[go: up one dir, main page]

Nagesh et al., 2016 - Google Patents

A survey on denial of service attacks and preclusions

Nagesh et al., 2016

Document ID
11268791986656047881
Author
Nagesh K
Sumathy R
Devakumar P
Sathiyamurthy K
Publication year
Publication venue
Proceedings of the International Conference on Informatics and Analytics

External Links

Snippet

Security is concerned with protecting assets. The aspects of security can be applied to any situation-defense, detection and deterrence. Network security plays important role of protecting information, hardware and software on a computer network. Denial of service …
Continue reading at dl.acm.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Similar Documents

Publication Publication Date Title
De Donno et al. DDoS‐capable IoT malwares: comparative analysis and Mirai investigation
Sinha et al. Information Security threats and attacks with conceivable counteraction
Habibi et al. Heimdall: Mitigating the internet of insecure things
US10542006B2 (en) Network security based on redirection of questionable network access
EP2147390B1 (en) Detection of adversaries through collection and correlation of assessments
Mell et al. A denial-of-service resistant intrusion detection architecture
Prabadevi et al. Distributed Denial of service Attacks and its effects on Cloud Environment-a Survey
WO2008127844A1 (en) Reduction of false positive reputations through collection of overrides from customer deployments
Fenil et al. Survey on DDoS defense mechanisms
Nasser et al. Provably curb man-in-the-middle attack-based ARP spoofing in a local network
Hudaib et al. DNS advanced attacks and analysis
CN115051836A (en) APT attack dynamic defense method and system based on SDN
Hindy et al. A taxonomy of malicious traffic for intrusion detection systems
Jeyanthi Internet of things (IoT) as interconnection of threats (IoT)
Nagesh et al. A survey on denial of service attacks and preclusions
Patel et al. Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem.
Patel et al. A snort-based secure edge router for smart home
Durairaj et al. A study on securing cloud environment from DDoS attack to preserve data availability
Thangavel et al. Denial of service (DoS) attacks over cloud environment: A literature survey
CRISTESCU et al. Volumetric Distributed Denial-of-Service and Session Replay Attacks-Resistant AAA-RADIUS Solution Based on EAP and LDAP
Musambo et al. Identifying Botnets Intrusion & Prevention –A Review
Karamagi Comptia Security+ Practice Exams
Hyppönen Securing a linux server against cyber attacks
Verwoerd et al. Security architecture testing using IDS—a case study
De Donno AntibIoTic: Securing the Internet of Things with Fog Computing