[go: up one dir, main page]

DeCusatis et al., 2019 - Google Patents

Design and implementation of a research and education cybersecurity operations center

DeCusatis et al., 2019

Document ID
14781371364846357373
Author
DeCusatis C
Cannistra R
Labouseur A
Johnson M
Publication year
Publication venue
Cybersecurity and Secure Information Systems: Challenges and Solutions in Smart Environments

External Links

Snippet

The growing number and severity of cybersecurity threats, combined with a shortage of skilled security analysts, has led to an increased focus on cybersecurity research and education. In this article, we describe the design and implementation of an education and …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates

Similar Documents

Publication Publication Date Title
US12495076B2 (en) System and method for internet activity and health forecasting and internet noise analysis
Sanders et al. Applied network security monitoring: collection, detection, and analysis
Priyadarshini Features and architecture of the modern cyber range: a qualitative analysis and survey
Chomiak-Orsa et al. Artificial intelligence in cybersecurity: The use of AI along the cyber kill chain
Al-Mohannadi et al. Analysis of adversary activities using cloud-based web services to enhance cyber threat intelligence
DeCusatis et al. Design and implementation of a research and education cybersecurity operations center
Dutta et al. Cyber security: issues and current trends
Robertson et al. Darknet mining and game theory for enhanced cyber threat intelligence
Djap et al. Xb-pot: Revealing honeypot-based attacker’s behaviors
Mohamed State-of-the-Art in Chinese APT Attack and Using Threat Intelligence for Detection. A Survey.
Gioti Advancements in Open Source Intelligence (OSINT) Techniques and the role of artificial intelligence in Cyber Threat Intelligence (CTI)
Hadi et al. Cost-effective resilience: a comprehensive survey and tutorial on assessing open-source cybersecurity tools for multi-tiered defense
Syed et al. Comprehensive Advanced Persistent Threats Dataset
Sabottke et al. How to trick the Borg: threat models against manual and automated techniques for detecting network attacks
Huang Human-centric training and assessment for cyber situation awareness
WO2024263997A1 (en) System and method for internet activity and health forecasting and internet noise analysis
Samtani Developing proactive cyber threat intelligence from the online hacker community: A computational design science approach
Trivedi et al. Threat intelligence analysis of onion websites using sublinks and keywords
Roy Cyber Deception against Adversarial Reconnaissance in Enterprise Network using Semi-Indistinguishable Honeypot
Gourisaria et al. Cybersecurity imminent threats with solutions in higher education
Kinnunen Threat Detection Gap Analysis Using MITRE ATT&CK Framework
Serem Protecting Institutions of Higher Learning in Kenya: A Scalable Hybrid Decoy Framework against Cyber Threats
Peng Design of smart campus security management and control platform based on big data technology
Ayenson Constructive Research: Cyber Maneuvers in Blue Space
Al-Mahrouqi et al. Efficiency of network event logs as admissible digital evidence