[go: up one dir, main page]

Bijani et al., 2008 - Google Patents

HIDMN: A host and network-based intrusion detection for mobile networks

Bijani et al., 2008

Document ID
4986509501222988171
Author
Bijani S
Kazemitabar M
Publication year
Publication venue
2008 International Conference on Computer and Electrical Engineering

External Links

Snippet

Network-based methods of intrusion detection alone are not adequate to encounter current and future threats in mobile networks. In this paper, we introduce HIDMN, a host and network-based intrusion detection and prevention system for mobile networks. In addition …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/12Fraud detection

Similar Documents

Publication Publication Date Title
EP3906652B1 (en) Protecting a telecommunications network using network components as blockchain nodes
Hongsong et al. Security and trust research in M2M system
Shaik et al. Practical attacks against privacy and availability in 4G/LTE mobile communication systems
KR102329493B1 (en) Method and apparatus for preventing connection in wireless intrusion prevention system
EP2742711B1 (en) Detection of suspect wireless access points
Norrman et al. Protecting IMSI and user privacy in 5G networks
Golde et al. Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications.
KR101550482B1 (en) Detction of anomaly of traffic emitted by a mobile terminal in a radiocommunication network
Park et al. {White-Stingray}: Evaluating {IMSI} Catchers Detection Applications
EP3433749B1 (en) Identifying and trapping wireless based attacks on networks using deceptive network emulation
CN104486765A (en) Wireless intrusion detecting system and detecting method
Khan et al. Vulnerabilities of UMTS access domain security architecture
CN103430582B (en) Prevention of eavesdropping type of attack in hybrid communication system
Baraković et al. Security issues in wireless networks: An overview
Liebergeld et al. Cellpot: A concept for next generation cellular network honeypots
Lovinger et al. Detection of wireless fake access points
Tabiban et al. Signaling storm in O-RAN: Challenges and research opportunities
Xenakis et al. An advanced persistent threat in 3G networks: Attacking the home network from roaming networks
KR20130031293A (en) Methods for security and monitoring within a worldwide interoperability for microwave access (wimax) network
Wen et al. A fine-grained telemetry stream for security services in 5g open radio access networks
Borgaonkar et al. White-stingray: evaluating imsi catchers detection applications
Pavia et al. The evolution and future perspective of security in mobile communications networks
Chen et al. An intelligent WLAN intrusion prevention system based on signature detection and plan recognition
Barraud et al. 5g suci catcher: Attack and detection
Abodunrin et al. Some dangers from 2g networks legacy support and a possible mitigation