Marinova-Boncheva, 2007 - Google Patents
A short survey of intrusion detection systemsMarinova-Boncheva, 2007
View PDF- Document ID
- 4810929025409990250
- Author
- Marinova-Boncheva V
- Publication year
- Publication venue
- problems of Engineering Cybernetics and Robotics
External Links
Snippet
As the cost of information processing and Internet accessibility falls, organizations are becoming increasingly vulnerable to potential cyber threats such as network intrusions. So, there exists a need to provide secure and safe transactions through the use of firewalls …
- 238000001514 detection method 0 title abstract description 45
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Marinova-Boncheva | A short survey of intrusion detection systems | |
US7398389B2 (en) | Kernel-based network security infrastructure | |
Sobh | Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art | |
Akhtar | Securing operating systems (OS): a comprehensive approach to security with best practices and techniques | |
Gao et al. | Research on the main threat and prevention technology of computer network security | |
Singh | Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) For Network Security: A Critical Analysis | |
Saadi et al. | A new approach to mitigate security threats in cloud environment | |
Karie et al. | Cybersecurity incident response in the enterprise | |
Bendiab et al. | IoT Security Frameworks and Countermeasures | |
Kishore et al. | Intrusion detection system a need | |
Marinova-Boncheva | Applying a data mining method for intrusion detection | |
Singh et al. | A review on intrusion detection system | |
Karamagi | Comptia Security+ Practice Exams | |
Poonia et al. | Performance evaluation of network based intrusion detection techniques with Raspberry Pi—a comparative analysis | |
Kaskar et al. | A system for detection of distributed denial of service (DDoS) attacks using KDD cup data set | |
Hashmi et al. | Intrusion Prevention System based Defence Techniques to manage DDoS Attacks | |
Nayak | Research on application of intrusion detection system in data mining | |
Nair et al. | Advanced Cybersecurity Tools and Techniques | |
Soriano | Information and network security | |
Papadaki | Classifying and responding to network intrusions | |
El Hayat | Intrusion Detection Systems: To an Optimal Hybrid Intrusion Detection System | |
Tazerouti et al. | Imposters anomaly detection | |
Zafar et al. | Network security: a survey of modern approaches | |
Hudson | An analysis of botnet vulnerabilities | |
Hamed | An agent-based intrusion detection system using fuzzy logic for computer system threat evaluation |