[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kule et al., 2016 - Google Patents

Design of effectively efficient techniques for circumvent wireless network security threats and attacks

Kule et al., 2016

View PDF
Document ID
12177483970987505569
Author
Kule T
Bakwanamaha A
Publication year

External Links

Snippet

The rapid increase in computer, mobile applications and wireless networks has globally changed the features of network security. A series of Internet attack and fraudulent acts on companies and individual network have shown us that open computer networks have no …
Continue reading at ir.kiu.ac.ug (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Similar Documents

Publication Publication Date Title
Mughal Cyber Attacks on OSI Layers: Understanding the Threat Landscape
Stewart Network security, firewalls and VPNs
Holmberg et al. BACnet wide area network security threat assessment
Alabady Design and Implementation of a Network Security Model for Cooperative Network.
Toosarvandani et al. The risk assessment and treatment approach in order to provide LAN security based on ISMS standard
Chauhan Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus
Sadiqui Computer network security
Vachon CCNA security portable command guide
Funmilola et al. Review of Computer Network Security System
Waheed et al. Hardening Cisco devices based on cryptography and security protocols-part one: Background theory
Kule et al. Design of effectively efficient techniques for circumvent wireless network security threats and attacks
Barrett et al. CompTIA Security+ SY0-401 Exam Cram
Singh et al. CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260)
Cameron et al. Juniper (r) Networks Secure Access SSL VPN Configuration Guide
Karamagi Comptia Security+ Practice Exams
Sulaimon Network security
Haji et al. Practical security strategy for SCADA automation systems and networks
Ali et al. Design and implementation of a secured remotely administrated network
Hausman et al. CompTIA Security+ SY0-301 Exam Cram
Davis Constructing and Probing a Fortified Network
Patel Computer Network Security System
BALEMI BULE HORA UNIVERSIRTY
Sarvepalli Designing Network Security Labs
Ali et al. Applying Penetration Tests on a Highly Secured Cooperative Network.
Μπαξεβάνος Protecting with network security strategies a medium size enterprise and implementing scenarios attacks and countermeasures on cisco equipment