DEL TITOLO et al. - Google Patents
Distributed architectures and algorithms for network securityDEL TITOLO et al.
View PDF- Document ID
- 1284245046927404745
- Author
- DEL TITOLO T
- DI DOTTORE D
External Links
Snippet
As our society becomes more dependent on networked information systems, it is also becoming increasingly vulnerable to their misuse. The large amount of sensitive information transmitted over computer networks and stored on databases, as well as the high revenues …
- 238000001514 detection method 0 abstract description 124
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12003485B2 (en) | Outbound/inbound lateral traffic punting based on process risk | |
Shaghaghi et al. | Software-defined network (SDN) data plane security: issues, solutions, and future directions | |
Sahay et al. | The application of software defined networking on securing computer networks: A survey | |
Dayal et al. | Research trends in security and DDoS in SDN | |
Yan et al. | Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges | |
Nawrocki et al. | A survey on honeypot software and data analysis | |
Akhunzada et al. | Secure and dependable software defined networks | |
Izhikevich et al. | {LZR}: Identifying unexpected internet services | |
Ahmad et al. | Security in software defined networks: A survey | |
Giotis et al. | Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments | |
US10855656B2 (en) | Fine-grained firewall policy enforcement using session app ID and endpoint process ID correlation | |
Krishnan et al. | SDN/NFV security framework for fog‐to‐things computing infrastructure | |
Krishnan et al. | SDNFV based threat monitoring and security framework for multi-access edge computing infrastructure | |
Thimmaraju et al. | Outsmarting network security with SDN teleportation | |
Hussein et al. | Software-Defined Networking (SDN): the security review | |
CN111295640A (en) | Fine-grained firewall policy enforcement using session APP ID and endpoint process ID correlation | |
Sharma et al. | Siegebreaker: An sdn based practical decoy routing system | |
Khosravifar et al. | An experience improving intrusion detection systems false alarm ratio by using honeypot | |
Sanz et al. | A cooperation-aware virtual network function for proactive detection of distributed port scanning | |
DEL TITOLO et al. | Distributed architectures and algorithms for network security | |
Grant | Distributed detection and response for the mitigation of distributed denial of service attacks | |
Ruf et al. | A detection and filter system for use against large-scale ddos attacks in the internet backbone | |
Sakthivel et al. | Detracting TCP-Syn flooding attacks in software defined networking environment | |
Escamilla-Ambrosio et al. | IoT Botnets | |
Karakış | Extended topology analysis of a detection mechanism implementation against botnet based ddos flooding attack in SDN |