Kishore et al., 2020 - Google Patents
Intrusion detection system a needKishore et al., 2020
- Document ID
- 3368332705200212238
- Author
- Kishore R
- Chauhan A
- Publication year
- Publication venue
- 2020 IEEE International Conference for Innovation in Technology (INOCON)
External Links
Snippet
This review paper is concerned with intrusion detection systems and its several types. As we know that today's era is of computer networks or of internet of things which can lead to intrusion in our systems and can be devastated to it, so intrusion detection system can help …
- 238000001514 detection method 0 title abstract description 50
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kizza | System intrusion detection and prevention | |
| Ashoor et al. | Importance of intrusion detection system (IDS) | |
| US7398389B2 (en) | Kernel-based network security infrastructure | |
| Sherif et al. | Intrusion detection: systems and models | |
| Mukhopadhyay et al. | A comparative study of related technologies of intrusion detection & prevention systems | |
| Onyshchenko et al. | Economic cybersecurity of business in Ukraine: strategic directions and implementation mechanism | |
| Marinova-Boncheva | A short survey of intrusion detection systems | |
| Sandhu et al. | A survey of intrusion detection & prevention techniques | |
| Letou et al. | Host-based intrusion detection and prevention system (HIDPS) | |
| Kazienko et al. | Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture) | |
| Younus et al. | A survey on network security monitoring: tools and functionalities | |
| Grover et al. | A review on block chain and data mining based data security methods | |
| Beigh et al. | Intrusion Detection and Prevention System: Classification and Quick | |
| Beigh et al. | Intrusion detection and prevention system: issues and challenges | |
| Rahim et al. | Improving the security of internet of things (iot) using intrusion detection system (ids) | |
| Leghris et al. | Improved security intrusion detection using intelligent techniques | |
| Kishore et al. | Intrusion detection system a need | |
| Rastogi et al. | Network anomalies detection using statistical technique: a chi-square approach | |
| Navin et al. | A survey on intrusion detection system | |
| Sandhu et al. | A study of the novel approaches used in intrusion detection and prevention systems | |
| Guelzim et al. | Formal methods of attack modeling and detection | |
| Singh et al. | A review on intrusion detection system | |
| Giri et al. | Intrusion detection system for local networks–A review study | |
| Gauhar Fatima et al. | A Study on Intrusion Detection | |
| Khanday et al. | Intrusion Detection Systems for Trending Cyberattacks |