[go: up one dir, main page]

Xiang et al., 2016 - Google Patents

CLASSIFICATION OF ATTACKS

Xiang et al., 2016

Document ID
5769724605170728675
Author
Xiang Y
et al.
Publication year
Publication venue
Combating Security Breaches and Criminal Activity in the Digital Sphere

External Links

Snippet

ABSTRACT In the Internet Era, millions of computer systems are connected to the Internet and the number is increasing infinitely. Maintaining proper Control and configuration for all such networked systems has proved to be impossible. This loophole makes the Internet …
Continue reading at books.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Mallick et al. Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments
Abdul-Ghani et al. A comprehensive IoT attacks survey based on a building-blocked reference model
Albalawi et al. Assessing and reviewing of cyber-security threats, attacks, mitigation techniques in IoT environment
Humayun et al. Industry 4.0 and cyber security issues and challenges
Gupta et al. RETRACTED: Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: A survey
Ling et al. Torward: Discovery, blocking, and traceback of malicious traffic over tor
Rani et al. Cyber security techniques, architectures, and design
Wang et al. Introduction to network security: theory and practice
Almuqren Cybersecurity threats, countermeasures and mitigation techniques on the IoT: Future research directions
Oriyano Hacker techniques, tools, and incident handling
Mammeri Cryptography: Algorithms, protocols, and standards for computer security
Assing et al. Mobile access safety: Beyond BYOD
Thangamuthu et al. Cybercrime
Li et al. Network Security
Rani et al. Classification of security issues and cyber attacks in layered internet of things
Pareek et al. Different type network security threats and solutions, a review
Drăguşin et al. Comprehensive Analysis Of Cyber-Attack Techniques And Vulnerabilities In Communication Channels Of Embedded Systems
Ahmad et al. Analysis of network security threats and vulnerabilities by development & implementation of a security network monitoring solution
Cárdenas et al. Cyber security basic defenses and attack trends
Banoth et al. Modern cryptanalysis methods, advanced network attacks and cloud security
Chauhan et al. Computer Security and Encryption: An Introduction
Musambo et al. Identifying Botnets Intrusion & Prevention –A Review
Tanya et al. A Comprehensive Study on Cybersecurity Challenges and Solutions in an IoT Framework
Yalda et al. Enhancing IoT Security Affordably with Raspberry Pi and Open-Source IDS/IPS
Paquet Implementing Cisco IOS network security (IINS):(CCNA security exam 640-553)(authorized self-study guide)