Kishore et al., 2020 - Google Patents
Intrusion detection system a needKishore et al., 2020
- Document ID
- 3368332705200212238
- Author
- Kishore R
- Chauhan A
- Publication year
- Publication venue
- 2020 IEEE International Conference for Innovation in Technology (INOCON)
External Links
Snippet
This review paper is concerned with intrusion detection systems and its several types. As we know that today's era is of computer networks or of internet of things which can lead to intrusion in our systems and can be devastated to it, so intrusion detection system can help …
- 238000001514 detection method 0 title abstract description 50
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kizza | System intrusion detection and prevention | |
| Azeez et al. | Intrusion detection and prevention systems: an updated review | |
| US7398389B2 (en) | Kernel-based network security infrastructure | |
| Onyshchenko et al. | Economic cybersecurity of business in Ukraine: strategic directions and implementation mechanism | |
| Sherif et al. | Intrusion detection: systems and models | |
| Marinova-Boncheva | A short survey of intrusion detection systems | |
| Sandhu et al. | A survey of intrusion detection & prevention techniques | |
| Mukhopadhyay et al. | A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems. | |
| Letou et al. | Host-based intrusion detection and prevention system (HIDPS) | |
| Younus et al. | A survey on network security monitoring: tools and functionalities | |
| Kazienko et al. | Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture) | |
| Beigh et al. | Intrusion Detection and Prevention System: Classification and Quick | |
| Athavale et al. | Framework for threat analysis and attack modelling of network security protocols | |
| Beigh et al. | Intrusion detection and prevention system: issues and challenges | |
| Kishore et al. | Intrusion detection system a need | |
| Leghris et al. | Improved security intrusion detection using intelligent techniques | |
| Rastogi et al. | Network anomalies detection using statistical technique: a chi-square approach | |
| Rahim et al. | Improving the security of internet of things (iot) using intrusion detection system (ids) | |
| Zafar et al. | Network security: a survey of modern approaches | |
| Navin et al. | A survey on intrusion detection system | |
| Singh et al. | A review on intrusion detection system | |
| Giri et al. | Intrusion detection system for local networks–A review study | |
| Majeed et al. | A Review and Classification of Intrusion Detection System in Data Engineering | |
| Gauhar Fatima et al. | A Study on Intrusion Detection | |
| Khanday et al. | Intrusion detection systems for trending cyberattacks |