriodicalId":103513,"journal":{"name":"2015 9th International Symposium on Advanced Topics in Electrical Engineering (ATEE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Computer network vulnerabilities and monitoring\",\"authors\":\"A. Badea, V. Croitoru, Daniel Gheorghica\",\"doi\":\"10.1109/ATEE.2015.7133678\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents an overview of the current computer network vulnerabilities and exploits, possibilities of monitoring the network traffic, by intercepting and duplicating it, ways of analyzing the monitored traffic in order to better understand and explain the detection of user's behavior.\",\"PeriodicalId\":103513,\"journal\":{\"name\":\"2015 9th International Symposium on Advanced Topics in Electrical Engineering (ATEE)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-05-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 9th International Symposium on Advanced Topics in Electrical Engineering (ATEE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ATEE.2015.7133678\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 9th International Symposium on Advanced Topics in Electrical Engineering (ATEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ATEE.2015.7133678","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper presents an overview of the current computer network vulnerabilities and exploits, possibilities of monitoring the network traffic, by intercepting and duplicating it, ways of analyzing the monitored traffic in order to better understand and explain the detection of user's behavior.