[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Nguyen et al., 2019 - Google Patents

Preventing the attempts of abusing cheap-hosting Web-servers for monetization attacks

Nguyen et al., 2019

View PDF
Document ID
3634494340895823747
Author
Nguyen V
Lin P
Hwang R
Publication year
Publication venue
arXiv preprint arXiv:1903.05470

External Links

Snippet

Over the past decades, the web is always one of the most popular targets of hackers. Today, along with the popular usage of open sources such as Wordpress and Joomla, the explosion of the vulnerabilities in such frameworks causes the websites using them to face …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords

Similar Documents

Publication Publication Date Title
Bahrami et al. Cyber kill chain-based taxonomy of advanced persistent threat actors: Analogy of tactics, techniques, and procedures
Kirda et al. Client-side cross-site scripting protection
Soltani et al. A survey on real world botnets and detection mechanisms
Kara et al. The ghost in the system: technical analysis of remote access trojan
Maulana et al. Unmasking log4j’s vulnerability: protecting systems against exploitation through ethical hacking and cyberlaw perspectives
Gupta et al. Taxonomy of cloud security
Ask et al. Advanced persistent threat (APT) beyond the hype
Deng et al. Lexical analysis for the webshell attacks
Nguyen et al. Web attacks: defeating monetisation attempts
Diwan An investigation and analysis of cyber security information systems: latest trends and future suggestion
Nguyen et al. Preventing the attempts of abusing cheap-hosting Web-servers for monetization attacks
Alsmadi Cyber threat analysis
Maybaum et al. Technical methods, techniques, tools and effects of cyber operations
Victoire et al. A Survey on Cyber Security Threats and its Impact on Society
Zammouri et al. SafeBrowse: A new tool for strengthening and monitoring the security configuration of web browsers
Chen et al. A proactive approach to intrusion detection and malware collection
Avlakulovich et al. Understanding of Human Factors and Impact in Cybersecurity
Ekanayake et al. What is cybersecurity: The reality of modern threats
Ganganagari Defining Best Practices to Prevent Zero-Day and Polymorphic Attacks
RU2763115C1 (en) Method for adjusting the parameters of a machine learning model in order to identify false triggering and information security incidents
Panagiotakopoulos Assessing open and closed EDRs
Disso et al. A distributed attack detection and mitigation framework
Kavithamani et al. An analysis of remotely triggered malware exploits in content management system-based web applications
Alsmadi et al. Information systems security management
Srivastava et al. COMPUTER VIRUS AND ANTIVIRUS