Tazerouti et al., 2021 - Google Patents
Imposters anomaly detectionTazerouti et al., 2021
View PDF- Document ID
- 11488380251524175111
- Author
- Tazerouti A
- Ikram A
- Publication year
- Publication venue
- Journal of Fundamental and Applied Sciences
External Links
Snippet
Over the last two decades the world of cyber security has grown immensely, but despite the state-of-the-art security detection systems and intrusion detection systems (IDSs), unwanted malicious users still find their way around these security measures and gain access to …
- 238000001514 detection method 0 title abstract description 57
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Agarwal et al. | A closer look at intrusion detection system for web applications | |
Süzen | A risk-assessment of cyber attacks and defense strategies in industry 4.0 ecosystem | |
Ho et al. | Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems | |
Punithavathani et al. | Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence | |
Adil et al. | Preventive techniques of phishing attacks in networks | |
Marinova-Boncheva | A short survey of intrusion detection systems | |
Singh et al. | E-governance: Information security issues | |
Cotroneo et al. | Automated root cause identification of security alerts: Evaluation in a SaaS Cloud | |
Kim et al. | DSS for computer security incident response applying CBR and collaborative response | |
Möller | Threats and threat intelligence | |
Argauer et al. | VTAC: Virtual terrain assisted impact assessment for cyber attacks | |
Foo et al. | Intrusion response systems: a survey | |
Veena et al. | An intrusion detection system for network security based on an advanced honeypots server | |
Vasudeo et al. | IMMIX-intrusion detection and prevention system | |
Yinka-Banjo et al. | Intrusion detection using anomaly detection algorithm and snort | |
Tazerouti et al. | Imposters anomaly detection | |
Irwin | Double-edged sword: dual-purpose cyber security methods | |
Marinova-Boncheva | Applying a data mining method for intrusion detection | |
Guelzim et al. | Formal methods of attack modeling and detection | |
Karasaridis et al. | Artificial intelligence for cybersecurity | |
Gorbatiuk et al. | Method of detection of http attacks on a smart home using the algebraic matching method | |
Gojali et al. | ANALYSIS OF THE EFFECTIVENESS OF THE COMBINATION OF FAIL2BAN AND MODSECURITY IN MITIGATION OF DDOS ATTACKS ON WEB SERVERS | |
Umar et al. | Recovery system using SDN technology for cyber attack solution | |
Adiwal et al. | Intrusion Detection and Prevention in OpenStack: A Case Study on Enhancing Security and Threat Detection | |
Mittal | A review of machine learning techniques in cybersecurity and research opportunities |