[go: up one dir, main page]

Kishore et al., 2020 - Google Patents

Intrusion detection system a need

Kishore et al., 2020

Document ID
3368332705200212238
Author
Kishore R
Chauhan A
Publication year
Publication venue
2020 IEEE International Conference for Innovation in Technology (INOCON)

External Links

Snippet

This review paper is concerned with intrusion detection systems and its several types. As we know that today's era is of computer networks or of internet of things which can lead to intrusion in our systems and can be devastated to it, so intrusion detection system can help …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security

Similar Documents

Publication Publication Date Title
Kizza System intrusion detection and prevention
Azeez et al. Intrusion detection and prevention systems: an updated review
US7398389B2 (en) Kernel-based network security infrastructure
Onyshchenko et al. Economic cybersecurity of business in Ukraine: strategic directions and implementation mechanism
Sherif et al. Intrusion detection: systems and models
Marinova-Boncheva A short survey of intrusion detection systems
Sandhu et al. A survey of intrusion detection & prevention techniques
Mukhopadhyay et al. A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems.
Letou et al. Host-based intrusion detection and prevention system (HIDPS)
Younus et al. A survey on network security monitoring: tools and functionalities
Kazienko et al. Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture)
Beigh et al. Intrusion Detection and Prevention System: Classification and Quick
Athavale et al. Framework for threat analysis and attack modelling of network security protocols
Beigh et al. Intrusion detection and prevention system: issues and challenges
Kishore et al. Intrusion detection system a need
Leghris et al. Improved security intrusion detection using intelligent techniques
Rastogi et al. Network anomalies detection using statistical technique: a chi-square approach
Rahim et al. Improving the security of internet of things (iot) using intrusion detection system (ids)
Zafar et al. Network security: a survey of modern approaches
Navin et al. A survey on intrusion detection system
Singh et al. A review on intrusion detection system
Giri et al. Intrusion detection system for local networks–A review study
Majeed et al. A Review and Classification of Intrusion Detection System in Data Engineering
Gauhar Fatima et al. A Study on Intrusion Detection
Khanday et al. Intrusion detection systems for trending cyberattacks