+

Kishore et al., 2020 - Google Patents

Intrusion detection system a need

Kishore et al., 2020

Document ID
3368332705200212238
Author
Kishore R
Chauhan A
Publication year
Publication venue
2020 IEEE International Conference for Innovation in Technology (INOCON)

External Links

Snippet

This review paper is concerned with intrusion detection systems and its several types. As we know that today's era is of computer networks or of internet of things which can lead to intrusion in our systems and can be devastated to it, so intrusion detection system can help …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security

Similar Documents

Publication Publication Date Title
Kizza System intrusion detection and prevention
Ashoor et al. Importance of intrusion detection system (IDS)
US7398389B2 (en) Kernel-based network security infrastructure
Sherif et al. Intrusion detection: systems and models
Mukhopadhyay et al. A comparative study of related technologies of intrusion detection & prevention systems
Onyshchenko et al. Economic cybersecurity of business in Ukraine: strategic directions and implementation mechanism
Marinova-Boncheva A short survey of intrusion detection systems
Sandhu et al. A survey of intrusion detection & prevention techniques
Letou et al. Host-based intrusion detection and prevention system (HIDPS)
Kazienko et al. Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture)
Younus et al. A survey on network security monitoring: tools and functionalities
Grover et al. A review on block chain and data mining based data security methods
Beigh et al. Intrusion Detection and Prevention System: Classification and Quick
Beigh et al. Intrusion detection and prevention system: issues and challenges
Rahim et al. Improving the security of internet of things (iot) using intrusion detection system (ids)
Leghris et al. Improved security intrusion detection using intelligent techniques
Kishore et al. Intrusion detection system a need
Rastogi et al. Network anomalies detection using statistical technique: a chi-square approach
Navin et al. A survey on intrusion detection system
Sandhu et al. A study of the novel approaches used in intrusion detection and prevention systems
Guelzim et al. Formal methods of attack modeling and detection
Singh et al. A review on intrusion detection system
Giri et al. Intrusion detection system for local networks–A review study
Gauhar Fatima et al. A Study on Intrusion Detection
Khanday et al. Intrusion Detection Systems for Trending Cyberattacks
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载