{"title":"有线和无线通信网络中网络攻击的对抗与入侵检测技术","authors":"K. Mavrommatis","doi":"10.1145/3575879.3576007","DOIUrl":null,"url":null,"abstract":"This publication aims to study the attacks that telecommunications networks face every day. Thus, the tools that have been developed through new technologies are presented in detail in order to successfully deal with these attacks. Some of these tools are more effective and others less effective depending on the form of attack. As a conclusion is that very significant steps have been taken in confronting with attacks by intruders by introducing a new and wide field of study in the networks.","PeriodicalId":164036,"journal":{"name":"Proceedings of the 26th Pan-Hellenic Conference on Informatics","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Confronting and intrusion detection techniques of cyber-attacks in wired and wireless communication networks\",\"authors\":\"K. Mavrommatis\",\"doi\":\"10.1145/3575879.3576007\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This publication aims to study the attacks that telecommunications networks face every day. Thus, the tools that have been developed through new technologies are presented in detail in order to successfully deal with these attacks. Some of these tools are more effective and others less effective depending on the form of attack. As a conclusion is that very significant steps have been taken in confronting with attacks by intruders by introducing a new and wide field of study in the networks.\",\"PeriodicalId\":164036,\"journal\":{\"name\":\"Proceedings of the 26th Pan-Hellenic Conference on Informatics\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 26th Pan-Hellenic Conference on Informatics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3575879.3576007\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 26th Pan-Hellenic Conference on Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3575879.3576007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Confronting and intrusion detection techniques of cyber-attacks in wired and wireless communication networks
This publication aims to study the attacks that telecommunications networks face every day. Thus, the tools that have been developed through new technologies are presented in detail in order to successfully deal with these attacks. Some of these tools are more effective and others less effective depending on the form of attack. As a conclusion is that very significant steps have been taken in confronting with attacks by intruders by introducing a new and wide field of study in the networks.