[go: up one dir, main page]

Gates, 2003 - Google Patents

The modeling and detection of distributed port scans: a thesis proposal

Gates, 2003

View PDF
Document ID
11270148923745555215
Author
Gates C
Publication year
Publication venue
Technical Report CS-2003–01

External Links

Snippet

The hypothesis of this thesis is that distributed port scans can be represented by a formalized model. The key problem to be addressed is how can a distributed port scan be recognized as being one co-operative port scan, as opposed to multiple independent port …
Continue reading at cdn.dal.ca (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/26Monitoring arrangements; Testing arrangements
    • H04L12/2602Monitoring arrangements

Similar Documents

Publication Publication Date Title
Alshamrani et al. A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities
Ho et al. Detecting credential spearphishing in enterprise settings
Bijone A survey on secure network: intrusion detection & prevention approaches
Ghorbani et al. Network intrusion detection and prevention: concepts and techniques
Moustafa Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic
Kumar et al. Intrusion detection systems: a review
Fung et al. Intrusion detection networks: a key to collaborative security
Thomas Improving intrusion detection for imbalanced network traffic
Shah et al. Detect phishing website by fuzzy multi-criteria decision making
Garcıa Identifying, modeling and detecting botnet behaviors in the network
Kebande et al. CVSS metric-based analysis, classification and assessment of computer network threats and vulnerabilities
Tsai et al. Intrusion detection: a machine learning approach
Möller Intrusion detection and prevention
Sammany et al. Artificial neural networks architecture for intrusion detection systems and classification of attacks
Siraj et al. A cognitive model for alert correlation in a distributed environment
Abou Haidar et al. High perception intrusion detection system using neural networks
Gates The modeling and detection of distributed port scans: a thesis proposal
ALESE et al. A machine learning approach for information system security
Krishnapriya et al. A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques.
Vargheese et al. Machine Learning for Enhanced Cyber Security
Johansson Countermeasures Against Coordinated Cyber-Attacks Towards Power Grid Systems: A systematic literature study
Zoghi Ensemble Classifier Design and Performance Evaluation for Intrusion Detection Using UNSW-NB15 Dataset
Chablani et al. Analysis of Cyber Defense mechanisms using honeypots in Cloud Environment
Petersen Detecting network intrusions
Ali et al. Behavior Analysis of Machine Learning Algorithms for Botnets Detection