Encina et al., 2014 - Google Patents
A misuse pattern for Denial-of-Service in federated Inter-CloudsEncina et al., 2014
View PDF- Document ID
- 3559367217926967231
- Author
- Encina O
- Fernandez E
- Monge R
- Publication year
- Publication venue
- Procs. of AsianPLoP (Pattern Languages of Programs)
External Links
Snippet
We have proposed previously a new type of pattern, the misuse pattern. A misuse pattern describes how a misuse is performed from the point of view of the attacker, what system units it uses and how, provides ways of stopping the attack by enumerating possible security …
- 238000010586 diagram 0 description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
Similar Documents
Publication | Publication Date | Title |
---|---|---|
VivinSandar et al. | Economic denial of sustainability (edos) in cloud services using http and xml based ddos attacks | |
Sabahi | Cloud computing security threats and responses | |
US9881304B2 (en) | Risk-based control of application interface transactions | |
US10348681B2 (en) | Centralized secure offload of security services for distributed security enforcement points | |
Mahdavi Hezavehi et al. | An anomaly-based framework for mitigating effects of DDoS attacks using a third party auditor in cloud computing environments | |
Soares et al. | Cloud security: state of the art | |
Beer et al. | Adaptive security architecture for protecting RESTful web services in enterprise computing environment | |
Grover et al. | Cloud computing and its security issues—A review | |
PARwANI et al. | Various techniques of DDoS attacks detection & prevention at cloud: A survey | |
Karthik et al. | Analysis of simulation of DDOS attack in cloud | |
Encina et al. | A misuse pattern for Denial-of-Service in federated Inter-Clouds | |
Ngenzi | Applying mathematical models in cloud computing: A survey | |
Booth et al. | Elimination of dos UDP reflection amplification bandwidth attacks, protecting TCP services | |
Lodi et al. | Defending financial infrastructures through early warning systems: the intelligence cloud approach | |
Waziri et al. | A Secure Maturity Model for Protecting e-Government Services: A Case of Tanzania | |
Shakeel et al. | Securing Data in Cloud: Major Threats and Recent Strategies | |
Encina et al. | Threat analysis and misuse patterns of federated inter-cloud systems | |
Shabeeb et al. | A study on security threats in cloud | |
Subramanian et al. | Data security in single and multi cloud storage–an overview | |
Gupta et al. | A Study on Cloud Environment: Confidentiality Problems, Security Threats, and Challenges | |
Pandipati et al. | Sureness calamity salvage framework with inventive bandwidth scheme for data storage in cloud computing | |
Qusa et al. | Secure collaborative processing architecture for mitb attack detection | |
Ogu et al. | Partitioning of Resource Provisions for Cloud Computing Infrastructure against DoS and DDoS Attacks. | |
Karra et al. | Overview of cloud & fog computing paradigms | |
Parmar et al. | Compromising cloud security and privacy by dos, ddos, and botnet and their countermeasures |