Miltenburg et al., 2015 - Google Patents
Preventing Common Attacks on Critical InfrastructureMiltenburg et al., 2015
View PDF- Document ID
- 16951754387408600983
- Author
- Miltenburg W
- Veelenturf K
- Baloo J
- Koeroo O
- Publication year
- Publication venue
- Unpublished dissertation in partial fulfillment of the requirements for the degree of Master of System and Network Engineering, University of Amsterdam, Amsterdam, Netherlands
External Links
Snippet
Critical infrastructures are attacked just like any other network, but attacks are getting more sophisticated and can not be solved on its own. When outages or malfunctions can have a devastating impact on a regional, national, or international level, an infrastructure can be …
- 238000001914 filtration 0 description 55
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/06—Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
- H04L41/0654—Network fault recovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/06—Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
- H04L41/0604—Alarm or event filtering, e.g. for reduction of information
- H04L41/0622—Alarm or event filtering, e.g. for reduction of information based on time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Keromytis | A comprehensive survey of voice over IP security research | |
Butler et al. | A survey of BGP security issues and solutions | |
US20050132060A1 (en) | Systems and methods for preventing spam and denial of service attacks in messaging, packet multimedia, and other networks | |
Tschofenig et al. | Security Threats for Next Steps in Signaling (NSIS) | |
Gavrichenkov | Breaking HTTPS with BGP hijacking | |
Santos | End-to-End Network Security | |
Bender et al. | Accountability as a Service. | |
Haber et al. | Attack vectors | |
Keromytis | Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research | |
Rose et al. | Trustworthy email | |
Morris et al. | Bgp-isec: Improved security of internet routing against post-rov attacks | |
Ahmad et al. | Analysis of network security threats and vulnerabilities by development & implementation of a security network monitoring solution | |
Miltenburg et al. | Preventing Common Attacks on Critical Infrastructure | |
Pappas et al. | Network transparency for better internet security | |
Patil et al. | VoIP security | |
Shulman | Implications of vulnerable internet infrastructure | |
Wei et al. | Foggy: a new anonymous communication architecture based on microservices | |
Akinbami et al. | Developing best practices for securing VoIP communication for a non-profit organization | |
Schneider et al. | Critical infrastructures you can trust: where telecommunications fits | |
Aledhari et al. | Protecting Internet Traffic: Security Challenges and Solutions | |
Aura et al. | Communications security on the Internet | |
Ganguly | Network and application security: fundamentals and practices | |
Sharma et al. | Security enhancement on BGP protocol: A literature survey | |
Martin et al. | Security Issues of VoIP | |
Gingerich | The effectiveness of the tor anonymity network |