[go: up one dir, main page]

DEL TITOLO et al. - Google Patents

Distributed architectures and algorithms for network security

DEL TITOLO et al.

View PDF
Document ID
1284245046927404745
Author
DEL TITOLO T
DI DOTTORE D

External Links

Snippet

As our society becomes more dependent on networked information systems, it is also becoming increasingly vulnerable to their misuse. The large amount of sensitive information transmitted over computer networks and stored on databases, as well as the high revenues …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Similar Documents

Publication Publication Date Title
US12003485B2 (en) Outbound/inbound lateral traffic punting based on process risk
Shaghaghi et al. Software-defined network (SDN) data plane security: issues, solutions, and future directions
Sahay et al. The application of software defined networking on securing computer networks: A survey
Dayal et al. Research trends in security and DDoS in SDN
Yan et al. Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges
Nawrocki et al. A survey on honeypot software and data analysis
Akhunzada et al. Secure and dependable software defined networks
Izhikevich et al. {LZR}: Identifying unexpected internet services
Ahmad et al. Security in software defined networks: A survey
Giotis et al. Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments
US10855656B2 (en) Fine-grained firewall policy enforcement using session app ID and endpoint process ID correlation
Krishnan et al. SDN/NFV security framework for fog‐to‐things computing infrastructure
Krishnan et al. SDNFV based threat monitoring and security framework for multi-access edge computing infrastructure
Thimmaraju et al. Outsmarting network security with SDN teleportation
Hussein et al. Software-Defined Networking (SDN): the security review
CN111295640A (en) Fine-grained firewall policy enforcement using session APP ID and endpoint process ID correlation
Sharma et al. Siegebreaker: An sdn based practical decoy routing system
Khosravifar et al. An experience improving intrusion detection systems false alarm ratio by using honeypot
Sanz et al. A cooperation-aware virtual network function for proactive detection of distributed port scanning
DEL TITOLO et al. Distributed architectures and algorithms for network security
Grant Distributed detection and response for the mitigation of distributed denial of service attacks
Ruf et al. A detection and filter system for use against large-scale ddos attacks in the internet backbone
Sakthivel et al. Detracting TCP-Syn flooding attacks in software defined networking environment
Escamilla-Ambrosio et al. IoT Botnets
Karakış Extended topology analysis of a detection mechanism implementation against botnet based ddos flooding attack in SDN