[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Miltenburg et al., 2015 - Google Patents

Preventing Common Attacks on Critical Infrastructure

Miltenburg et al., 2015

View PDF
Document ID
16951754387408600983
Author
Miltenburg W
Veelenturf K
Baloo J
Koeroo O
Publication year
Publication venue
Unpublished dissertation in partial fulfillment of the requirements for the degree of Master of System and Network Engineering, University of Amsterdam, Amsterdam, Netherlands

External Links

Snippet

Critical infrastructures are attacked just like any other network, but attacks are getting more sophisticated and can not be solved on its own. When outages or malfunctions can have a devastating impact on a regional, national, or international level, an infrastructure can be …
Continue reading at rp.os3.nl (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/06Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
    • H04L41/0654Network fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/06Arrangements for maintenance or administration or management of packet switching networks involving management of faults or events or alarms
    • H04L41/0604Alarm or event filtering, e.g. for reduction of information
    • H04L41/0622Alarm or event filtering, e.g. for reduction of information based on time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones

Similar Documents

Publication Publication Date Title
Keromytis A comprehensive survey of voice over IP security research
Butler et al. A survey of BGP security issues and solutions
US20050132060A1 (en) Systems and methods for preventing spam and denial of service attacks in messaging, packet multimedia, and other networks
Tschofenig et al. Security Threats for Next Steps in Signaling (NSIS)
Gavrichenkov Breaking HTTPS with BGP hijacking
Santos End-to-End Network Security
Bender et al. Accountability as a Service.
Haber et al. Attack vectors
Keromytis Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research
Rose et al. Trustworthy email
Morris et al. Bgp-isec: Improved security of internet routing against post-rov attacks
Ahmad et al. Analysis of network security threats and vulnerabilities by development & implementation of a security network monitoring solution
Miltenburg et al. Preventing Common Attacks on Critical Infrastructure
Pappas et al. Network transparency for better internet security
Patil et al. VoIP security
Shulman Implications of vulnerable internet infrastructure
Wei et al. Foggy: a new anonymous communication architecture based on microservices
Akinbami et al. Developing best practices for securing VoIP communication for a non-profit organization
Schneider et al. Critical infrastructures you can trust: where telecommunications fits
Aledhari et al. Protecting Internet Traffic: Security Challenges and Solutions
Aura et al. Communications security on the Internet
Ganguly Network and application security: fundamentals and practices
Sharma et al. Security enhancement on BGP protocol: A literature survey
Martin et al. Security Issues of VoIP
Gingerich The effectiveness of the tor anonymity network