Mohammed et al., 2015 - Google Patents
Honeypots and Routers: Collecting internet attacksMohammed et al., 2015
- Document ID
- 16372233574157368864
- Author
- Mohammed M
- Rehman H
- Publication year
External Links
- 238000000034 method 0 description 61
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Young et al. | The hacker's handbook: the strategy behind breaking into and defending networks | |
| Karig et al. | Remote denial of service attacks and countermeasures | |
| JP2005517349A (en) | Network security system and method based on multi-method gateway | |
| JP2002215478A (en) | Fire wall service supply method | |
| JPH11168511A (en) | Packet authentication method | |
| Mohammed et al. | Honeypots and Routers: Collecting internet attacks | |
| Alotaibi et al. | Security issues in protocols of TCP/IP model at layers level | |
| Trost | Practical intrusion analysis: prevention and detection for the twenty-first century | |
| Strebe et al. | Firewalls 24seven | |
| Kent | Securing the border gateway protocol | |
| Riordan et al. | Building and deploying billy goat, a worm detection system | |
| Wang et al. | Using web-referral architectures to mitigate denial-of-service threats | |
| Norton | An ettercap primer | |
| Mason et al. | Cisco secure Internet security solutions | |
| Monteiro | How intrusion detection can improve software decoy applications | |
| Ingham et al. | Network firewalls | |
| Singh | Cisco Certified CyberOps Associate 200-201 Certification Guide | |
| KR102877872B1 (en) | Gateway device based on network address and port mutation for hidiing physical server network address, and system including the same, method thereof | |
| Mölsä | Mitigating denial of service attacks in computer networks | |
| Triulzi | Intrusion Detection Systems and IPv6 | |
| Banoth et al. | Attacking the Foundation, Attacking What We Do, Understanding Defense | |
| Hongach Jr | Mitigating security flaws in the tcp/ip protocol suite | |
| Refai | Data Injection in ICMP Protocol Vulnerability and Exploitation | |
| Qureshi | Network intrusion detection using an innovative statistical approach | |
| Chauhan | Security in the Wake of IPv6 |