Jieke, 2007 - Google Patents
Cooperative Intrusion Detection for the Next Generation Carrier: EthernetJieke, 2007
- Document ID
- 7624757949996946892
- Author
- Jieke P
- Publication year
- Publication venue
- PQDT-Global
External Links
Snippet
Hoje em dia os elementos de rede (NEs) da camada 2 do modelo OSI, bridges ou switches, são componentes complexos, com centenas de milhares de linhas de código, que podem ser vulneráveis a ataques, permitindo até a execçuão remota de código. Este trabalho tem …
- 238000001514 detection method 0 title description 81
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/02—Communication control; Communication processing contains provisionally no documents
- H04L29/06—Communication control; Communication processing contains provisionally no documents characterised by a protocol
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/04—Architectural aspects of network management arrangements
- H04L41/042—Arrangements involving multiple distributed management centers cooperatively managing the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/08—Protocols for interworking or protocol conversion
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/24—Arrangements for maintenance or administration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
- H04L69/322—Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer, i.e. layer seven
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/06—Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/12—Arrangements for maintenance or administration or management of packet switching networks network topology discovery or management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/24—Presence management
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Skowyra et al. | Effective topology tampering attacks and defenses in software-defined networks | |
| Dayal et al. | Research trends in security and DDoS in SDN | |
| Ghorbani et al. | Network intrusion detection and prevention: concepts and techniques | |
| Subramanian et al. | Listen and whisper: Security mechanisms for BGP | |
| US7308715B2 (en) | Protocol-parsing state machine and method of using same | |
| Fadlullah et al. | DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis | |
| CN101589595B (en) | Pinning mechanism for potentially contaminated end systems | |
| Hussein et al. | Software-Defined Networking (SDN): the security review | |
| Kong et al. | Combination attacks and defenses on sdn topology discovery | |
| Soltani et al. | Security of topology discovery service in SDN: Vulnerabilities and countermeasures | |
| Yang et al. | Security Vulnerabilities and Countermeasures in the RPL-based Internet of Things | |
| Wong et al. | Network infrastructure security | |
| Lewandowski et al. | Analyzing network-aware active wardens in IPv6 | |
| CN116633556B (en) | Firewall signature authentication method and firewall-based anti-network topology discovery system | |
| Fallah et al. | TDPF: a traceback‐based distributed packet filter to mitigate spoofed DDoS attacks | |
| Ovadia et al. | {Cross-Router} covert channels | |
| Meredith et al. | Increasing network resilience to persistent OSPF attacks | |
| Jieke | Cooperative Intrusion Detection for the Next Generation Carrier: Ethernet | |
| Pan | Cooperative intrusion detection for the next generation carrier: ethernet | |
| Shue et al. | Packet forwarding with source verification | |
| Jieke et al. | Specification-based Intrusion Detection System for Carrier Ethernet. | |
| Wang | Vulnerability analysis, intrusion prevention and detection for link state routing protocols | |
| Al-Salloum et al. | Semi-autonomous link layer vulnerability discovery and mitigation dissemination | |
| Guha et al. | ShutUp: End-to-end containment of unwanted traffic | |
| Bowen et al. | A plan for scada security to deter dos attacks |