+

de Sousa Rodrigues, 2019 - Google Patents

An OSINT Approach to Automated Asset Discovery and Monitoring

de Sousa Rodrigues, 2019

View PDF
Document ID
2207899725011779429
Author
de Sousa Rodrigues P
Publication year
Publication venue
PQDT-Global

External Links

Snippet

The main objective of this thesis is to present a proposal to improve the efficiency of Security Operation Centers (SOC) through the articulation of different publicly open sources of security related feeds. This objective is challenging because of the different abstraction …
Continue reading at repositorio-aberto.up.pt (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls

Similar Documents

Publication Publication Date Title
Khera et al. Analysis and impact of vulnerability assessment and penetration testing
Acer et al. Where the wild warnings are: Root causes of Chrome HTTPS certificate errors
Morishita et al. Detect me if you… oh wait. An internet-wide view of self-revealing honeypots
Patel A survey on vulnerability assessment & penetration testing for secure communication
Ravindran et al. A Review on Web Application Vulnerability Assessment and Penetration Testing.
Serketzis et al. Actionable threat intelligence for digital forensics readiness
Messier Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Zaidan et al. Website vulnerability analysis of AB and XY office in East Java
Bryant Hacking SIEMs to Catch Hackers: Decreasing the Mean Time to Respond to Network Security Events with a Novel Threat Ontology in SIEM Software
Mejri et al. Cloud security issues and log-based proactive strategy
Krasniqi et al. Vulnerability Assessment & Penetration Testing: Case study on web application security
Laitinen Vulnerabilities in the wild: Detecting vulnerable Web applications at scale
de Sousa Rodrigues An OSINT Approach to Automated Asset Discovery and Monitoring
Al-Ibrahim et al. The reality of applying security in Web applications in Academia
Nilsson et al. Vulnerability scanners
Everson Cyber attack surface mapping for offensive security testing
Almi Web Server Security and Survey on Web Application Security
Rao et al. A Three-Pronged Approach to Mitigate Web Attacks
Ackerman Modern cybersecurity practices: exploring and implementing agile cybersecurity frameworks and strategies for your organization
Jayaprakash et al. A Novel Framework For Detecting Subdomain State Against Takeover Attacks
Santoso et al. Performance evaluation of penetration testing tools in diverse computer system security scenarios
Hajdarevic Cyber Security Audit in Business Environments
Vasilakis Penetration testing in computer systems
Sayibu et al. Delivering a Secured Cloud Computing Architecture and Traditional IT Outsourcing Environment via Penetration Tools in Ghana
Sarıkoz An Information security framework for web services in enterprise networks
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载