Zekrifa, 2014 - Google Patents
Hybrid Intrusion Detection SystemZekrifa, 2014
View PDF- Document ID
- 644618145276508943
- Author
- Zekrifa D
- Publication year
- Publication venue
- Theses, School of Information Technology & Mathematical Sciences
External Links
Snippet
With the enormous growth of computer networks and the huge increase in the number of applications that rely on it, network security is gaining increasing importance. Moreover, almost all computer systems suffer from security vulnerabilities which are both technically …
- 238000001514 detection method 0 title abstract description 298
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sharafaldin et al. | Towards a reliable intrusion detection benchmark dataset | |
Haddadi et al. | Benchmarking the effect of flow exporters and protocol filters on botnet traffic classification | |
Ghorbani et al. | Network intrusion detection and prevention: concepts and techniques | |
Bhuyan et al. | Towards Generating Real-life Datasets for Network Intrusion Detection. | |
García et al. | Survey on network‐based botnet detection methods | |
Yegneswaran et al. | An Architecture for Generating Semantic Aware Signatures. | |
Jeya et al. | Efficient classifier for R2L and U2R attacks | |
Gogoi et al. | Packet and flow based network intrusion dataset | |
Sperotto et al. | A labeled data set for flow-based intrusion detection | |
Acarali et al. | Survey of approaches and features for the identification of HTTP-based botnet traffic | |
Kumar et al. | Intrusion detection systems: a review | |
Garcıa | Identifying, modeling and detecting botnet behaviors in the network | |
BACHAR et al. | Towards a behavioral network intrusion detection system based on the SVM model | |
Gandhi et al. | Detecting and preventing attacks using network intrusion detection systems | |
Qin et al. | Symmetry degree measurement and its applications to anomaly detection | |
Haddadi et al. | Botnet behaviour analysis: How would a data analytics‐based system with minimum a priori information perform? | |
Uhříček et al. | Bota: Explainable iot malware detection in large networks | |
Alavizadeh et al. | A survey on threat situation awareness systems: framework, techniques, and insights | |
Zekrifa | Hybrid Intrusion Detection System | |
Caulkins et al. | A dynamic data mining technique for intrusion detection systems | |
Iorliam et al. | " Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law | |
Raheja et al. | Rule‐Based Approach for Botnet Behavior Analysis | |
Laabid | Botnet command & control detection in iot networks | |
Prayote | Knowledge based anomaly detection | |
Drašar | Behavioral detection of distributed dictionary attacks |