2023 13th International Conference on Cloud Computing, Data Science &Amp; Engineering (Confluence) 2023
DOI: 10.1109/confluence56041.2023.10048858
|View full text |Cite
|
Sign up to set email alerts
|

Internet threats and ways to protect against them: A brief review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…As information is added, new blocks are created. To include them www.ijacsa.thesai.org in the chain, it is necessary to confirm all participants of the entire network [21]. 3) Blocks are sent out for verification to all participants of the system 4) Each participant writes a block to their database instance.…”
Section: Osim (Open Systems Interaction Model)mentioning
confidence: 99%
“…As information is added, new blocks are created. To include them www.ijacsa.thesai.org in the chain, it is necessary to confirm all participants of the entire network [21]. 3) Blocks are sent out for verification to all participants of the system 4) Each participant writes a block to their database instance.…”
Section: Osim (Open Systems Interaction Model)mentioning
confidence: 99%
“…Most rules are blind to the traffic characteristics of these packets; hence, there is room for improvement in the effectiveness of filtering and threat identification. As a result, there has been a shift towards providing methods and utilities that can handle ambiguity in packet filtering scenarios, ultimately aiming to build an intelligent firewall whose actions can adjust to the dynamic nature of networks and available computing resources [10,18]. Fuzzy logic has become a crucial way of handling ambiguity and working with poorly specified or undefined systems.…”
Section: Introductionmentioning
confidence: 99%