[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Inamdar et al., 2018 - Google Patents

Security analysis of open source network access control in virtual networks

Inamdar et al., 2018

Document ID
1697702741102984288
Author
Inamdar M
Tekeoglu A
Publication year
Publication venue
2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)

External Links

Snippet

Enterprise networks depend on Network Access Control software to restrict access to valuable resources. Significant number of attacks come from internal threats, such as disgruntled employees and infected personal devices brought into the company network …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies

Similar Documents

Publication Publication Date Title
US8281392B2 (en) Methods and systems for wired equivalent privacy and Wi-Fi protected access protection
US7577424B2 (en) Systems and methods for wireless vulnerability analysis
Alotaibi et al. Rogue access point detection: Taxonomy, challenges, and future directions
Inamdar et al. Security analysis of open source network access control in virtual networks
Radivilova et al. Test for penetration in Wi-Fi network: Attacks on WPA2-PSK and WPA2-enterprise
Supriyanto et al. Survey of internet protocol version 6 link local communication security vulnerability and mitigation methods
Sobh Wi-Fi networks security and accessing control
Sawalmeh et al. VPN remote access OSPF-based VPN security vulnerabilities and counter measurements
Baharudin et al. Wireless intruder detection system (WIDS) in detecting de-authentication and disassociation attacks in IEEE 802.11
Naitik et al. Mitigation of key reinstallation attack in wpa2 wi-fi networks by detection of nonce reuse
ElShafee et al. Design and analysis of data link impersonation attack for wired LAN application layer services
Nigam et al. Man-in-the-middle-attack and proposed algorithm for detection
Mohammed et al. Detailed DoS attacks in wireless networks and countermeasures
Alabady Design and implementation of a network security model using static VLAN and AAA server
Trabelsi et al. A novel Man-in-the-Middle intrusion detection scheme for switched LANs
Zegzhda et al. Protection of Wi-Fi network users against rogue access points
Tyagi et al. A survey of different dos attacks on wireless network
Mohammed et al. DoS attacks and defense mechanisms in wireless networks
Salasabi et al. A Practical Approach to Asses Fatal Attacks in Enterprise Network to Identify Effective Mitigation Techniques
Keromytis et al. Designing firewalls: A survey
Teferi et al. A Security Mechanism to Mitigate DDoS Attack on Wireless Local Area Network (WLAN) using MAC with SSID
Ghosh et al. Analysis of Network Security Issues and Threats Analysis on 5G Wireless Networks
Faheem Multiagent-based security for the wireless LAN
Ali et al. Design and implementation of a secured remotely administrated network
Kelly et al. Control and Provisioning of Wireless Access Points (CAPWAP) threat analysis for IEEE 802.11 deployments