Grant, 2018 - Google Patents
Distributed detection and response for the mitigation of distributed denial of service attacksGrant, 2018
View PDF- Document ID
- 5132973685449295699
- Author
- Grant D
- Publication year
- Publication venue
- 2018 International Conference on Information Networking (ICOIN)
External Links
Snippet
Distributed Denial of Service (DDoS) attacks continue to escalate in size and impact despite efforts to control and limit exposures that enable them to be successful. This proposal takes a novel approach to the DDoS problem, by combining separate existing information security …
- 238000001514 detection method 0 title abstract description 13
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zarpelão et al. | A survey of intrusion detection in Internet of Things | |
Nawrocki et al. | A survey on honeypot software and data analysis | |
Modi et al. | A survey of intrusion detection techniques in cloud | |
Fuchsberger | Intrusion detection systems and intrusion prevention systems | |
US9769204B2 (en) | Distributed system for Bot detection | |
Mallick et al. | Navigating the Cyber security Landscape: A Comprehensive Review of Cyber-Attacks, Emerging Trends, and Recent Developments | |
Weissman et al. | Integrating IoT monitoring for security operation center | |
Hatzivasilis et al. | WARDOG: Awareness detection watchdog for Botnet infection on the host device | |
Johnson et al. | Soar4der: Security orchestration, automation, and response for distributed energy resources | |
Simkhada et al. | Security threats/attacks via botnets and botnet detection & prevention techniques in computer networks: a review | |
Maskat et al. | Mobile agents in intrusion detection system: review and analysis | |
Zeinali | Analysis of security information and event management (SIEM) evasion and detection methods | |
Patel et al. | Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem. | |
Abdulrezzak et al. | Enhancing Intrusion Prevention in Snort System | |
Patel et al. | A Snort-based secure edge router for smart home | |
Grant | Distributed detection and response for the mitigation of distributed denial of service attacks | |
Habibi Gharakheili et al. | Cyber‐Securing IoT Infrastructure by Modeling Network Traffic | |
Sharma | Honeypots in Network Security | |
Reddy et al. | A new compromising security framework for automated smart homes using VAPT | |
Ragupathy et al. | Detecting Denial of Service Attacks by Analysing Network Traffic in Wireless Networks | |
Kodzai | Impact of network security on SDN controller performance | |
Tanya et al. | A Comprehensive Study on Cybersecurity Challenges and Solutions in an IoT Framework | |
Cho et al. | Hybrid network defense model based on fuzzy evaluation | |
Lange | Cybersecurity in the Internet of Things | |
Zhang et al. | A distributed network-sensor based intrusion detection framework in enterprise networks |