[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Encina et al., 2014 - Google Patents

A misuse pattern for Denial-of-Service in federated Inter-Clouds

Encina et al., 2014

View PDF
Document ID
3559367217926967231
Author
Encina O
Fernandez E
Monge R
Publication year
Publication venue
Procs. of AsianPLoP (Pattern Languages of Programs)

External Links

Snippet

We have proposed previously a new type of pattern, the misuse pattern. A misuse pattern describes how a misuse is performed from the point of view of the attacker, what system units it uses and how, provides ways of stopping the attack by enumerating possible security …
Continue reading at hillside.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates

Similar Documents

Publication Publication Date Title
VivinSandar et al. Economic denial of sustainability (edos) in cloud services using http and xml based ddos attacks
Sabahi Cloud computing security threats and responses
US9881304B2 (en) Risk-based control of application interface transactions
US10348681B2 (en) Centralized secure offload of security services for distributed security enforcement points
Mahdavi Hezavehi et al. An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments
Soares et al. Cloud security: state of the art
Beer et al. Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Grover et al. Cloud computing and its security issues—A review
PARwANI et al. Various techniques of DDoS attacks detection & prevention at cloud: A survey
Karthik et al. Analysis of simulation of DDOS attack in cloud
Encina et al. A misuse pattern for Denial-of-Service in federated Inter-Clouds
Ngenzi Applying mathematical models in cloud computing: A survey
Booth et al. Elimination of dos UDP reflection amplification bandwidth attacks, protecting TCP services
Lodi et al. Defending financial infrastructures through early warning systems: the intelligence cloud approach
Waziri et al. A Secure Maturity Model for Protecting e-Government Services: A Case of Tanzania
Shakeel et al. Securing Data in Cloud: Major Threats and Recent Strategies
Encina et al. Threat analysis and misuse patterns of federated inter-cloud systems
Shabeeb et al. A study on security threats in cloud
Subramanian et al. Data security in single and multi cloud storage–an overview
Gupta et al. A Study on Cloud Environment: Confidentiality Problems, Security Threats, and Challenges
Pandipati et al. Sureness calamity salvage framework with inventive bandwidth scheme for data storage in cloud computing
Qusa et al. Secure collaborative processing architecture for mitb attack detection
Ogu et al. Partitioning of Resource Provisions for Cloud Computing Infrastructure against DoS and DDoS Attacks.
Karra et al. Overview of cloud & fog computing paradigms
Parmar et al. Compromising cloud security and privacy by dos, ddos, and botnet and their countermeasures