[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Singh et al., 2014 - Google Patents

Intrusion detection using network monitoring tools

Singh et al., 2014

View PDF
Document ID
8010862456697659576
Author
Singh G
Goyal S
Agarwal R
Publication year
Publication venue
Available at SSRN 2426105

External Links

Snippet

This paper is mainly concern about how network monitoring, using software tools can be helpful for protection of our communication network, how different kind of network attacks is perform. Now these days network security is main concern for each organization due to this …
Continue reading at papers.ssrn.com (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Hoque et al. Network attacks: Taxonomy, tools and systems
Caswell et al. Snort intrusion detection and prevention toolkit
Cazorla et al. Cyber stealth attacks in critical information infrastructures
Gaddam et al. An analysis of various snort based techniques to detect and prevent intrusions in networks proposal with code refactoring snort tool in Kali Linux environment
Kaur et al. Comparison of network security tools-firewall, intrusion detection system and Honeypot
Hindy et al. A taxonomy of malicious traffic for intrusion detection systems
Sinchana et al. Performance evaluation and analysis of various network security tools
Ramakrishnan et al. Pandora: An IOT Based Intrusion Detection Honeypot with Real-time Monitoring
Singh et al. Intrusion detection using network monitoring tools
Abdulrezzak et al. Enhancing Intrusion Prevention in Snort System
Simkhada et al. Security threats/attacks via botnets and botnet detection & prevention techniques in computer networks: a review
Renals et al. Blocking skype through deep packet inspection
Sulieman et al. Detecting zero-day polymorphic worm: A review
Jadidoleslamy Weaknesses, Vulnerabilities and Elusion Strategies Against Intrusion Detection Systems
Shivaprasad et al. Enhancing Network Security through a Multi-layered Honeypot Architecture with Integrated Network Monitoring Tools
Marín et al. Honeypots and honeynets: Analysis and case study
Bendiab et al. IoT Security Frameworks and Countermeasures
Subhash et al. A Security Framework for the Detection of Targeted Attacks Using Honeypot
Singh et al. A review on intrusion detection system
Kumar et al. Recent advances in intrusion detection systems: An analytical evaluation and comparative study
Gorbatiuk et al. Method of detection of http attacks on a smart home using the algebraic matching method
Bhuyan et al. Practical tools for attackers and defenders
Karamagi Comptia Security+ Practice Exams
Pannu et al. Systematic Approach Towards Analysis and Mitigation of Advanced Evasion Techniques
Bhakthavatsalam et al. Analysis of network infrastructure threats using SonicWall analyser