POSSIBLE INTRUSIONS AND THEIR DETECTION BASED ON THE PROPOSED MODEL FOR C4I SYSTEMS
Alelaiwi, Abdulhameed . 2012
The protection of Command, Control, Communications, Computers, and Intelligence (C4I) systems during times of both war and peace is a major issue. There are many traditional mechanisms to provide such protection, but they have many limitations related to inaccuracy and false alarms. In this paper, we discuss possible types of attacks in the context of C4I systems, including Denial-of-Service (DoS), Distributed Denial-of-Service (DDoS), Probe, User-to-Root (U2R), and Root-to-Local (R2L) attacks, and propose a fundamental model to prevent such attacks.
This paper describes assessment techniques utilized for assessing undergraduate students studying in a software engineering program. The purpose behind this work is to get the program accredited…
The protection of Command, Control, Communications, Computers, and Intelligence (C4I) systems during times of both war and peace is a major issue. There are many traditional mechanisms to provide…
An ESB is a platform that provides services such as message routing and transformation. Along with this, it has the capabilities to ease the pains of connecting heterogeneous C4I systems among…