[go: up one dir, main page]

Mohammed et al., 2015 - Google Patents

Honeypots and Routers: Collecting internet attacks

Mohammed et al., 2015

Document ID
16372233574157368864
Author
Mohammed M
Rehman H
Publication year

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Similar Documents

Publication Publication Date Title
Young et al. The hacker's handbook: the strategy behind breaking into and defending networks
Karig et al. Remote denial of service attacks and countermeasures
JP2005517349A (en) Network security system and method based on multi-method gateway
JP2002215478A (en) Fire wall service supply method
JPH11168511A (en) Packet authentication method
Mohammed et al. Honeypots and Routers: Collecting internet attacks
Alotaibi et al. Security issues in protocols of TCP/IP model at layers level
Trost Practical intrusion analysis: prevention and detection for the twenty-first century
Strebe et al. Firewalls 24seven
Kent Securing the border gateway protocol
Riordan et al. Building and deploying billy goat, a worm detection system
Wang et al. Using web-referral architectures to mitigate denial-of-service threats
Norton An ettercap primer
Mason et al. Cisco secure Internet security solutions
Monteiro How intrusion detection can improve software decoy applications
Ingham et al. Network firewalls
Singh Cisco Certified CyberOps Associate 200-201 Certification Guide
KR102877872B1 (en) Gateway device based on network address and port mutation for hidiing physical server network address, and system including the same, method thereof
Mölsä Mitigating denial of service attacks in computer networks
Triulzi Intrusion Detection Systems and IPv6
Banoth et al. Attacking the Foundation, Attacking What We Do, Understanding Defense
Hongach Jr Mitigating security flaws in the tcp/ip protocol suite
Refai Data Injection in ICMP Protocol Vulnerability and Exploitation
Qureshi Network intrusion detection using an innovative statistical approach
Chauhan Security in the Wake of IPv6