Miloslavskaya, 2018 - Google Patents
Remote attacks taxonomy and their verbal indicatorsMiloslavskaya, 2018
View PDF- Document ID
- 6282279352277717932
- Author
- Miloslavskaya N
- Publication year
- Publication venue
- Procedia computer science
External Links
Snippet
To detect and to timely interrupt increasingly sophisticated attacks against modern networks, their systems, services and resources, it is especially important to understand the scenarios and phases of various possible attacks, specific for these networks. Based on the analysis of …
- 230000001755 vocal 0 title abstract description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
- G06F9/546—Message passing systems or structures, e.g. queues
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Programme initiating; Programme switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11438365B2 (en) | Hierarchical risk assessment and remediation of threats in mobile networking environment | |
Ussath et al. | Advanced persistent threats: Behind the scenes | |
Langer | Cyber-security issues in healthcare information technology | |
Al-Turjman et al. | An overview about the cyberattacks in grid and like systems | |
Aboelfotoh et al. | A review of cyber-security measuring and assessment methods for modern enterprises | |
Gupta et al. | Taxonomy of cloud security | |
Chivukula et al. | A study of cyber security issues and challenges | |
Chauhan | Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus | |
Aijaz et al. | Security operations center—A need for an academic environment | |
Iftikhar et al. | BOTNETs: A Network Security Issue | |
Sarowa et al. | Analysis of Cyber Attacks and Cyber Incident Patterns over APCERT Member Countries | |
Sheikh | Certified Ethical Hacker (CEH) Preparation Guide | |
Ramachandran et al. | The improved cloud computing adoption framework to deliver secure services | |
Miloslavskaya | Remote attacks taxonomy and their verbal indicators | |
Hassan | Enterprise Defense Strategies Against Ransomware Attacks: Protection Against Ransomware Attacks on Corporate Environment | |
Alrubaie et al. | A cybersecurity architecture to mitigate shamoon attacks | |
Rogers et al. | Mitigating Higher Ed Cyber Attacks. | |
Khan et al. | RANSOMWARE ATTACK MODELING: KEY SYSTEMIC VULNERABILITIES AND SAFETY PRACTICES EXPLOITS (PART-II) | |
Aljaidi et al. | An assessment of obfuscated bad rabbit ransomware detection and prevention methods | |
Virvilis-Kollitiris | Detecting advanced persistent threats through deception techniques | |
Mutemwa et al. | Managing the Shift in the Enterprise Perimeter in order to delay a Cybersecurity Breach | |
Chellappan et al. | Layered defense approach: towards total network security | |
Karamagi | Comptia Security+ Practice Exams | |
Mohseni | Network Security for Small Businesses | |
Alsmadi | Information systems security management |