[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Grant, 2018 - Google Patents

Distributed detection and response for the mitigation of distributed denial of service attacks

Grant, 2018

View PDF
Document ID
5132973685449295699
Author
Grant D
Publication year
Publication venue
2018 International Conference on Information Networking (ICOIN)

External Links

Snippet

Distributed Denial of Service (DDoS) attacks continue to escalate in size and impact despite efforts to control and limit exposures that enable them to be successful. This proposal takes a novel approach to the DDoS problem, by combining separate existing information security …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls

Similar Documents

Publication Publication Date Title
Zarpelão et al. A survey of intrusion detection in Internet of Things
Nawrocki et al. A survey on honeypot software and data analysis
Modi et al. A survey of intrusion detection techniques in cloud
Fuchsberger Intrusion detection systems and intrusion prevention systems
US9769204B2 (en) Distributed system for Bot detection
Mallick et al. Navigating the Cyber security Landscape: A Comprehensive Review of Cyber-Attacks, Emerging Trends, and Recent Developments
Weissman et al. Integrating IoT monitoring for security operation center
Hatzivasilis et al. WARDOG: Awareness detection watchdog for Botnet infection on the host device
Johnson et al. Soar4der: Security orchestration, automation, and response for distributed energy resources
Simkhada et al. Security threats/attacks via botnets and botnet detection & prevention techniques in computer networks: a review
Maskat et al. Mobile agents in intrusion detection system: review and analysis
Zeinali Analysis of security information and event management (SIEM) evasion and detection methods
Patel et al. Security Issues, Attacks and Countermeasures in Layered IoT Ecosystem.
Abdulrezzak et al. Enhancing Intrusion Prevention in Snort System
Patel et al. A Snort-based secure edge router for smart home
Grant Distributed detection and response for the mitigation of distributed denial of service attacks
Habibi Gharakheili et al. Cyber‐Securing IoT Infrastructure by Modeling Network Traffic
Sharma Honeypots in Network Security
Reddy et al. A new compromising security framework for automated smart homes using VAPT
Ragupathy et al. Detecting Denial of Service Attacks by Analysing Network Traffic in Wireless Networks
Kodzai Impact of network security on SDN controller performance
Tanya et al. A Comprehensive Study on Cybersecurity Challenges and Solutions in an IoT Framework
Cho et al. Hybrid network defense model based on fuzzy evaluation
Lange Cybersecurity in the Internet of Things
Zhang et al. A distributed network-sensor based intrusion detection framework in enterprise networks