Inamdar et al., 2018 - Google Patents
Security analysis of open source network access control in virtual networksInamdar et al., 2018
- Document ID
- 1697702741102984288
- Author
- Inamdar M
- Tekeoglu A
- Publication year
- Publication venue
- 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA)
External Links
Snippet
Enterprise networks depend on Network Access Control software to restrict access to valuable resources. Significant number of attacks come from internal threats, such as disgruntled employees and infected personal devices brought into the company network …
- 238000004458 analytical method 0 title description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8281392B2 (en) | Methods and systems for wired equivalent privacy and Wi-Fi protected access protection | |
US7577424B2 (en) | Systems and methods for wireless vulnerability analysis | |
Alotaibi et al. | Rogue access point detection: Taxonomy, challenges, and future directions | |
Inamdar et al. | Security analysis of open source network access control in virtual networks | |
Radivilova et al. | Test for penetration in Wi-Fi network: Attacks on WPA2-PSK and WPA2-enterprise | |
Supriyanto et al. | Survey of internet protocol version 6 link local communication security vulnerability and mitigation methods | |
Sobh | Wi-Fi networks security and accessing control | |
Sawalmeh et al. | VPN remote access OSPF-based VPN security vulnerabilities and counter measurements | |
Baharudin et al. | Wireless intruder detection system (WIDS) in detecting de-authentication and disassociation attacks in IEEE 802.11 | |
Naitik et al. | Mitigation of key reinstallation attack in wpa2 wi-fi networks by detection of nonce reuse | |
ElShafee et al. | Design and analysis of data link impersonation attack for wired LAN application layer services | |
Nigam et al. | Man-in-the-middle-attack and proposed algorithm for detection | |
Mohammed et al. | Detailed DoS attacks in wireless networks and countermeasures | |
Alabady | Design and implementation of a network security model using static VLAN and AAA server | |
Trabelsi et al. | A novel Man-in-the-Middle intrusion detection scheme for switched LANs | |
Zegzhda et al. | Protection of Wi-Fi network users against rogue access points | |
Tyagi et al. | A survey of different dos attacks on wireless network | |
Mohammed et al. | DoS attacks and defense mechanisms in wireless networks | |
Salasabi et al. | A Practical Approach to Asses Fatal Attacks in Enterprise Network to Identify Effective Mitigation Techniques | |
Keromytis et al. | Designing firewalls: A survey | |
Teferi et al. | A Security Mechanism to Mitigate DDoS Attack on Wireless Local Area Network (WLAN) using MAC with SSID | |
Ghosh et al. | Analysis of Network Security Issues and Threats Analysis on 5G Wireless Networks | |
Faheem | Multiagent-based security for the wireless LAN | |
Ali et al. | Design and implementation of a secured remotely administrated network | |
Kelly et al. | Control and Provisioning of Wireless Access Points (CAPWAP) threat analysis for IEEE 802.11 deployments |