Mallah et al., 2004 - Google Patents
Vulnerability assessment through mobile agentsMallah et al., 2004
- Document ID
- 5411165064259788080
- Author
- Mallah G
- Shaikh Z
- Publication year
- Publication venue
- E-Tech 2004
External Links
Snippet
Vulnerability assessment is the process of measuring and prioritizing the risks associated with network-and host based systems to allow balance planning of technologies and activities that manage business risk. That is useful for adapting security policy, analysis of …
- 238000004458 analytical method 0 abstract description 7
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jangjou et al. | A comprehensive survey on security challenges in different network layers in cloud computing | |
US10601844B2 (en) | Non-rule based security risk detection | |
EP3289476B1 (en) | Computer network security system | |
JP6086968B2 (en) | System and method for local protection against malicious software | |
KR102017810B1 (en) | Preventive Instrusion Device and Method for Mobile Devices | |
RU2679179C1 (en) | Systems and methods for creating and modifying access lists | |
US20180025163A1 (en) | Dynamic risk management | |
US20060164199A1 (en) | Network appliance for securely quarantining a node on a network | |
US20060010485A1 (en) | Network security method | |
US20070094729A1 (en) | Secure self-organizing and self-provisioning anomalous event detection systems | |
CN101258470A (en) | Automatic deployment of protection agents to devices connected to a distributed computer network | |
Kim et al. | DSS for computer security incident response applying CBR and collaborative response | |
Marinova-Boncheva | A short survey of intrusion detection systems | |
Kazienko et al. | Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture) | |
Patel et al. | Autonomic agent-based self-managed intrusion detection and prevention system | |
Sadiqui | Computer network security | |
US20250119339A1 (en) | Misconfigured mirror port detection | |
KR20040065674A (en) | Host-based security system and method | |
Kallepalli et al. | Intelligent security: Applying artificial intelligence to detect advanced cyber attacks | |
Ahmad et al. | Security challenges from abuse of cloud service threat | |
US12341672B2 (en) | Logging configuration system and method | |
Mallah et al. | Vulnerability assessment through mobile agents | |
Toumi et al. | Cooperative Trust Framework Based on Hy-Ids, Firewalls, And Mobile Agents to Enhance Security in A Cloud Environment | |
US12277218B2 (en) | Managing and classifying computer processes | |
Hamdani et al. | Automated Policy Violation Detection in Network Security Using Blockchain Technology |