de Sousa Rodrigues, 2019 - Google Patents
An OSINT Approach to Automated Asset Discovery and Monitoringde Sousa Rodrigues, 2019
View PDF- Document ID
- 2207899725011779429
- Author
- de Sousa Rodrigues P
- Publication year
- Publication venue
- PQDT-Global
External Links
Snippet
The main objective of this thesis is to present a proposal to improve the efficiency of Security Operation Centers (SOC) through the articulation of different publicly open sources of security related feeds. This objective is challenging because of the different abstraction …
- 238000000034 method 0 abstract description 114
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Khera et al. | Analysis and impact of vulnerability assessment and penetration testing | |
| Acer et al. | Where the wild warnings are: Root causes of Chrome HTTPS certificate errors | |
| Morishita et al. | Detect me if you… oh wait. An internet-wide view of self-revealing honeypots | |
| Patel | A survey on vulnerability assessment & penetration testing for secure communication | |
| Ravindran et al. | A Review on Web Application Vulnerability Assessment and Penetration Testing. | |
| Serketzis et al. | Actionable threat intelligence for digital forensics readiness | |
| Messier | Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems | |
| Zaidan et al. | Website vulnerability analysis of AB and XY office in East Java | |
| Bryant | Hacking SIEMs to Catch Hackers: Decreasing the Mean Time to Respond to Network Security Events with a Novel Threat Ontology in SIEM Software | |
| Mejri et al. | Cloud security issues and log-based proactive strategy | |
| Krasniqi et al. | Vulnerability Assessment & Penetration Testing: Case study on web application security | |
| Laitinen | Vulnerabilities in the wild: Detecting vulnerable Web applications at scale | |
| de Sousa Rodrigues | An OSINT Approach to Automated Asset Discovery and Monitoring | |
| Al-Ibrahim et al. | The reality of applying security in Web applications in Academia | |
| Nilsson et al. | Vulnerability scanners | |
| Everson | Cyber attack surface mapping for offensive security testing | |
| Almi | Web Server Security and Survey on Web Application Security | |
| Rao et al. | A Three-Pronged Approach to Mitigate Web Attacks | |
| Ackerman | Modern cybersecurity practices: exploring and implementing agile cybersecurity frameworks and strategies for your organization | |
| Jayaprakash et al. | A Novel Framework For Detecting Subdomain State Against Takeover Attacks | |
| Santoso et al. | Performance evaluation of penetration testing tools in diverse computer system security scenarios | |
| Hajdarevic | Cyber Security Audit in Business Environments | |
| Vasilakis | Penetration testing in computer systems | |
| Sayibu et al. | Delivering a Secured Cloud Computing Architecture and Traditional IT Outsourcing Environment via Penetration Tools in Ghana | |
| Sarıkoz | An Information security framework for web services in enterprise networks |