[go: up one dir, main page]

Fung et al., 2011 - Google Patents

Cooperation in Intrusion Detection Networks

Fung et al., 2011

Document ID
16483197466696653783
Author
Fung C
Boutaba R
Publication year
Publication venue
Cooperative Networking

External Links

Snippet

Network intrusions are unwanted traffic or computer activities that may be malicious and destructive. Network intrusions usually rely on the executing of malicious code to achieve their attack goals. This chapter describes Malware and their potential damage to computers …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Similar Documents

Publication Publication Date Title
Almutairi et al. Hybrid botnet detection based on host and network analysis
Bhatia et al. Distributed denial of service attacks and defense mechanisms: current landscape and future directions
Zeidanloo et al. A taxonomy of botnet detection techniques
Othman et al. Survey on intrusion detection system types
Karim et al. Botnet detection techniques: review, future trends, and issues
Fung Collaborative Intrusion Detection Networks and Insider Attacks.
Amini et al. A survey on Botnet: Classification, detection and defense
Vania et al. A review on botnet and detection technique
Stevanovic et al. Machine learning for identifying botnet network traffic
Fung et al. Intrusion detection networks: a key to collaborative security
Hu et al. RB-Seeker: Auto-detection of Redirection Botnets.
Haddadi et al. DoS-DDoS: taxonomies of attacks, countermeasures, and well-known defense mechanisms in cloud environment
Verma et al. A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development
Alparslan et al. BotNet detection: Enhancing analysis by using data mining techniques
Yu et al. Self-disciplinary worms and countermeasures: Modeling and analysis
Haddadi et al. Botnet behaviour analysis: How would a data analytics‐based system with minimum a priori information perform?
Hwa et al. Review of peer-to-peer botnets and detection mechanisms
Sikkanan et al. Denial-of-service and botnet analysis, detection, and mitigation
Alauthman An efficient approach to online bot detection based on a reinforcement learning technique
Zhang et al. A survey of defense against p2p botnets
Abaid et al. Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study
Adiwal et al. Intrusion detection and prevention in openstack: A case study on enhancing security and threat detection
Panimalar et al. A review on taxonomy of botnet detection
Jeong et al. Botnets: threats and responses
Fung et al. Cooperation in Intrusion Detection Networks