von der Assen, 2021 - Google Patents
DDoSGrid 2.0: Integrating and Providing Visualizations for the European DDoS Clearing Housevon der Assen, 2021
View PDF- Document ID
- 4419654795050866737
- Author
- von der Assen J
- Publication year
- Publication venue
- University of Zurich
External Links
Snippet
DDoS attacks have posed an increasing threat to infrastructure built on top of the internet for years. The resulting threat to an organization's reputation and financial income motivate efforts in mitigating such attacks. Post-Mortem analysis of DDoS attacks generates insights …
- 238000004458 analytical method 0 abstract description 134
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/06—Investment, e.g. financial instruments, portfolio management or fund management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
- G06Q40/025—Credit processing or loan processing, e.g. risk analysis for mortgages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/12—Accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0635—Risk analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/08—Insurance, e.g. risk analysis or pensions
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11303659B2 (en) | Detecting inappropriate activity in the presence of unauthenticated API requests using artificial intelligence | |
Shiravi et al. | Toward developing a systematic approach to generate benchmark datasets for intrusion detection | |
Matherly | Complete guide to shodan | |
US20160191549A1 (en) | Rich metadata-based network security monitoring and analysis | |
AU2021291150B2 (en) | Fast identification of offense and attack execution in network traffic patterns | |
Stergiopoulos et al. | Automatic detection of various malicious traffic using side channel features on TCP packets | |
Laštovička et al. | Passive operating system fingerprinting revisited: Evaluation and current challenges | |
Ring et al. | A toolset for intrusion and insider threat detection | |
von der Assen | DDoSGrid 2.0: Integrating and Providing Visualizations for the European DDoS Clearing House | |
Repetto et al. | Automating mitigation of amplification attacks in NFV services | |
Moreno-Sancho et al. | A data infrastructure for heterogeneous telemetry adaptation: application to Netflow-based cryptojacking detection | |
Boillat et al. | A Tool for Visualization and Analysis of Distributed Denial-of-Service (DDoS) Attacks | |
Sun et al. | Enterprise-level cyber situation awareness | |
Dos Santos et al. | On using mashups for composing network management applications | |
Celik et al. | Malware modeling and experimentation through parameterized behavior | |
Eriksson | An evaluation of honeypots with compliant kubernetes | |
Vilches et al. | Aztarna, a footprinting tool for robots | |
Aarseth | Identifying vulnerable services using non-intrusive techniques | |
Čermák et al. | Stream-Based IP Flow Analysis | |
Pietikäinen et al. | Socio-technical security assessment of a voip system | |
Carvalho | Is Web Browsing Secure? | |
Karlsson | Enabling Cyber Threat Intelligence Sharing for Resource Constrained IoT | |
Akindeinde | Security Analysis and Data Visualization | |
Al-Maani | Automatic modeling of cyber intrusions using the diamond model utilizing security logs and events | |
Pinto | HERA: Enhancing Network Security with a New Dataset Creation Tool |