تجاوز إلى المحتوى الرئيسي
User Image

Muhammad Nasir

Lecturer

Lecturer

علوم الحاسب والمعلومات
mnasir@KSU.EDU.SA
المنشورات
مقال فى مجلة
2012
تم النشر فى:

POSSIBLE INTRUSIONS AND THEIR DETECTION BASED ON THE PROPOSED MODEL FOR C4I SYSTEMS

Alelaiwi, Abdulhameed . 2012

The protection of Command, Control, Communications, Computers, and Intelligence (C4I) systems during times of both war and peace is a major issue. There are many traditional mechanisms to provide such protection, but they have many limitations related to inaccuracy and false alarms. In this paper, we discuss possible types of attacks in the context of C4I systems, including Denial-of-Service (DoS), Distributed Denial-of-Service (DDoS), Probe, User-to-Root (U2R), and Root-to-Local (R2L) attacks, and propose a fundamental model to prevent such attacks.

رقم المجلد
3
رقم الانشاء
24
الصفحات
219-223
مزيد من المنشورات
publications

This paper describes assessment techniques utilized for assessing undergraduate students studying in a software engineering program. The purpose behind this work is to get the program accredited…

بواسطة Abdullah S Alghamdi, Muhammad Nasir, Khalid Alnafjan
2011
publications

The protection of Command, Control, Communications, Computers, and Intelligence (C4I) systems during times of both war and peace is a major issue. There are many traditional mechanisms to provide…

بواسطة Abdulhameed Alelaiwi, Muhammad Nasir
2012
publications

An ESB is a platform that provides services such as message routing and transformation. Along with this, it has the capabilities to ease the pains of connecting heterogeneous C4I systems among…

2010