Nagesh et al., 2016 - Google Patents
A survey on denial of service attacks and preclusionsNagesh et al., 2016
- Document ID
- 11268791986656047881
- Author
- Nagesh K
- Sumathy R
- Devakumar P
- Sathiyamurthy K
- Publication year
- Publication venue
- Proceedings of the International Conference on Informatics and Analytics
External Links
Snippet
Security is concerned with protecting assets. The aspects of security can be applied to any situation-defense, detection and deterrence. Network security plays important role of protecting information, hardware and software on a computer network. Denial of service …
- 238000000034 method 0 abstract description 23
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Similar Documents
Publication | Publication Date | Title |
---|---|---|
De Donno et al. | DDoS‐capable IoT malwares: comparative analysis and Mirai investigation | |
Sinha et al. | Information Security threats and attacks with conceivable counteraction | |
Habibi et al. | Heimdall: Mitigating the internet of insecure things | |
US10542006B2 (en) | Network security based on redirection of questionable network access | |
EP2147390B1 (en) | Detection of adversaries through collection and correlation of assessments | |
Mell et al. | A denial-of-service resistant intrusion detection architecture | |
Prabadevi et al. | Distributed Denial of service Attacks and its effects on Cloud Environment-a Survey | |
WO2008127844A1 (en) | Reduction of false positive reputations through collection of overrides from customer deployments | |
Fenil et al. | Survey on DDoS defense mechanisms | |
Nasser et al. | Provably curb man-in-the-middle attack-based ARP spoofing in a local network | |
Hudaib et al. | DNS advanced attacks and analysis | |
CN115051836A (en) | APT attack dynamic defense method and system based on SDN | |
Hindy et al. | A taxonomy of malicious traffic for intrusion detection systems | |
Jeyanthi | Internet of things (IoT) as interconnection of threats (IoT) | |
Nagesh et al. | A survey on denial of service attacks and preclusions | |
Patel et al. | Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem. | |
Patel et al. | A snort-based secure edge router for smart home | |
Durairaj et al. | A study on securing cloud environment from DDoS attack to preserve data availability | |
Thangavel et al. | Denial of service (DoS) attacks over cloud environment: A literature survey | |
CRISTESCU et al. | Volumetric Distributed Denial-of-Service and Session Replay Attacks-Resistant AAA-RADIUS Solution Based on EAP and LDAP | |
Musambo et al. | Identifying Botnets Intrusion & Prevention –A Review | |
Karamagi | Comptia Security+ Practice Exams | |
Hyppönen | Securing a linux server against cyber attacks | |
Verwoerd et al. | Security architecture testing using IDS—a case study | |
De Donno | AntibIoTic: Securing the Internet of Things with Fog Computing |