[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

von der Assen, 2021 - Google Patents

DDoSGrid 2.0: Integrating and Providing Visualizations for the European DDoS Clearing House

von der Assen, 2021

View PDF
Document ID
4419654795050866737
Author
von der Assen J
Publication year
Publication venue
University of Zurich

External Links

Snippet

DDoS attacks have posed an increasing threat to infrastructure built on top of the internet for years. The resulting threat to an organization's reputation and financial income motivate efforts in mitigating such attacks. Post-Mortem analysis of DDoS attacks generates insights …
Continue reading at files.ifi.uzh.ch (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Investment, e.g. financial instruments, portfolio management or fund management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
    • G06Q40/025Credit processing or loan processing, e.g. risk analysis for mortgages
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0635Risk analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance, e.g. risk analysis or pensions

Similar Documents

Publication Publication Date Title
US11303659B2 (en) Detecting inappropriate activity in the presence of unauthenticated API requests using artificial intelligence
Shiravi et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection
Matherly Complete guide to shodan
US20160191549A1 (en) Rich metadata-based network security monitoring and analysis
AU2021291150B2 (en) Fast identification of offense and attack execution in network traffic patterns
Stergiopoulos et al. Automatic detection of various malicious traffic using side channel features on TCP packets
Laštovička et al. Passive operating system fingerprinting revisited: Evaluation and current challenges
Ring et al. A toolset for intrusion and insider threat detection
von der Assen DDoSGrid 2.0: Integrating and Providing Visualizations for the European DDoS Clearing House
Repetto et al. Automating mitigation of amplification attacks in NFV services
Moreno-Sancho et al. A data infrastructure for heterogeneous telemetry adaptation: application to Netflow-based cryptojacking detection
Boillat et al. A Tool for Visualization and Analysis of Distributed Denial-of-Service (DDoS) Attacks
Sun et al. Enterprise-level cyber situation awareness
Dos Santos et al. On using mashups for composing network management applications
Celik et al. Malware modeling and experimentation through parameterized behavior
Eriksson An evaluation of honeypots with compliant kubernetes
Vilches et al. Aztarna, a footprinting tool for robots
Aarseth Identifying vulnerable services using non-intrusive techniques
Čermák et al. Stream-Based IP Flow Analysis
Pietikäinen et al. Socio-technical security assessment of a voip system
Carvalho Is Web Browsing Secure?
Karlsson Enabling Cyber Threat Intelligence Sharing for Resource Constrained IoT
Akindeinde Security Analysis and Data Visualization
Al-Maani Automatic modeling of cyber intrusions using the diamond model utilizing security logs and events
Pinto HERA: Enhancing Network Security with a New Dataset Creation Tool