Betser et al., 2001 - Google Patents
Globalguard: Creating the ietf-idwg intrusion alert protocol (iap)Betser et al., 2001
- Document ID
- 16440852668126951094
- Author
- Betser J
- Walther A
- Erlinger M
- Buchheim T
- Feinstein B
- Matthews G
- Pollock R
- Levitt K
- Publication year
- Publication venue
- Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01
External Links
Snippet
This paper describes the design, specification, and implementation of the Internet Engineering Task Force (IETF) Intrusion Detection Working Group (IDWG) Intrusion Alert Protocol (IAP). IAP seeks to facilitate the ubiquitous interoperability of intrusion detection …
- 238000001514 detection method 0 abstract description 17
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Andy et al. | Attack scenarios and security analysis of MQTT communication protocol in IoT system | |
| US7483384B2 (en) | System and method for monitoring network traffic | |
| US7805513B2 (en) | Access control list checking | |
| Eddy | Defenses against TCP SYN flooding attacks | |
| RU2769216C2 (en) | Dynamic secure communication network and protocol | |
| US7418485B2 (en) | System and method for addressing networked terminals via pseudonym translation | |
| EP1820294B1 (en) | Performing security functions on a message payload in a network element | |
| US20080178278A1 (en) | Providing A Generic Gateway For Accessing Protected Resources | |
| US20060123425A1 (en) | Method and apparatus for high-speed processing of structured application messages in a network device | |
| Young et al. | The hacker's handbook: the strategy behind breaking into and defending networks | |
| US20060167975A1 (en) | Caching content and state data at a network element | |
| US20040255164A1 (en) | Virtual private network between computing network and remote device | |
| US20070150574A1 (en) | Method for detecting, monitoring, and controlling web services | |
| WO2005060202A1 (en) | Method and system for analysing and filtering https traffic in corporate networks | |
| Wasserman et al. | Using the NETCONF configuration protocol over secure shell (SSH) | |
| Albrecht | How clean is the future of SOAP? | |
| US8855143B1 (en) | Bandwidth saving system and method for communicating self describing messages over a network | |
| Lu et al. | Research on information steganography based on network data stream | |
| Cabrera et al. | An introduction to the web services architecture and its specifications | |
| Betser et al. | Globalguard: Creating the ietf-idwg intrusion alert protocol (iap) | |
| Buchheim et al. | Implementing the intrusion detection exchange protocol | |
| Liu et al. | Formal Verification and Security Analysis of AMQP | |
| KR100346788B1 (en) | Proxy Server for interworking between native ATM WWW Browser and Internet WWW Server and Method for interworking WWW Service using the same | |
| US20030236997A1 (en) | Secure network agent | |
| Bergen | Dynamic data exfiltration over common protocols via socket layer protocol customization |