Kule et al., 2016 - Google Patents
Design of effectively efficient techniques for circumvent wireless network security threats and attacksKule et al., 2016
View PDF- Document ID
- 12177483970987505569
- Author
- Kule T
- Bakwanamaha A
- Publication year
External Links
Snippet
The rapid increase in computer, mobile applications and wireless networks has globally changed the features of network security. A series of Internet attack and fraudulent acts on companies and individual network have shown us that open computer networks have no …
- 238000000034 method 0 title abstract description 51
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mughal | Cyber Attacks on OSI Layers: Understanding the Threat Landscape | |
Stewart | Network security, firewalls and VPNs | |
Holmberg et al. | BACnet wide area network security threat assessment | |
Alabady | Design and Implementation of a Network Security Model for Cooperative Network. | |
Toosarvandani et al. | The risk assessment and treatment approach in order to provide LAN security based on ISMS standard | |
Chauhan | Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus | |
Sadiqui | Computer network security | |
Vachon | CCNA security portable command guide | |
Funmilola et al. | Review of Computer Network Security System | |
Waheed et al. | Hardening Cisco devices based on cryptography and security protocols-part one: Background theory | |
Kule et al. | Design of effectively efficient techniques for circumvent wireless network security threats and attacks | |
Barrett et al. | CompTIA Security+ SY0-401 Exam Cram | |
Singh et al. | CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260) | |
Cameron et al. | Juniper (r) Networks Secure Access SSL VPN Configuration Guide | |
Karamagi | Comptia Security+ Practice Exams | |
Sulaimon | Network security | |
Haji et al. | Practical security strategy for SCADA automation systems and networks | |
Ali et al. | Design and implementation of a secured remotely administrated network | |
Hausman et al. | CompTIA Security+ SY0-301 Exam Cram | |
Davis | Constructing and Probing a Fortified Network | |
Patel | Computer Network Security System | |
BALEMI | BULE HORA UNIVERSIRTY | |
Sarvepalli | Designing Network Security Labs | |
Ali et al. | Applying Penetration Tests on a Highly Secured Cooperative Network. | |
Μπαξεβάνος | Protecting with network security strategies a medium size enterprise and implementing scenarios attacks and countermeasures on cisco equipment |