[go: up one dir, main page]

Mallah et al., 2004 - Google Patents

Vulnerability assessment through mobile agents

Mallah et al., 2004

Document ID
5411165064259788080
Author
Mallah G
Shaikh Z
Publication year
Publication venue
E-Tech 2004

External Links

Snippet

Vulnerability assessment is the process of measuring and prioritizing the risks associated with network-and host based systems to allow balance planning of technologies and activities that manage business risk. That is useful for adapting security policy, analysis of …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies

Similar Documents

Publication Publication Date Title
Jangjou et al. A comprehensive survey on security challenges in different network layers in cloud computing
US10601844B2 (en) Non-rule based security risk detection
EP3289476B1 (en) Computer network security system
JP6086968B2 (en) System and method for local protection against malicious software
KR102017810B1 (en) Preventive Instrusion Device and Method for Mobile Devices
RU2679179C1 (en) Systems and methods for creating and modifying access lists
US20180025163A1 (en) Dynamic risk management
US20060164199A1 (en) Network appliance for securely quarantining a node on a network
US20060010485A1 (en) Network security method
US20070094729A1 (en) Secure self-organizing and self-provisioning anomalous event detection systems
CN101258470A (en) Automatic deployment of protection agents to devices connected to a distributed computer network
Kim et al. DSS for computer security incident response applying CBR and collaborative response
Marinova-Boncheva A short survey of intrusion detection systems
Kazienko et al. Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture)
Patel et al. Autonomic agent-based self-managed intrusion detection and prevention system
Sadiqui Computer network security
US20250119339A1 (en) Misconfigured mirror port detection
KR20040065674A (en) Host-based security system and method
Kallepalli et al. Intelligent security: Applying artificial intelligence to detect advanced cyber attacks
Ahmad et al. Security challenges from abuse of cloud service threat
US12341672B2 (en) Logging configuration system and method
Mallah et al. Vulnerability assessment through mobile agents
Toumi et al. Cooperative Trust Framework Based on Hy-Ids, Firewalls, And Mobile Agents to Enhance Security in A Cloud Environment
US12277218B2 (en) Managing and classifying computer processes
Hamdani et al. Automated Policy Violation Detection in Network Security Using Blockchain Technology