Volume 14 Number 4 December 2023


Analysis of Computer Security Forensics Based on Bayesian Network Intrusion Detection

Xiao Lijun

https://doi.org/10.6025/jisr/2023/14/4/87-95

Abstract With the rapid development of the Internet, network attacks and intrusion behaviors are becoming increasingly serious, and computer security issues have attracted much attention. In order to effectively respond to network attacks, researchers in the field of computer security have proposed various intrusion detection technologies. This article studies the application of intrusion detection technology based on Bayesian networks in computer... Read More


SlapOS and NGINX Architecture for DDOS attacks

Vlad Andrei Poenaru, George Suciu, Cristian George Cernat, Gyorgy Todoran and Traian Lucian Militaru

https://doi.org/10.6025/jisr/2023/14/4/ 96-100

Abstract The cloud is a new technology for the delivery of web applications. However, there is little literature on the impact of distributed denial-of-service (DDOS) attacks on clouds and the performance of other types of attacks against a welldesigned cloud architecture. So, is cloud resilience enough to be a solution? Or will traditional web architectures with caching and reverse proxy always... Read More


Financial Risk Control Based on optimized Z-Score Financial Warning Model

Mingwei Zhu

https://doi.org/10.6025/jisr/2023/14/4/101-110

Abstract Financial risk control is an important link in enterprise risk management. Traditional financial risk control methods often rely on experience and intuition, lacking scientific validity and accuracy. In recent years, with the improvement of financial data availability, more researchers have begun using data mining and machine learning technologies for financial risk control. This article studies how to control financial risks... Read More