[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Adeyinka, 2008 - Google Patents

Internet attack methods and internet security technology

Adeyinka, 2008

View PDF
Document ID
2538812459384839083
Author
Adeyinka O
Publication year
Publication venue
2008 Second Asia International Conference on Modelling & Simulation (AMS)

External Links

Snippet

The Internet is a complex and dynamic environment in terms of both topology and emerging technology. In such an environment, security measures applied for small well-defined networks cannot work effectively. The lack of adequate knowledge and understanding of …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0254Stateful filtering

Similar Documents

Publication Publication Date Title
Adeyinka Internet attack methods and internet security technology
Deogirikar et al. Security attacks in IoT: A survey
Sinha et al. Information Security threats and attacks with conceivable counteraction
Biju et al. Cyber attacks and its different types
JP5911893B2 (en) Logic device, processing method and processing device
Schneider The state of network security
Atwell et al. Reverse TCP and social engineering attacks in the era of big data
Rathore Ethical hacking and security against cyber crime
Khan Securing network infrastructure with cyber security
Rahman et al. A novel cloud computing security model to detect and prevent DoS and DDoS attack
Rani et al. Classification of security issues and cyber attacks in layered Internet of Things
Chahar Computer network security
Ahmad et al. Analysis of network security threats and vulnerabilities by development & implementation of a security network monitoring solution
Shukla et al. Cyber Security Techniques Management
Musambo et al. Identifying Botnets Intrusion & Prevention –A Review
Cárdenas et al. Cyber security basic defenses and attack trends
Karamagi Comptia Security+ Practice Exams
Tariq et al. Evaluating the Effectiveness and Resilience of SSL/TLS, HTTPS, IPSec, SSH, and WPA/WPA2 in Safeguarding Data Transmission
Kumar The cram of Network Security with Its stabbing Attacks and likely Security Mechanisms
Ganapathy Virtual Dispersive Network in the Prevention of Third Party Interception: A Way of Dealing with Cyber Threat
Bhosle et al. Technical Review on Network Security
Harrison et al. A protocol layer survey of network security
Bamrara Cyber Crime Threats, Strategies to Overcome, and Future Trends in the Banking Industry
Soriano Information and network security
Sadiku et al. Network Security