[go: up one dir, main page]

van der Sanden et al., 2008 - Google Patents

Detecting UDP attacks in high speed networks using packet symmetry with only flow data

van der Sanden et al., 2008

View PDF
Document ID
12842299911499682849
Author
van der Sanden D
from Januari E
Sadre R
Sperotto A
Publication year
Publication venue
University of Twente

External Links

Snippet

Attacks on the Internet are becoming a bigger problem since more users, companies and even complete societies rely on the correct functioning of the Internet. Some examples of these attacks are Denial of Service attacks or Port Scans. Most network operators deploy …
Continue reading at www.utwente.nl (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/02Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
    • H04L43/026Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data using flow generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Similar Documents

Publication Publication Date Title
US11159486B2 (en) Stream scanner for identifying signature matches
US20220217121A1 (en) Cloud-based Intrusion Prevention System, Multi-Tenant Firewall, and Stream Scanner
JP7250703B2 (en) Assessment and remediation of correlation-driven threats
Yegneswaran et al. On the design and use of internet sinks for network abuse monitoring
Gao et al. A dos resilient flow-level intrusion detection approach for high-speed networks
Alqahtani et al. TCP/IP attacks, defenses and security tools
van Oorschot et al. Intrusion detection and network-based attacks
Aziz et al. A distributed infrastructure to analyse SIP attacks in the Internet
Stanciu Technologies, methodologies and challenges in network intrusion detection and prevention systems.
Ghorbani et al. Network attacks
Abt et al. Towards Efficient and Privacy-Preserving Network-Based Botnet Detection Using Netflow Data.
Pilli et al. Data reduction by identification and correlation of TCP/IP attack attributes for network forensics
van der Sanden et al. Detecting UDP attacks in high speed networks using packet symmetry with only flow data
Kock A signature-based Approach to DDoS Attack Mitigation Using BGP Flowspec Rules
Bhuyan et al. Practical tools for attackers and defenders
Whyte Network scanning detection strategies for enterprise networks
Heikura Analyzing Offensive and Defensive Networking Tools in a Laboratory Environme
Reddy et al. Network Forensics
Thangavel et al. Sniffers Over Cloud Environment: A Literature Survey
Alsmadi et al. Network Forensics: Lesson Plans
Erlacher Efficient intrusion detection in high-speed networks.
Hunter A framework for Malicious Host Fingerprinting Using Distributed Network Sensors
Opasinov et al. Improving the Cyber defence of an organisation based on IP Geolocation and security appliances
van der Sanden et al. Detecting UDP attacks using packet symmetry with only flow data
Casey et al. Network investigations