Adeyinka, 2008 - Google Patents
Internet attack methods and internet security technologyAdeyinka, 2008
View PDF- Document ID
- 2538812459384839083
- Author
- Adeyinka O
- Publication year
- Publication venue
- 2008 Second Asia International Conference on Modelling & Simulation (AMS)
External Links
Snippet
The Internet is a complex and dynamic environment in terms of both topology and emerging technology. In such an environment, security measures applied for small well-defined networks cannot work effectively. The lack of adequate knowledge and understanding of …
- 238000005516 engineering process 0 title abstract description 13
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0254—Stateful filtering
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Adeyinka | Internet attack methods and internet security technology | |
Deogirikar et al. | Security attacks in IoT: A survey | |
Sinha et al. | Information Security threats and attacks with conceivable counteraction | |
Biju et al. | Cyber attacks and its different types | |
JP5911893B2 (en) | Logic device, processing method and processing device | |
Schneider | The state of network security | |
Atwell et al. | Reverse TCP and social engineering attacks in the era of big data | |
Rathore | Ethical hacking and security against cyber crime | |
Khan | Securing network infrastructure with cyber security | |
Rahman et al. | A novel cloud computing security model to detect and prevent DoS and DDoS attack | |
Rani et al. | Classification of security issues and cyber attacks in layered Internet of Things | |
Chahar | Computer network security | |
Ahmad et al. | Analysis of network security threats and vulnerabilities by development & implementation of a security network monitoring solution | |
Shukla et al. | Cyber Security Techniques Management | |
Musambo et al. | Identifying Botnets Intrusion & Prevention –A Review | |
Cárdenas et al. | Cyber security basic defenses and attack trends | |
Karamagi | Comptia Security+ Practice Exams | |
Tariq et al. | Evaluating the Effectiveness and Resilience of SSL/TLS, HTTPS, IPSec, SSH, and WPA/WPA2 in Safeguarding Data Transmission | |
Kumar | The cram of Network Security with Its stabbing Attacks and likely Security Mechanisms | |
Ganapathy | Virtual Dispersive Network in the Prevention of Third Party Interception: A Way of Dealing with Cyber Threat | |
Bhosle et al. | Technical Review on Network Security | |
Harrison et al. | A protocol layer survey of network security | |
Bamrara | Cyber Crime Threats, Strategies to Overcome, and Future Trends in the Banking Industry | |
Soriano | Information and network security | |
Sadiku et al. | Network Security |