He, 2013 - Google Patents
Network security threats and defenseHe, 2013
View PDF- Document ID
- 13595534683037591456
- Author
- He H
- Publication year
External Links
Snippet
As we are already into the 21st century our society heavily relies on the Internet in several fields such as economics, politics, military. With the increasing impact of internet on our daily lives, various security risks are brought about by system defects, hackers and so on, which …
- 238000001514 detection method 0 abstract description 76
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10230761B1 (en) | Method and system for detecting network compromise | |
| Joshi et al. | Honeypots: a new paradigm to information security | |
| Abad et al. | Log correlation for intrusion detection: A proof of concept | |
| US7984493B2 (en) | DNS based enforcement for confinement and detection of network malicious activities | |
| US8561177B1 (en) | Systems and methods for detecting communication channels of bots | |
| US20150047032A1 (en) | System and method for computer security | |
| Mohammed et al. | Automatic defense against zero-day polymorphic worms in communication networks | |
| Scarfone et al. | Intrusion detection and prevention systems | |
| Dutta et al. | Intrusion detection systems fundamentals | |
| Simkhada et al. | Security threats/attacks via botnets and botnet detection & prevention techniques in computer networks: a review | |
| Nagesh et al. | A survey on denial of service attacks and preclusions | |
| Durairaj et al. | A study on securing cloud environment from DDoS attack to preserve data availability | |
| Karamagi | Comptia Security+ Practice Exams | |
| Singh et al. | A review on intrusion detection system | |
| He | Network security threats and defense | |
| Hieb | Anomaly-based intrusion detection for network monitoring using a dynamic honeypot | |
| Dunigan et al. | Intrusion detection and intrusion prevention on a large network: A case study | |
| Kamal et al. | Analysis of network communication attacks | |
| Verwoerd et al. | Security architecture testing using IDS—a case study | |
| Verwoerd | Active network security | |
| Biswas et al. | Network Forensics Analysis | |
| Patel et al. | IJDI-ERET | |
| Kalokhe et al. | A Network Defense System For Detecting And Preventing Potential Hacking Attempts | |
| Pasha | A Research of Intrusion Detection System in General as Well as Snort in Detail Before Introducing it into Global Cyber Soft Company | |
| Pandya | The enemy (The intruder’s Genesis) |