Gates, 2003 - Google Patents
The modeling and detection of distributed port scans: a thesis proposalGates, 2003
View PDF- Document ID
- 11270148923745555215
- Author
- Gates C
- Publication year
- Publication venue
- Technical Report CS-2003–01
External Links
Snippet
The hypothesis of this thesis is that distributed port scans can be represented by a formalized model. The key problem to be addressed is how can a distributed port scan be recognized as being one co-operative port scan, as opposed to multiple independent port …
- 238000001514 detection method 0 title description 134
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alshamrani et al. | A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities | |
Ho et al. | Detecting credential spearphishing in enterprise settings | |
Bijone | A survey on secure network: intrusion detection & prevention approaches | |
Ghorbani et al. | Network intrusion detection and prevention: concepts and techniques | |
Moustafa | Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic | |
Kumar et al. | Intrusion detection systems: a review | |
Fung et al. | Intrusion detection networks: a key to collaborative security | |
Thomas | Improving intrusion detection for imbalanced network traffic | |
Shah et al. | Detect phishing website by fuzzy multi-criteria decision making | |
Garcıa | Identifying, modeling and detecting botnet behaviors in the network | |
Kebande et al. | CVSS metric-based analysis, classification and assessment of computer network threats and vulnerabilities | |
Tsai et al. | Intrusion detection: a machine learning approach | |
Möller | Intrusion detection and prevention | |
Sammany et al. | Artificial neural networks architecture for intrusion detection systems and classification of attacks | |
Siraj et al. | A cognitive model for alert correlation in a distributed environment | |
Abou Haidar et al. | High perception intrusion detection system using neural networks | |
Gates | The modeling and detection of distributed port scans: a thesis proposal | |
ALESE et al. | A machine learning approach for information system security | |
Krishnapriya et al. | A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques. | |
Vargheese et al. | Machine Learning for Enhanced Cyber Security | |
Johansson | Countermeasures Against Coordinated Cyber-Attacks Towards Power Grid Systems: A systematic literature study | |
Zoghi | Ensemble Classifier Design and Performance Evaluation for Intrusion Detection Using UNSW-NB15 Dataset | |
Chablani et al. | Analysis of Cyber Defense mechanisms using honeypots in Cloud Environment | |
Petersen | Detecting network intrusions | |
Ali et al. | Behavior Analysis of Machine Learning Algorithms for Botnets Detection |