Research of software for network protection.
Keywords:
network, scanner, software, vulnerability, network administration.
Abstract
The main scanners for detecting network vulnerabilities and detecting their impact have been studied. Exposures have been assessed to protect networks to prevent intrusion, to check logs and track traffic patterns, and to protect ports and use resources.References
Azarov O. Computer networks: a textbook (2013), 371p. AСM.
Burov E. Computer networks: a textbook (2010), 262 p. AСM.
Losev YI Computer networks: a textbook (2013), 248 p. AСM.
Mykytyshyn AG Computer networks: [textbook] (2013), 256 p. AСM.
Website http://netconfig.ru/ [Electronic resource]. Mode of access to the site material: http://netconfig.ru/ server / ids-ips /.
Website www.ic3.gov [Electronic resource]. Mode of access to the site material: http: // www.ic3.gov/ media / IC3-Poster.pdf.
Website http://ru.wikipedia.org/ [Electronic resource. Mode of access to the site material: http: // ru. wikipedia.org/wiki/ Intrusion Detection System.
Burov E. Computer networks: a textbook (2010), 262 p. AСM.
Losev YI Computer networks: a textbook (2013), 248 p. AСM.
Mykytyshyn AG Computer networks: [textbook] (2013), 256 p. AСM.
Website http://netconfig.ru/ [Electronic resource]. Mode of access to the site material: http://netconfig.ru/ server / ids-ips /.
Website www.ic3.gov [Electronic resource]. Mode of access to the site material: http: // www.ic3.gov/ media / IC3-Poster.pdf.
Website http://ru.wikipedia.org/ [Electronic resource. Mode of access to the site material: http: // ru. wikipedia.org/wiki/ Intrusion Detection System.
Abstract views: 0 PDF Downloads: 0
Published
2020-12-27
How to Cite
Yatsyuk , S., Sachuk, Y., Glinchuk, L., Prus, R., & GrishanovichТ. (2020). Research of software for network protection. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (41), 205-211. https://doi.org/10.36910/6775-2524-0560-2020-41-32
Section
Computer science and computer engineering