Bijani et al., 2008 - Google Patents
HIDMN: A host and network-based intrusion detection for mobile networksBijani et al., 2008
- Document ID
- 4986509501222988171
- Author
- Bijani S
- Kazemitabar M
- Publication year
- Publication venue
- 2008 International Conference on Computer and Electrical Engineering
External Links
Snippet
Network-based methods of intrusion detection alone are not adequate to encounter current and future threats in mobile networks. In this paper, we introduce HIDMN, a host and network-based intrusion detection and prevention system for mobile networks. In addition …
- 238000001514 detection method 0 title abstract description 33
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/12—Fraud detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3906652B1 (en) | Protecting a telecommunications network using network components as blockchain nodes | |
Hongsong et al. | Security and trust research in M2M system | |
Shaik et al. | Practical attacks against privacy and availability in 4G/LTE mobile communication systems | |
KR102329493B1 (en) | Method and apparatus for preventing connection in wireless intrusion prevention system | |
EP2742711B1 (en) | Detection of suspect wireless access points | |
Norrman et al. | Protecting IMSI and user privacy in 5G networks | |
Golde et al. | Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications. | |
KR101550482B1 (en) | Detction of anomaly of traffic emitted by a mobile terminal in a radiocommunication network | |
Park et al. | {White-Stingray}: Evaluating {IMSI} Catchers Detection Applications | |
EP3433749B1 (en) | Identifying and trapping wireless based attacks on networks using deceptive network emulation | |
CN104486765A (en) | Wireless intrusion detecting system and detecting method | |
Khan et al. | Vulnerabilities of UMTS access domain security architecture | |
CN103430582B (en) | Prevention of eavesdropping type of attack in hybrid communication system | |
Baraković et al. | Security issues in wireless networks: An overview | |
Liebergeld et al. | Cellpot: A concept for next generation cellular network honeypots | |
Lovinger et al. | Detection of wireless fake access points | |
Tabiban et al. | Signaling storm in O-RAN: Challenges and research opportunities | |
Xenakis et al. | An advanced persistent threat in 3G networks: Attacking the home network from roaming networks | |
KR20130031293A (en) | Methods for security and monitoring within a worldwide interoperability for microwave access (wimax) network | |
Wen et al. | A fine-grained telemetry stream for security services in 5g open radio access networks | |
Borgaonkar et al. | White-stingray: evaluating imsi catchers detection applications | |
Pavia et al. | The evolution and future perspective of security in mobile communications networks | |
Chen et al. | An intelligent WLAN intrusion prevention system based on signature detection and plan recognition | |
Barraud et al. | 5g suci catcher: Attack and detection | |
Abodunrin et al. | Some dangers from 2g networks legacy support and a possible mitigation |