DeCusatis et al., 2019 - Google Patents
Design and implementation of a research and education cybersecurity operations centerDeCusatis et al., 2019
- Document ID
- 14781371364846357373
- Author
- DeCusatis C
- Cannistra R
- Labouseur A
- Johnson M
- Publication year
- Publication venue
- Cybersecurity and Secure Information Systems: Challenges and Solutions in Smart Environments
External Links
Snippet
The growing number and severity of cybersecurity threats, combined with a shortage of skilled security analysts, has led to an increased focus on cybersecurity research and education. In this article, we describe the design and implementation of an education and …
- 238000004458 analytical method 0 abstract description 19
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12495076B2 (en) | System and method for internet activity and health forecasting and internet noise analysis | |
| Sanders et al. | Applied network security monitoring: collection, detection, and analysis | |
| Priyadarshini | Features and architecture of the modern cyber range: a qualitative analysis and survey | |
| Chomiak-Orsa et al. | Artificial intelligence in cybersecurity: The use of AI along the cyber kill chain | |
| Al-Mohannadi et al. | Analysis of adversary activities using cloud-based web services to enhance cyber threat intelligence | |
| DeCusatis et al. | Design and implementation of a research and education cybersecurity operations center | |
| Dutta et al. | Cyber security: issues and current trends | |
| Robertson et al. | Darknet mining and game theory for enhanced cyber threat intelligence | |
| Djap et al. | Xb-pot: Revealing honeypot-based attacker’s behaviors | |
| Mohamed | State-of-the-Art in Chinese APT Attack and Using Threat Intelligence for Detection. A Survey. | |
| Gioti | Advancements in Open Source Intelligence (OSINT) Techniques and the role of artificial intelligence in Cyber Threat Intelligence (CTI) | |
| Hadi et al. | Cost-effective resilience: a comprehensive survey and tutorial on assessing open-source cybersecurity tools for multi-tiered defense | |
| Syed et al. | Comprehensive Advanced Persistent Threats Dataset | |
| Sabottke et al. | How to trick the Borg: threat models against manual and automated techniques for detecting network attacks | |
| Huang | Human-centric training and assessment for cyber situation awareness | |
| WO2024263997A1 (en) | System and method for internet activity and health forecasting and internet noise analysis | |
| Samtani | Developing proactive cyber threat intelligence from the online hacker community: A computational design science approach | |
| Trivedi et al. | Threat intelligence analysis of onion websites using sublinks and keywords | |
| Roy | Cyber Deception against Adversarial Reconnaissance in Enterprise Network using Semi-Indistinguishable Honeypot | |
| Gourisaria et al. | Cybersecurity imminent threats with solutions in higher education | |
| Kinnunen | Threat Detection Gap Analysis Using MITRE ATT&CK Framework | |
| Serem | Protecting Institutions of Higher Learning in Kenya: A Scalable Hybrid Decoy Framework against Cyber Threats | |
| Peng | Design of smart campus security management and control platform based on big data technology | |
| Ayenson | Constructive Research: Cyber Maneuvers in Blue Space | |
| Al-Mahrouqi et al. | Efficiency of network event logs as admissible digital evidence |