Singh et al., 2014 - Google Patents
Intrusion detection using network monitoring toolsSingh et al., 2014
View PDF- Document ID
- 8010862456697659576
- Author
- Singh G
- Goyal S
- Agarwal R
- Publication year
- Publication venue
- Available at SSRN 2426105
External Links
Snippet
This paper is mainly concern about how network monitoring, using software tools can be helpful for protection of our communication network, how different kind of network attacks is perform. Now these days network security is main concern for each organization due to this …
- 238000001514 detection method 0 title abstract description 42
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hoque et al. | Network attacks: Taxonomy, tools and systems | |
Caswell et al. | Snort intrusion detection and prevention toolkit | |
Cazorla et al. | Cyber stealth attacks in critical information infrastructures | |
Gaddam et al. | An analysis of various snort based techniques to detect and prevent intrusions in networks proposal with code refactoring snort tool in Kali Linux environment | |
Kaur et al. | Comparison of network security tools-firewall, intrusion detection system and Honeypot | |
Hindy et al. | A taxonomy of malicious traffic for intrusion detection systems | |
Sinchana et al. | Performance evaluation and analysis of various network security tools | |
Ramakrishnan et al. | Pandora: An IOT Based Intrusion Detection Honeypot with Real-time Monitoring | |
Singh et al. | Intrusion detection using network monitoring tools | |
Abdulrezzak et al. | Enhancing Intrusion Prevention in Snort System | |
Simkhada et al. | Security threats/attacks via botnets and botnet detection & prevention techniques in computer networks: a review | |
Renals et al. | Blocking skype through deep packet inspection | |
Sulieman et al. | Detecting zero-day polymorphic worm: A review | |
Jadidoleslamy | Weaknesses, Vulnerabilities and Elusion Strategies Against Intrusion Detection Systems | |
Shivaprasad et al. | Enhancing Network Security through a Multi-layered Honeypot Architecture with Integrated Network Monitoring Tools | |
Marín et al. | Honeypots and honeynets: Analysis and case study | |
Bendiab et al. | IoT Security Frameworks and Countermeasures | |
Subhash et al. | A Security Framework for the Detection of Targeted Attacks Using Honeypot | |
Singh et al. | A review on intrusion detection system | |
Kumar et al. | Recent advances in intrusion detection systems: An analytical evaluation and comparative study | |
Gorbatiuk et al. | Method of detection of http attacks on a smart home using the algebraic matching method | |
Bhuyan et al. | Practical tools for attackers and defenders | |
Karamagi | Comptia Security+ Practice Exams | |
Pannu et al. | Systematic Approach Towards Analysis and Mitigation of Advanced Evasion Techniques | |
Bhakthavatsalam et al. | Analysis of network infrastructure threats using SonicWall analyser |