[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Tazerouti et al., 2021 - Google Patents

Imposters anomaly detection

Tazerouti et al., 2021

View PDF
Document ID
11488380251524175111
Author
Tazerouti A
Ikram A
Publication year
Publication venue
Journal of Fundamental and Applied Sciences

External Links

Snippet

Over the last two decades the world of cyber security has grown immensely, but despite the state-of-the-art security detection systems and intrusion detection systems (IDSs), unwanted malicious users still find their way around these security measures and gain access to …
Continue reading at www.ajol.info (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength

Similar Documents

Publication Publication Date Title
Agarwal et al. A closer look at intrusion detection system for web applications
Süzen A risk-assessment of cyber attacks and defense strategies in industry 4.0 ecosystem
Ho et al. Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems
Punithavathani et al. Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence
Adil et al. Preventive techniques of phishing attacks in networks
Marinova-Boncheva A short survey of intrusion detection systems
Singh et al. E-governance: Information security issues
Cotroneo et al. Automated root cause identification of security alerts: Evaluation in a SaaS Cloud
Kim et al. DSS for computer security incident response applying CBR and collaborative response
Möller Threats and threat intelligence
Argauer et al. VTAC: Virtual terrain assisted impact assessment for cyber attacks
Foo et al. Intrusion response systems: a survey
Veena et al. An intrusion detection system for network security based on an advanced honeypots server
Vasudeo et al. IMMIX-intrusion detection and prevention system
Yinka-Banjo et al. Intrusion detection using anomaly detection algorithm and snort
Tazerouti et al. Imposters anomaly detection
Irwin Double-edged sword: dual-purpose cyber security methods
Marinova-Boncheva Applying a data mining method for intrusion detection
Guelzim et al. Formal methods of attack modeling and detection
Karasaridis et al. Artificial intelligence for cybersecurity
Gorbatiuk et al. Method of detection of http attacks on a smart home using the algebraic matching method
Gojali et al. ANALYSIS OF THE EFFECTIVENESS OF THE COMBINATION OF FAIL2BAN AND MODSECURITY IN MITIGATION OF DDOS ATTACKS ON WEB SERVERS
Umar et al. Recovery system using SDN technology for cyber attack solution
Adiwal et al. Intrusion Detection and Prevention in OpenStack: A Case Study on Enhancing Security and Threat Detection
Mittal A review of machine learning techniques in cybersecurity and research opportunities