[go: up one dir, main page]

Marinova-Boncheva, 2007 - Google Patents

A short survey of intrusion detection systems

Marinova-Boncheva, 2007

View PDF
Document ID
4810929025409990250
Author
Marinova-Boncheva V
Publication year
Publication venue
problems of Engineering Cybernetics and Robotics

External Links

Snippet

As the cost of information processing and Internet accessibility falls, organizations are becoming increasingly vulnerable to potential cyber threats such as network intrusions. So, there exists a need to provide secure and safe transactions through the use of firewalls …
Continue reading at www.iict.bas.bg (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Similar Documents

Publication Publication Date Title
Marinova-Boncheva A short survey of intrusion detection systems
US7398389B2 (en) Kernel-based network security infrastructure
Sobh Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art
Akhtar Securing operating systems (OS): a comprehensive approach to security with best practices and techniques
Gao et al. Research on the main threat and prevention technology of computer network security
Singh Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) For Network Security: A Critical Analysis
Saadi et al. A new approach to mitigate security threats in cloud environment
Karie et al. Cybersecurity incident response in the enterprise
Bendiab et al. IoT Security Frameworks and Countermeasures
Kishore et al. Intrusion detection system a need
Marinova-Boncheva Applying a data mining method for intrusion detection
Singh et al. A review on intrusion detection system
Karamagi Comptia Security+ Practice Exams
Poonia et al. Performance evaluation of network based intrusion detection techniques with Raspberry Pi—a comparative analysis
Kaskar et al. A system for detection of distributed denial of service (DDoS) attacks using KDD cup data set
Hashmi et al. Intrusion Prevention System based Defence Techniques to manage DDoS Attacks
Nayak Research on application of intrusion detection system in data mining
Nair et al. Advanced Cybersecurity Tools and Techniques
Soriano Information and network security
Papadaki Classifying and responding to network intrusions
El Hayat Intrusion Detection Systems: To an Optimal Hybrid Intrusion Detection System
Tazerouti et al. Imposters anomaly detection
Zafar et al. Network security: a survey of modern approaches
Hudson An analysis of botnet vulnerabilities
Hamed An agent-based intrusion detection system using fuzzy logic for computer system threat evaluation