+

He, 2013 - Google Patents

Network security threats and defense

He, 2013

View PDF
Document ID
13595534683037591456
Author
He H
Publication year

External Links

Snippet

As we are already into the 21st century our society heavily relies on the Internet in several fields such as economics, politics, military. With the increasing impact of internet on our daily lives, various security risks are brought about by system defects, hackers and so on, which …
Continue reading at www.theseus.fi (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Similar Documents

Publication Publication Date Title
US10230761B1 (en) Method and system for detecting network compromise
Joshi et al. Honeypots: a new paradigm to information security
Abad et al. Log correlation for intrusion detection: A proof of concept
US7984493B2 (en) DNS based enforcement for confinement and detection of network malicious activities
US8561177B1 (en) Systems and methods for detecting communication channels of bots
US20150047032A1 (en) System and method for computer security
Mohammed et al. Automatic defense against zero-day polymorphic worms in communication networks
Scarfone et al. Intrusion detection and prevention systems
Dutta et al. Intrusion detection systems fundamentals
Simkhada et al. Security threats/attacks via botnets and botnet detection & prevention techniques in computer networks: a review
Nagesh et al. A survey on denial of service attacks and preclusions
Durairaj et al. A study on securing cloud environment from DDoS attack to preserve data availability
Karamagi Comptia Security+ Practice Exams
Singh et al. A review on intrusion detection system
He Network security threats and defense
Hieb Anomaly-based intrusion detection for network monitoring using a dynamic honeypot
Dunigan et al. Intrusion detection and intrusion prevention on a large network: A case study
Kamal et al. Analysis of network communication attacks
Verwoerd et al. Security architecture testing using IDS—a case study
Verwoerd Active network security
Biswas et al. Network Forensics Analysis
Patel et al. IJDI-ERET
Kalokhe et al. A Network Defense System For Detecting And Preventing Potential Hacking Attempts
Pasha A Research of Intrusion Detection System in General as Well as Snort in Detail Before Introducing it into Global Cyber Soft Company
Pandya The enemy (The intruder’s Genesis)
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载